CVE-2025-44654
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-21

Last updated on: 2025-07-22

Assigner: MITRE

Description
In Linksys E2500 3.0.04.002, the chroot_local_user option is enabled in the vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for internal network attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-21
Last Modified
2025-07-22
Generated
2026-05-07
AI Q&A
2025-07-21
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
vsftpd vsftpd *
linksys e2500 3.0.04.002
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linksys E2500 router firmware version 3.0.04.002 due to the vsftpd configuration setting `chroot_local_user=YES`. While this setting is intended to restrict local users to their home directories by placing them in a chroot jail after login, it can be misconfigured or bypassed. This misconfiguration can allow attackers to gain unauthorized access to system files, escalate their privileges, or use the compromised server as a pivot point to launch further attacks within the internal network. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can lead to unauthorized access to sensitive system files, privilege escalation allowing attackers to gain higher-level control, and the use of the compromised router as a pivot point to attack other devices within the internal network. This can result in broader network compromise and potential data breaches. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking the vsftpd configuration file on the Linksys E2500 router for the setting `chroot_local_user=YES`. For example, use the command `cat /etc/vsftpd.conf | grep chroot_local_user` to verify if this option is enabled. Additionally, monitoring FTP login activity and checking for unusual privilege escalations or unauthorized file access attempts may help identify exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately change the `chroot_local_user` setting in the vsftpd configuration file from `YES` to `NO` in `/etc/vsftpd.conf`. This will prevent local users from escaping the chroot jail and reduce the risk of unauthorized access and privilege escalation. After making the change, restart the vsftpd service to apply the new configuration. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart