CVE-2025-44657
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-21

Last updated on: 2025-08-07

Assigner: MITRE

Description
In Linksys EA6350 V2.1.2, the chroot_local_user option is enabled in the dynamically generated vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for internal network attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-21
Last Modified
2025-08-07
Generated
2026-05-07
AI Q&A
2025-07-21
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linksys ea6350_firmware 2.1.2
linksys ea6350 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Linksys EA6350 router firmware version 2.1.2 is due to the vsftpd FTP server configuration enabling the option 'chroot_local_user=YES'. This setting places local users in a restricted directory jail after login, but if users have upload permissions or shell access, attackers can exploit this misconfiguration to gain unauthorized access to system files, escalate their privileges, or use the compromised server as a pivot point to launch attacks within the internal network. [1]


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized access to sensitive system files, privilege escalation allowing attackers to gain higher-level control, and the use of the compromised router as a pivot point to attack other devices within the internal network, potentially compromising the entire network's security. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking the vsftpd configuration file on the Linksys EA6350 router for the setting `chroot_local_user=YES`. For example, use the command `cat /etc/vsftpd.conf | grep chroot_local_user` to verify if this option is enabled. If it returns `chroot_local_user=YES`, the system is vulnerable. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately change the `chroot_local_user` setting in the `/etc/vsftpd.conf` file from YES to NO. This disables the chroot jail for local users, reducing the risk of unauthorized access and privilege escalation. After making the change, restart the vsftpd service to apply the new configuration. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart