An issue in H3C M102G HM1A0V200R010 wireless controller and BA1500L SWBA1A0V100R006 wireless access point, there is a misconfiguration vulnerability a...
Description
An issue in H3C M102G HM1A0V200R010 wireless controller and BA1500L SWBA1A0V100R006 wireless access point, there is a misconfiguration vulnerability about vsftpd. Through this vulnerability, all files uploaded anonymously via the FTP protocol is automatically owned by the root user and remote attackers could gain root-level control over the devices.
AI Analyst Comment
Remediation
Update An issue in Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical misconfiguration vulnerability has been identified in specific H3C wireless controllers and access points. This flaw allows an unauthenticated, remote attacker to upload files via anonymous FTP, which are then incorrectly owned by the root user, enabling the attacker to gain complete administrative control over the affected devices and the network segments they manage.
Vulnerability Details
CVE-ID: CVE-2025-60262
Affected Software: H3C M102G Wireless Controller, H3C BA1500L Wireless Access Point
Affected Versions:
Vulnerability:
The vulnerability exists due to a misconfiguration in the vsftpd (Very Secure FTP Daemon) service running on the affected devices. The service is configured to allow anonymous FTP access, and any files uploaded through this anonymous session are incorrectly assigned ownership to the 'root' user instead of a non-privileged user. An unauthenticated remote attacker with network access to the FTP port (TCP/21) can exploit this by uploading a malicious file, such as a script or a system configuration file (e.g., a cron job), to a predictable location. When the device's operating system executes this file, it does so with root privileges, leading to arbitrary code execution and a full system compromise.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation grants an attacker complete, root-level control over the affected network infrastructure devices. This can lead to severe consequences, including interception and manipulation of all network traffic passing through the device, unauthorized access to sensitive internal networks, deployment of ransomware or other malware, and complete disruption of wireless network services. The compromise of these core network devices poses a significant risk to data confidentiality, integrity, and availability for the entire organization.
Remediation Plan
Immediate Action:
Organizations must immediately apply the security patches provided by the vendor. Update the firmware of all affected H3C M102G and BA1500L devices to the latest recommended version to correct the vsftpd misconfiguration. After patching, it is crucial to monitor for any signs of post-patch exploitation attempts and review historical access logs for indicators of compromise.
Proactive Monitoring:
STORcommands)./etc/cron.d/).Compensating Controls:
If immediate patching is not feasible, implement the following controls to mitigate risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes:
As of the publication date of Jan 6, 2026, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the simplicity of exploitation and the high impact, it is highly likely that proof-of-concept exploits will be developed and released by security researchers or threat actors in the near future. This vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the potential for a complete and unauthenticated remote takeover of core network devices, this vulnerability represents an immediate and severe threat. We strongly recommend that organizations prioritize the patching of all affected H3C devices without delay. While there is no current evidence of active exploitation, the low complexity of the attack means that this status could change rapidly. If patching cannot be performed immediately, the compensating controls of restricting network access to the FTP service must be implemented as an urgent priority.