A critical vulnerability, CVE-2025-54309, has been identified in CrushFTP server, impacting versions prior to 10.8.5 and 11.3.4_23. This vulnerability exists when the DMZ proxy feature is not in use. It stems from improper validation in the AS2 (Applicability Statement 2) protocol over HTTPS, allowing unauthenticated remote attackers to gain administrative access to the system. The IONIX research team recommends immediate patching to versions 10.8.5_12 or 11.3.4_26, which contain the vendor-provided fix. Public exploitation activity has been confirmed, and CrushFTP instances exposed to the internet are considered high-risk targets. Potentially exposed assets are outlined in this post.
References:

