CVE-2025-66003
External Control of File Path in smb4k Enables Local Root Exploit
Publication date: 2026-01-08
Last updated on: 2026-01-08
Assigner: SUSE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| unknown_vendor | smb4k | From 4.0.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-73 | The product allows user input to control or influence paths or file names that are used in filesystem operations. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an External Control of File Name or Path issue in smb4k. It allows local users to perform a local root exploit via the smb4k mounthelper if they can access and control the contents of a Samba share. Essentially, if an attacker has access to a Samba share, they can manipulate file paths or names to escalate their privileges to root on the local system.
How can this vulnerability impact me? :
This vulnerability can allow a local user with access to a Samba share to escalate their privileges to root on the affected system. This means an attacker could gain full control over the system, potentially leading to unauthorized access, data modification, or disruption of services.