CVE-2025-60262
H3C · H3C M102G Wireless Controller, H3C BA1500L Wireless Access Point
A critical misconfiguration vulnerability has been identified in specific H3C wireless controllers and access points.
Executive summary
A critical misconfiguration vulnerability has been identified in specific H3C wireless controllers and access points. This flaw allows an unauthenticated, remote attacker to upload files via anonymous FTP, which are then incorrectly owned by the root user, enabling the attacker to gain complete administrative control over the affected devices and the network segments they manage.
Vulnerability
The vulnerability exists due to a misconfiguration in the vsftpd (Very Secure FTP Daemon) service running on the affected devices. The service is configured to allow anonymous FTP access, and any files uploaded through this anonymous session are incorrectly assigned ownership to the 'root' user instead of a non-privileged user. An unauthenticated remote attacker with network access to the FTP port (TCP/21) can exploit this by uploading a malicious file, such as a script or a system configuration file (e.g., a cron job), to a predictable location. When the device's operating system executes this file, it does so with root privileges, leading to arbitrary code execution and a full system compromise.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation grants an attacker complete, root-level control over the affected network infrastructure devices. This can lead to severe consequences, including interception and manipulation of all network traffic passing through the device, unauthorized access to sensitive internal networks, deployment of ransomware or other malware, and complete disruption of wireless network services. The compromise of these core network devices poses a significant risk to data confidentiality, integrity, and availability for the entire organization.
Remediation
Immediate Action: Organizations must immediately apply the security patches provided by the vendor. Update the firmware of all affected H3C M102G and BA1500L devices to the latest recommended version to correct the vsftpd misconfiguration. After patching, it is crucial to monitor for any signs of post-patch exploitation attempts and review historical access logs for indicators of compromise.
Proactive Monitoring:
- Monitor network traffic for anomalous or unauthorized FTP connections (TCP port 21) to the affected devices, particularly from external IP addresses.
- Review FTP server logs for anonymous login events and file upload activities (
STORcommands). - Implement file integrity monitoring on the devices to detect unexpected changes to system files, binaries, or scheduled task directories (e.g.,
/etc/cron.d/). - Monitor for unusual outbound connections originating from the network devices, which could indicate a successful compromise.
Compensating Controls: If immediate patching is not feasible, implement the following controls to mitigate risk:
- Use a network firewall or Access Control Lists (ACLs) on an upstream device to block all access to the FTP service (TCP port 21) from untrusted networks, especially the internet.
- If anonymous FTP is not required for business operations, disable the service entirely on the devices.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical CVSS score of 9.8 and the potential for a complete and unauthenticated remote takeover of core network devices, this vulnerability represents an immediate and severe threat. We strongly recommend that organizations prioritize the patching of all affected H3C devices without delay. While there is no current evidence of active exploitation, the low complexity of the attack means that this status could change rapidly. If patching cannot be performed immediately, the compensating controls of restricting network access to the FTP service must be implemented as an urgent priority.