CVE-2025-44654
BaseFortify
Publication date: 2025-07-21
Last updated on: 2025-07-22
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| vsftpd | vsftpd | * |
| linksys | e2500 | 3.0.04.002 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linksys E2500 router firmware version 3.0.04.002 due to the vsftpd configuration setting `chroot_local_user=YES`. While this setting is intended to restrict local users to their home directories by placing them in a chroot jail after login, it can be misconfigured or bypassed. This misconfiguration can allow attackers to gain unauthorized access to system files, escalate their privileges, or use the compromised server as a pivot point to launch further attacks within the internal network. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to unauthorized access to sensitive system files, privilege escalation allowing attackers to gain higher-level control, and the use of the compromised router as a pivot point to attack other devices within the internal network. This can result in broader network compromise and potential data breaches. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking the vsftpd configuration file on the Linksys E2500 router for the setting `chroot_local_user=YES`. For example, use the command `cat /etc/vsftpd.conf | grep chroot_local_user` to verify if this option is enabled. Additionally, monitoring FTP login activity and checking for unusual privilege escalations or unauthorized file access attempts may help identify exploitation attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately change the `chroot_local_user` setting in the vsftpd configuration file from `YES` to `NO` in `/etc/vsftpd.conf`. This will prevent local users from escaping the chroot jail and reduce the risk of unauthorized access and privilege escalation. After making the change, restart the vsftpd service to apply the new configuration. [1]