CVE-2025-44650
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-21

Last updated on: 2025-08-07

Assigner: MITRE

Description
In Netgear R7000 V1.3.1.64_10.1.36 and EAX80 V1.0.1.70_1.0.2, the USERLIMIT_GLOBAL option is set to 0 in the bftpd.conf configuration file. This can cause DoS attacks when unlimited users are connected.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-21
Last Modified
2025-08-07
Generated
2026-05-07
AI Q&A
2025-07-21
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
netgear r7000_firmware 1.3.1.64_10.1.36
netgear r7000 *
netgear eax80_firmware 1.0.1.70_1.0.2
netgear eax80 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-44650 is a vulnerability in Netgear devices (R7000 and EAX80) caused by a misconfiguration in the bftpd.conf file where the USERLIMIT_GLOBAL option is set to 0. This setting allows unlimited simultaneous user logins, which can be exploited to perform denial-of-service (DoS) attacks by overwhelming the server with too many connections. [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to connect an unlimited number of users simultaneously to the affected Netgear devices, potentially causing denial-of-service (DoS) attacks. This can disrupt normal device operation and network availability. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking the bftpd.conf configuration file on your Netgear R7000 or EAX80 device to see if the USERLIMIT_GLOBAL option is set to 0. For example, use commands to access the device's file system and view the configuration file, such as: `cat /etc/bftpd.conf | grep USERLIMIT_GLOBAL`. If the output shows USERLIMIT_GLOBAL=0, the device is vulnerable. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately change the USERLIMIT_GLOBAL setting in the bftpd.conf file from 0 to a reasonable limit between 5 and 20 simultaneous user connections. This will prevent unlimited concurrent connections and reduce the risk of denial-of-service attacks. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart