WFTPD version 3.25 leaves credentials accessible in wftpd.ini.
84b7e59e7c79b2e7f54fe4511e8ee6e1626462eecb05c8c986d66ac424e88a4a
# Exploit Title: WFTPD 3.25 - Unprotected Credential Storage
# Date: 04/01/2023
# Exploit Author: golem445
# Vendor Homepage: https://www.texis.com/
# Tested on: Windows 10
# CVE: CVE-2023-33263#
#Description:
Usernames and hashes are stored in an openly viewable wftpd.ini configuration file within the host WFTPD directory