CVE-2025-10639 - Usage of Hardcoded FTP Credentials EfficientLab WorkExaminer Professional
CVE ID : CVE-2025-10639
Published : Oct. 21, 2025, 12:15 p.m. | 3 hours, 17 minutes ago
Description : The WorkExaminer Professional server installation comes with an FTP server that is used to receive the client logs on TCP port 12304. An attacker with network access to this port can use weak hardcoded credentials to login to the FTP server and modify or read data, log files and gain remote code execution as NT Authority\SYSTEM on the server by exchanging accessible service binaries in the WorkExaminer installation directory (e.g. "C:\Program File (x86)\Work Examiner Professional Server").
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Published : Oct. 21, 2025, 12:15 p.m. | 3 hours, 17 minutes ago
Description : The WorkExaminer Professional server installation comes with an FTP server that is used to receive the client logs on TCP port 12304. An attacker with network access to this port can use weak hardcoded credentials to login to the FTP server and modify or read data, log files and gain remote code execution as NT Authority\SYSTEM on the server by exchanging accessible service binaries in the WorkExaminer installation directory (e.g. "C:\Program File (x86)\Work Examiner Professional Server").
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...