CVE-2025-44655
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-21

Last updated on: 2025-08-07

Assigner: MITRE

Description
In TOTOLink A7100RU V7.4, A950RG V5.9, and T10 V5.9, the chroot_local_user option is enabled in the vsftpd.conf. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for internal network attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-21
Last Modified
2025-08-07
Generated
2026-05-07
AI Q&A
2025-07-21
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
totolink a7100ru_firmware 7.4
totolink a7100ru *
totolink a950rg_firmware 5.9
totolink a950rg *
totolink t10_firmware 5.9
totolink t10 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in TOTOLink devices A7100RU V7.4, A950RG V5.9, and T10 V5.9 due to the vsftpd FTP server configuration where the 'chroot_local_user' option is enabled (set to YES). While this option is intended to restrict local users to their home directories after login, enabling it without proper safeguards can lead to security risks. Specifically, it can allow unauthorized access to system files, privilege escalation, or enable attackers to use the compromised server as a pivot point to launch attacks within the internal network. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can allow attackers to gain unauthorized access to sensitive system files, escalate their privileges on the device, or use the compromised TOTOLink server as a foothold to launch further attacks within the internal network. This can lead to broader network compromise and potential data breaches. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking the vsftpd configuration file for the parameter `chroot_local_user` set to `YES`. For example, run the command: `grep chroot_local_user /etc/vsftpd.conf`. If the output shows `chroot_local_user=YES`, the system is vulnerable. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should disable the `chroot_local_user` option by setting `chroot_local_user=NO` in the /etc/vsftpd.conf file, or apply proper safeguards such as restricting upload permissions and shell access for local users. After making changes, restart the vsftpd service to apply the new configuration. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart