LOW · 3.9

CVE-2025-44657

In Linksys EA6350 V2.1.2, the chroot_local_user option is enabled in the dynamically generated vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, ...

Vulnerability Description

In Linksys EA6350 V2.1.2, the chroot_local_user option is enabled in the dynamically generated vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for internal network attacks.

CVSS Score

3.9

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE

Affected Products

VendorProductVersions
LinksysEa6350 Firmware2.1.2
LinksysEa6350-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2025-44657?

CVE-2025-44657 is a vulnerability with a CVSS score of 3.9 (LOW). In Linksys EA6350 V2.1.2, the chroot_local_user option is enabled in the dynamically generated vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, ...

How severe is CVE-2025-44657?

CVE-2025-44657 has been rated LOW with a CVSS base score of 3.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2025-44657?

Check the references section above for vendor advisories and patch information. Affected products include: Linksys Ea6350 Firmware, Linksys Ea6350.