pentestmedium

WingData (Wing FTP RCE → Python tarfile PATH_MAX bypass)

hackthebox

Task: Full HackTheBox machine with Wing FTP Server v7.4.3. Solution: CVE-2025-47812 unauthenticated RCE via NULL byte injection in username for initial access, SHA-256 salted hash cracking for user credentials, then CVE-2025-4517 Python tarfile data filter PATH_MAX bypass for privilege escalation to root.

$ ls tags/ techniques/
null_byte_session_injection_rcelua_code_injection_via_sessionsha256_salt_crackingtarfile_path_max_symlink_escapenested_directory_path_overflowssh_key_injectionbase64_exfiltration

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]