Hundreds remain vulnerable to the exploit.
More than 7,500 exposed CrushFTP instances have been detected.
According to an analysis by Censys, of the 7,524 observed, 989 exposed CrushFTP11 instances were found - which included 287 that exposed a version which is vulnerable to the exploit.
“These exposures include our observations of CrushFTP web interfaces, which is where we were able to identify versions,” the company said. “Exposed banners indicating CrushFTP on the FTP service did not reveal any versions.”
Initial detections suggested that there were around 1500 instances exposed to the ongoing intrusion. A proof-of-concept exploit was recently published for the vulnerability, tracked as CVE-2025-2825.
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.