Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-22098 | In Linksys EA6350 V2.1.2, the chroot_local_user option is enabled in the dynamically generated vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for internal network attacks. |
Thu, 07 Aug 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linksys
Linksys ea6350 Linksys ea6350 Firmware |
|
| CPEs | cpe:2.3:h:linksys:ea6350:-:*:*:*:*:*:*:* cpe:2.3:o:linksys:ea6350_firmware:2.1.2:*:*:*:*:*:*:* |
|
| Vendors & Products |
Linksys
Linksys ea6350 Linksys ea6350 Firmware |
Tue, 22 Jul 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Mon, 21 Jul 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Linksys EA6350 V2.1.2, the chroot_local_user option is enabled in the dynamically generated vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for internal network attacks. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-07-22T15:37:55.816Z
Reserved: 2025-04-22T00:00:00.000Z
Link: CVE-2025-44657
Updated: 2025-07-22T15:37:49.621Z
Status : Analyzed
Published: 2025-07-21T16:15:29.443
Modified: 2025-08-07T17:58:03.430
Link: CVE-2025-44657
No data.
OpenCVE Enrichment
No data.
EUVD