In Linksys EA6350 V2.1.2, the chroot_local_user option is enabled in the dynamically generated vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for internal network attacks.
Metrics
Affected Vendors & Products
References
History
Thu, 07 Aug 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linksys
Linksys ea6350 Linksys ea6350 Firmware |
|
CPEs | cpe:2.3:h:linksys:ea6350:-:*:*:*:*:*:*:* cpe:2.3:o:linksys:ea6350_firmware:2.1.2:*:*:*:*:*:*:* |
|
Vendors & Products |
Linksys
Linksys ea6350 Linksys ea6350 Firmware |
Tue, 22 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-284 | |
Metrics |
cvssV3_1
|
Mon, 21 Jul 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Linksys EA6350 V2.1.2, the chroot_local_user option is enabled in the dynamically generated vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for internal network attacks. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-07-21T00:00:00.000Z
Updated: 2025-07-22T15:37:55.816Z
Reserved: 2025-04-22T00:00:00.000Z
Link: CVE-2025-44657

Updated: 2025-07-22T15:37:49.621Z

Status : Analyzed
Published: 2025-07-21T16:15:29.443
Modified: 2025-08-07T17:58:03.430
Link: CVE-2025-44657

No data.