Raleigh, NC

32°F
Scattered Clouds Humidity: 79%
Wind: 2.06 M/S

CVE-2025-54309: Exploit Code Emerges for CrushFTP 0-Day

CVE-2025-54309: Exploit Code Emerges for CrushFTP 0-Day

A public proof-of-concept exploit targeting CVE-2025-54309 has been released. This critical vulnerability affects CrushFTP servers and allows remote attackers to bypass authentication by exploiting a race condition in AS2 validation. First seen in July 2025, it impacts CrushFTP versions 10 before 10.8.5 and 11 before 11.3.4_23 when the DMZ proxy is disabled, a common setup across enterprises. 

Over 30,000 exposed instances are at risk. Attackers send two rapid HTTP POST requests to the WebInterface/function/ endpoint. The first includes an AS2-TO header impersonating the crushadmin user, and the second reuses session cookies without the header. This sequence wins the race condition and creates a new admin account. 

WatchTowr Labs published the exploit on GitHub to help security teams test systems safely. Analysts recommend monitoring for repeated POST requests with AS2-TO headers and similar cookies. Detection rules and rate-limiting can help reduce exploit attempts. 

To mitigate the threat: 

  • Upgrade to CrushFTP 10.8.5 or 11.3.4_23 
  • Enable the DMZ proxy 
  • Audit admin account changes and session reuse 

Organizations should treat CVE-2025-54309 as a high-priority risk and respond quickly to prevent compromise. 

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.