{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-15T09:27:36.815","vulnerabilities":[{"cve":{"id":"CVE-2025-44655","sourceIdentifier":"cve@mitre.org","published":"2025-07-21T16:15:29.323","lastModified":"2025-08-07T17:58:19.833","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In TOTOLink A7100RU V7.4, A950RG V5.9, and T10 V5.9, the chroot_local_user option is enabled in the vsftpd.conf. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for internal network attacks."},{"lang":"es","value":"En TOTOLink A7100RU V7.4, A950RG V5.9 y T10 V5.9, la opción chroot_local_user está habilitada en vsftpd.conf. Esto podría provocar acceso no autorizado a archivos del sistema, escalada de privilegios o el uso del servidor comprometido como punto de apoyo para ataques internos a la red."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-266"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:totolink:a7100ru_firmware:7.4:*:*:*:*:*:*:*","matchCriteriaId":"7EAA698D-CF40-4B76-A8FC-EA2EBCA47C32"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:totolink:a7100ru:-:*:*:*:*:*:*:*","matchCriteriaId":"B7DD0831-0EB3-4F09-B4E4-6165E53AB6A6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:totolink:a950rg_firmware:5.9:*:*:*:*:*:*:*","matchCriteriaId":"75C1B359-F1B1-4B97-9E97-F6391AE19623"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:totolink:a950rg:-:*:*:*:*:*:*:*","matchCriteriaId":"2F20C691-11F3-4882-89C7-500C097C0938"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:totolink:t10_firmware:5.9:*:*:*:*:*:*:*","matchCriteriaId":"F70A4ECC-440B-44B8-AE4E-57A691F7FF54"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*","matchCriteriaId":"1C410805-E3D4-4F8C-8DF4-013ACE3937FA"}]}]}],"references":[{"url":"http://totolink.com","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"https://gist.github.com/TPCchecker/d7306649f51ca25e22dd6532546a58f3","source":"cve@mitre.org","tags":["Broken Link"]}]}}]}