// For flags

CVE-2011-2523

vsftpd 2.3.4 - Backdoor Command Execution

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

32
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.

vsftpd versión 2.3.4 descargado entre 20110630 y 20110703, contiene una puerta trasera (backdoor) que abre un shell en el puerto 6200/tcp.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-06-15 CVE Reserved
  • 2019-11-27 CVE Published
  • 2021-04-12 First Exploit
  • 2024-08-06 CVE Updated
  • 2025-07-16 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (37)
URL Date SRC
https://packetstorm.news/files/id/162145 2021-04-12
https://www.exploit-db.com/exploits/49757 2021-07-16
https://www.exploit-db.com/exploits/17491 2021-04-12
https://github.com/padsalatushal/CVE-2011-2523 2023-01-08
https://github.com/Lynk4/CVE-2011-2523 2023-05-09
https://github.com/cowsecurity/CVE-2011-2523 2023-02-05
https://github.com/4m3rr0r/CVE-2011-2523-poc 2023-11-28
https://github.com/nobodyatall648/CVE-2011-2523 2021-06-25
https://github.com/MFernstrom/OffensivePascal-CVE-2011-2523 2022-05-28
https://github.com/0xSojalSec/-CVE-2011-2523 2022-06-09
https://github.com/0xSojalSec/CVE-2011-2523 2022-06-09
https://github.com/Gr4ykt/CVE-2011-2523 2021-08-31
https://github.com/vaishnavucv/CVE-2011-2523 2023-10-16
https://github.com/XiangSi-Howard/CTF---CVE-2011-2523 2022-12-04
https://github.com/Shubham-2k1/Exploit-CVE-2011-2523 2024-03-05
https://github.com/HerculesRD/vsftpd2.3.4PyExploit 2021-04-12
https://github.com/chleba124/vsftpd-exploit 2024-03-02
https://github.com/Tenor-Z/SmileySploit 2024-04-23
https://github.com/0xB0y426/CVE-2011-2523-PoC 2024-09-15
https://github.com/sug4r-wr41th/CVE-2011-2523 2024-11-22
https://github.com/AnugiArrawwala/CVE-Research 2024-07-03
https://github.com/Gill-Singh-A/vsFTP-2.3.4-Remote-Root-Shell-Exploit 2024-11-20
https://github.com/everythingBlackkk/vsFTPd-Backdoor-Exploit-CVE-2011-2523- 2024-09-15
https://github.com/NullBrunk/CVE-2011-2523 2024-12-26
https://github.com/Lychi3/vsftpd-backdoor 2025-02-20
https://github.com/vedpakhare/vsftpd-234-vuln-report 2025-04-05
https://github.com/madanokr001/CVE-2011-2523 2025-04-06
https://github.com/JohanMV/explotacion-vsftpd-nmap_Laboratorio_1 2025-04-14
https://github.com/lghost256/vsftpd234-exploit 2025-06-19
https://github.com/hklabCR/CVE-2011-2523 2025-07-06
https://github.com/krill-x7/CVE-2011-2523 2025-07-12
https://packetstormsecurity.com/files/102745/VSFTPD-2.3.4-Backdoor-Command-Execution.html 2024-08-06
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Vsftpd Project
Search vendor "Vsftpd Project"
Vsftpd
Search vendor "Vsftpd Project" for product "Vsftpd"
2.3.4
Search vendor "Vsftpd Project" for product "Vsftpd" and version "2.3.4"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
8.0
Search vendor "Debian" for product "Debian Linux" and version "8.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected