Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-44657
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-21 Jul, 2025 | 16:15
Updated At-07 Aug, 2025 | 17:58

In Linksys EA6350 V2.1.2, the chroot_local_user option is enabled in the dynamically generated vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for internal network attacks.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.13.9LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CPE Matches

Linksys Holdings, Inc.
linksys
>>ea6350_firmware>>2.1.2
cpe:2.3:o:linksys:ea6350_firmware:2.1.2:*:*:*:*:*:*:*
Linksys Holdings, Inc.
linksys
>>ea6350>>-
cpe:2.3:h:linksys:ea6350:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-284Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://ea6350.comcve@mitre.org
Broken Link
https://gist.github.com/TPCchecker/7839fbd329ebd2f9f6b105c4926d4b0ccve@mitre.org
Broken Link
Change History
0Changes found

Details not found