Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      Handling JavaScript Event Listeners With Parameters

      July 21, 2025

      I finally gave NotebookLM my full attention – and it really is a total game changer

      July 22, 2025

      Google Chrome for iOS now lets you switch between personal and work accounts

      July 22, 2025

      How the Trump administration changed AI: A timeline

      July 22, 2025

      Download your photos before AT&T shuts down its cloud storage service permanently

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Laravel Live Denmark

      July 22, 2025
      Recent

      Laravel Live Denmark

      July 22, 2025

      The July 2025 Laravel Worldwide Meetup is Today

      July 22, 2025

      Livewire Security Vulnerability

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
      Recent

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025

      Halo and Half-Life combine in wild new mod, bringing two of my favorite games together in one — here’s how to play, and how it works

      July 22, 2025

      Surprise! The iconic Roblox ‘oof’ sound is back — the beloved meme makes “a comeback so good it hurts” after three years of licensing issues

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CrushFTP Servers Hit by Critical Zero-Day Vulnerability CVE-2025-54309

    CrushFTP Servers Hit by Critical Zero-Day Vulnerability CVE-2025-54309

    July 21, 2025

    CVE-2025-54309

    A new zero-day vulnerability in CrushFTP file transfer servers is being actively exploited by cybercriminals, compromising systems around the world. Tracked as CVE-2025-54309, the CrushFTP zero-day vulnerability was first observed in active exploitation on July 18, 2025. 

    This zero-day vulnerability in CrushFTP is particularly dangerous due to the stealthy nature of the attack vector, which leverages both HTTP and HTTPS protocols to infiltrate vulnerable servers. This automatically makes internet-facing instances of CrushFTP especially susceptible to unauthorized access if not promptly patched. 

    CVE-2025-54309: Vulnerability Details and Origins 

    The attackers behind CVE-2025-54309 reverse-engineered CrushFTP’s codebase to uncover and weaponize a flaw that had technically been addressed in prior updates but remained exploitable in outdated installations. This means organizations that have not kept up with regular patching cycles are now vulnerable to this active threat. 

    In an official statement, CrushFTP noted, “Hackers apparently reverse engineered our code and found some bug which we had already fixed. They are exploiting it for anyone who has not stayed current on new versions.” The company believes the exploited bug existed in builds prior to July 1, 2025, and that newer versions had already silently patched the issue during unrelated updates to AS2 functionality over HTTP(S). 

    Affected Versions 

    The vulnerability affects the following builds: 

    • Version 10: All versions below 10.8.5
    • Version 11: All versions below 11.3.4_23

    Users running these versions who haven’t updated may already be compromised, especially if their servers are directly accessible over the internet. 

    Signs of Compromise 

    CrushFTP has released a list of indicators to help system administrators detect possible exploitation: 

    • Presence of “last_logins” entries in user.XML (not normally present) 
    • Recent modification timestamps on the default user.XML file 
    • The default user unexpectedly has admin rights 
    • Strange, long random user IDs (e.g., 7a0d26089ac528941bf8cb998d97f408m) 
    • Unknown admin-level accounts are being created 
    • Disappearance of user interface buttons, or unexpected Admin buttons on user accounts 
    • The altered version displays used by attackers to mask the true server state 

    Administrators are also being warned that threat actors are reusing scripts from previous exploits to deploy additional payloads on affected systems. 

    Remediation and Recovery 

    Organizations suspecting a breach are urged to immediately restore the default user profile from a backup created before July 16, 2025. The backup is located in: 

    swift 

    CopyEdit 

    CrushFTP/backup/users/MainUsers/default
     

    Because these zip files may not be compatible with native Windows extraction tools, users are advised to use software like 7-Zip, WinRAR, macOS Archive Utility, or WinZip. 

    If backups are unavailable, deleting the default user will trigger CrushFTP to recreate it, though any custom configurations will be lost. 

    Preventive Measures and Recommendations 

    To mitigate future risks, CrushFTP recommends the following actions: 

    • Whitelist IP addresses that can access the server 
    • Restrict administration access by IP 
    • Deploy a DMZ-based CrushFTP proxy in enterprise environments 
    • Enable automatic updates within the server preferences 
    • Sign up for emergency notifications via CrushFTP Support 

    The company emphasized the importance of proactive patching: “Anyone who had kept up to date was spared from this exploit.” 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleEuropol targets Kremlin-backed cybercrime gang NoName057(16)
    Next Article Cyberattack on CoinDCX Triggers $44M Loss, But No Impact on User Wallets

    Related Posts

    Development

    Laravel Live Denmark

    July 22, 2025
    Development

    The July 2025 Laravel Worldwide Meetup is Today

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    TacticAI: an AI assistant for football tactics

    Artificial Intelligence

    CVE-2025-31237 – Apple AFP Network Share System Termination Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    GPT-5 should have a higher “degree of scientific certainty” than the current ChatGPT — but with less model switching

    News & Updates

    Krispy Kreme hack exposed sensitive data of over 160,000 people

    Development

    Highlights

    Microsoft’s ‘Digital Escort’ Program Under Fire for Potential China-Linked Security Risks

    July 17, 2025

    A new investigation has raised red flags over how Microsoft handles sensitive military data. According…

    B2B Travel Booking Software

    July 22, 2025
    Anthropic copies OpenAI’s $200/month homework, but fumbles with restrictive rate limits that frustrate users: “I am canceling.”

    Anthropic copies OpenAI’s $200/month homework, but fumbles with restrictive rate limits that frustrate users: “I am canceling.”

    April 11, 2025

    How Multilingual AI Agents Are Making Shopping Seamless Across the Globe🛒

    July 2, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.