pentestmedium
WingData (Wing FTP RCE → Python tarfile PATH_MAX bypass)
hackthebox
Task: Full HackTheBox machine with Wing FTP Server v7.4.3. Solution: CVE-2025-47812 unauthenticated RCE via NULL byte injection in username for initial access, SHA-256 salted hash cracking for user credentials, then CVE-2025-4517 Python tarfile data filter PATH_MAX bypass for privilege escalation to root.
$ ls tags/ techniques/
apachehashcatsshwing_ftpcve-2025-47812cve-2025-4517null_byte_injectionlua_injectionsession_injectionsha256_salted_hashtarfile_data_filterpath_max_bypasssymlink_escapepython_tarfile
null_byte_session_injection_rcelua_code_injection_via_sessionsha256_salt_crackingtarfile_path_max_symlink_escapenested_directory_path_overflowssh_key_injectionbase64_exfiltration
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]