Vulnerability Description
MiCode FileExplorer contains an authentication bypass vulnerability in the embedded SwiFTP FTP server component that allows network attackers to log in without valid credentials. Attackers can send arbitrary username and password combinations to the PASS command handler, which unconditionally grants access and allows listing, reading, writing, and deleting files exposed by the FTP server. The MiCode/Explorer open source project has reached end-of-life status.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xiaomi | Fileexplorer | - |
Related Weaknesses (CWE)
References
- https://github.com/MiCode/FileExplorerProduct
- https://www.vulncheck.com/advisories/micode-fileexplorer-swiftp-server-authenticThird Party AdvisoryVDB Entry
FAQ
What is CVE-2026-29515?
CVE-2026-29515 is a vulnerability with a CVSS score of 9.8 (CRITICAL). MiCode FileExplorer contains an authentication bypass vulnerability in the embedded SwiFTP FTP server component that allows network attackers to log in without valid credentials. Attackers can send ar...
How severe is CVE-2026-29515?
CVE-2026-29515 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-29515?
Check the references section above for vendor advisories and patch information. Affected products include: Xiaomi Fileexplorer.