This Metasploit module exploits a stack-based buffer overflow in Ability Server 2.34. Ability Server fails to check input size when parsing STOR and APPE commands, which leads to a stack based buffer overflow. This plugin uses the STOR command. The vulnerability has been confirmed on version 2.34 and has also been reported in version 2.25 and 2.32. Other versions may also be affected.
2f42268540b9e7a1b27be7be2665ffceb81143ab10130f7b317339dcd4c523c5
Ability ftpd version 2.34 remote root exploit that spawns a shell.
f3dcc86ffb243abd894537e1156f9d5091e7711093275ba1b7a014f0936aa058
Unl0ck Team Security Advisory - qwik-smtpd is susceptible to a format string vulnerability.
418658e48947300661cbd1ad921e3dc07c0dad1325ddccede292af4e45bf9c27