Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      This week in AI updates: Mistral’s new Le Chat features, ChatGPT updates, and more (September 5, 2025)

      September 6, 2025

      Designing For TV: Principles, Patterns And Practical Guidance (Part 2)

      September 5, 2025

      Neo4j introduces new graph architecture that allows operational and analytics workloads to be run together

      September 5, 2025

      Beyond the benchmarks: Understanding the coding personalities of different LLMs

      September 5, 2025

      Hitachi Energy Pledges $1B to Strengthen US Grid, Build Largest Transformer Plant in Virginia

      September 5, 2025

      How to debug a web app with Playwright MCP and GitHub Copilot

      September 5, 2025

      Between Strategy and Story: Thierry Chopain’s Creative Path

      September 5, 2025

      What You Need to Know About CSS Color Interpolation

      September 5, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Why browsers throttle JavaScript timers (and what to do about it)

      September 6, 2025
      Recent

      Why browsers throttle JavaScript timers (and what to do about it)

      September 6, 2025

      How to create Google Gemini AI component in Total.js Flow

      September 6, 2025

      Drupal 11’s AI Features: What They Actually Mean for Your Team

      September 5, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Harnessing GitOps on Linux for Seamless, Git-First Infrastructure Management

      September 6, 2025
      Recent

      Harnessing GitOps on Linux for Seamless, Git-First Infrastructure Management

      September 6, 2025

      How DevOps Teams Are Redefining Reliability with NixOS and OSTree-Powered Linux

      September 5, 2025

      Distribution Release: Linux Mint 22.2

      September 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CrushFTP Servers Hit by Critical Zero-Day Vulnerability CVE-2025-54309

    CrushFTP Servers Hit by Critical Zero-Day Vulnerability CVE-2025-54309

    July 21, 2025

    CVE-2025-54309

    A new zero-day vulnerability in CrushFTP file transfer servers is being actively exploited by cybercriminals, compromising systems around the world. Tracked as CVE-2025-54309, the CrushFTP zero-day vulnerability was first observed in active exploitation on July 18, 2025. 

    This zero-day vulnerability in CrushFTP is particularly dangerous due to the stealthy nature of the attack vector, which leverages both HTTP and HTTPS protocols to infiltrate vulnerable servers. This automatically makes internet-facing instances of CrushFTP especially susceptible to unauthorized access if not promptly patched. 

    CVE-2025-54309: Vulnerability Details and Origins 

    The attackers behind CVE-2025-54309 reverse-engineered CrushFTP’s codebase to uncover and weaponize a flaw that had technically been addressed in prior updates but remained exploitable in outdated installations. This means organizations that have not kept up with regular patching cycles are now vulnerable to this active threat. 

    In an official statement, CrushFTP noted, “Hackers apparently reverse engineered our code and found some bug which we had already fixed. They are exploiting it for anyone who has not stayed current on new versions.” The company believes the exploited bug existed in builds prior to July 1, 2025, and that newer versions had already silently patched the issue during unrelated updates to AS2 functionality over HTTP(S). 

    Affected Versions 

    The vulnerability affects the following builds: 

    • Version 10: All versions below 10.8.5
    • Version 11: All versions below 11.3.4_23

    Users running these versions who haven’t updated may already be compromised, especially if their servers are directly accessible over the internet. 

    Signs of Compromise 

    CrushFTP has released a list of indicators to help system administrators detect possible exploitation: 

    • Presence of “last_logins” entries in user.XML (not normally present) 
    • Recent modification timestamps on the default user.XML file 
    • The default user unexpectedly has admin rights 
    • Strange, long random user IDs (e.g., 7a0d26089ac528941bf8cb998d97f408m) 
    • Unknown admin-level accounts are being created 
    • Disappearance of user interface buttons, or unexpected Admin buttons on user accounts 
    • The altered version displays used by attackers to mask the true server state 

    Administrators are also being warned that threat actors are reusing scripts from previous exploits to deploy additional payloads on affected systems. 

    Remediation and Recovery 

    Organizations suspecting a breach are urged to immediately restore the default user profile from a backup created before July 16, 2025. The backup is located in: 

    swift 

    CopyEdit 

    CrushFTP/backup/users/MainUsers/default
     

    Because these zip files may not be compatible with native Windows extraction tools, users are advised to use software like 7-Zip, WinRAR, macOS Archive Utility, or WinZip. 

    If backups are unavailable, deleting the default user will trigger CrushFTP to recreate it, though any custom configurations will be lost. 

    Preventive Measures and Recommendations 

    To mitigate future risks, CrushFTP recommends the following actions: 

    • Whitelist IP addresses that can access the server 
    • Restrict administration access by IP 
    • Deploy a DMZ-based CrushFTP proxy in enterprise environments 
    • Enable automatic updates within the server preferences 
    • Sign up for emergency notifications via CrushFTP Support 

    The company emphasized the importance of proactive patching: “Anyone who had kept up to date was spared from this exploit.” 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleEuropol targets Kremlin-backed cybercrime gang NoName057(16)
    Next Article Cyberattack on CoinDCX Triggers $44M Loss, But No Impact on User Wallets

    Related Posts

    Development

    How to focus on building your skills when everything’s so distracting with Ania Kubów [Podcast #187]

    September 6, 2025
    Development

    Introducing freeCodeCamp Daily Python and JavaScript Challenges – Solve a New Programming Puzzle Every Day

    September 6, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    “We pitched it for 10 years and we weren’t sure if it was going to go into orbit” — Discussing ‘A Minecraft Movie’ as it breaks records on the way to streaming

    News & Updates

    CVE-2012-10025 – “WordPress Advanced Custom Fields RFI Remote Code Execution”

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-1909 – BuddyBoss Platform Pro WordPress Authentication Bypass Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Editor’s Soapbox: AI: The Bad, the Worse, and the Ugly

    News & Updates

    Highlights

    lsfg-vk – Lossless Scaling Frame Generation

    August 5, 2025

    This project attempts to bring one of its most commonly used features, Lossless Scaling Frame…

    Sakana AI Introduces Text-to-LoRA (T2L): A Hypernetwork that Generates Task-Specific LLM Adapters (LoRAs) based on a Text Description of the Task

    June 14, 2025

    CVE-2025-1990 – Apache Struts Remote Code Execution

    July 5, 2025

    CISA, FBI Issue Interlock Ransomware Warning

    July 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.