CVE-2025-60262
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
An issue in H3C M102G HM1A0V200R010 wireless controller and BA1500L SWBA1A0V100R006 wireless access point, there is a misconfiguration vulnerability about vsftpd. Through this vulnerability, all files uploaded anonymously via the FTP protocol is automatically owned by the root user and remote attackers could gain root-level control over the devices.
Analysis
H3C wireless controllers (M102G) and access points (BA1500L) have a vsftpd misconfiguration that grants root ownership to anonymously uploaded FTP files. Attackers can upload malicious files that execute with root privileges, gaining full device control.
Technical Context
The vsftpd FTP server is misconfigured (CWE-276) to run as root and assign root ownership to anonymously uploaded files. On embedded Linux networking devices, uploading a cron job, startup script, or replacing a system binary with root ownership achieves persistent remote code execution.
Affected Products
H3C M102G HM1A0V200R010 wireless controller, H3C BA1500L SWBA1A0V100R006 wireless access point
Remediation
Disable anonymous FTP access. Configure vsftpd to run as a non-root user. Apply vendor firmware updates when available.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today