<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Wing — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/wing/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 21:16:48 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/wing/feed.xml" rel="self" type="application/rss+xml"/><item><title>Wing FTP Server 8.1.2 Authenticated Remote Code Execution via Session Serialization (CVE-2026-44403)</title><link>https://feed.craftedsignal.io/briefs/2026-05-wing-ftp-rce/</link><pubDate>Tue, 12 May 2026 21:16:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wing-ftp-rce/</guid><description>Wing FTP Server 8.1.2 contains an authenticated remote code execution vulnerability (CVE-2026-44403) in the session serialization mechanism, allowing administrators to inject arbitrary Lua code and achieve remote code execution.</description><content:encoded><![CDATA[<p>Wing FTP Server 8.1.2 is vulnerable to authenticated remote code execution (CVE-2026-44403) due to unsafe session serialization. An authenticated administrator can inject arbitrary Lua code through the <code>mydirectory</code> field within the domain admin settings. This vulnerability stems from the server&rsquo;s failure to properly escape closing delimiters when serializing session values into Lua source code. Successful exploitation allows attackers to execute arbitrary code on the server when the poisoned session is loaded using the <code>loadfile()</code> function. This is a high-severity vulnerability as it allows for complete compromise of the affected server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the Wing FTP Server as an administrator.</li>
<li>The attacker navigates to the domain admin settings.</li>
<li>The attacker modifies the <code>mydirectory</code> field with a malicious Lua payload containing code injection.</li>
<li>The server serializes the session data, including the injected Lua code, into a session file without proper sanitization.</li>
<li>The server saves the modified session data.</li>
<li>The server loads the session file, using the <code>loadfile()</code> function to interpret the session data as Lua code.</li>
<li>The injected Lua code is executed due to the insecure deserialization process.</li>
<li>The attacker achieves remote code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-44403) grants the attacker the ability to execute arbitrary code on the Wing FTP Server. This can lead to complete compromise of the server, including data theft, modification, or destruction. Given that FTP servers are often used to store sensitive data, this vulnerability poses a significant risk to data confidentiality and integrity. There is no information about the number of victims, but any organization using Wing FTP Server 8.1.2 with admin accounts exposed is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Wing FTP Server that addresses CVE-2026-44403.</li>
<li>Deploy the Sigma rule <code>Detect Wing FTP Server CVE-2026-44403 RCE Attempt</code> to detect attempts to exploit this vulnerability.</li>
<li>Monitor Wing FTP Server logs for suspicious activity related to session management and Lua code execution using the <code>Detect Wing FTP Server Suspicious Lua Load</code> rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>rce</category><category>code-injection</category></item></channel></rss>