CVE-2025-44657
BaseFortify
Publication date: 2025-07-21
Last updated on: 2025-08-07
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linksys | ea6350_firmware | 2.1.2 |
| linksys | ea6350 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Linksys EA6350 router firmware version 2.1.2 is due to the vsftpd FTP server configuration enabling the option 'chroot_local_user=YES'. This setting places local users in a restricted directory jail after login, but if users have upload permissions or shell access, attackers can exploit this misconfiguration to gain unauthorized access to system files, escalate their privileges, or use the compromised server as a pivot point to launch attacks within the internal network. [1]
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to sensitive system files, privilege escalation allowing attackers to gain higher-level control, and the use of the compromised router as a pivot point to attack other devices within the internal network, potentially compromising the entire network's security. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking the vsftpd configuration file on the Linksys EA6350 router for the setting `chroot_local_user=YES`. For example, use the command `cat /etc/vsftpd.conf | grep chroot_local_user` to verify if this option is enabled. If it returns `chroot_local_user=YES`, the system is vulnerable. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately change the `chroot_local_user` setting in the `/etc/vsftpd.conf` file from YES to NO. This disables the chroot jail for local users, reducing the risk of unauthorized access and privilege escalation. After making the change, restart the vsftpd service to apply the new configuration. [1]