CVE-2025-44651

7.5 HIGH

📋 TL;DR

This vulnerability in TRENDnet TPL-430AP access points allows denial-of-service attacks when the USERLIMIT_GLOBAL option is set to 0 in bftpd configuration, enabling unlimited user connections that can exhaust system resources. It affects organizations using TRENDnet TPL-430AP access points with firmware version 1.0.

💻 Affected Systems

Products:
  • TRENDnet TPL-430AP
Versions: FW1.0
Operating Systems: Embedded Linux (bftpd)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration where USERLIMIT_GLOBAL=0 in bftpd-related configuration files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of the access point, making wireless networks unavailable for all connected users and devices.

🟠

Likely Case

Intermittent service degradation or temporary unavailability of the wireless network as connection limits are exhausted.

🟢

If Mitigated

Minimal impact with proper connection limiting and monitoring in place.

🌐 Internet-Facing: HIGH - Access points are typically internet-facing and can be targeted by external attackers to disrupt network services.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this to disrupt local network services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only establishing multiple connections to exhaust resources, no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: http://trendnet.com

Restart Required: Yes

Instructions:

1. Check TRENDnet website for firmware updates. 2. Download latest firmware. 3. Upload to device via web interface. 4. Apply update and restart device.

🔧 Temporary Workarounds

Configure Connection Limits

linux

Manually set USERLIMIT_GLOBAL to a reasonable value in bftpd configuration to prevent unlimited connections.

Edit bftpd configuration file and set USERLIMIT_GLOBAL=50 (or appropriate limit)

Disable Unused Services

linux

Disable bftpd service if not required for device functionality.

Find and stop bftpd service: systemctl stop bftpd
Disable from startup: systemctl disable bftpd

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable devices from untrusted networks.
  • Deploy rate limiting or connection throttling at network perimeter to prevent connection exhaustion attacks.

🔍 How to Verify

Check if Vulnerable:

Check bftpd configuration file for USERLIMIT_GLOBAL=0 setting. Use command: grep USERLIMIT_GLOBAL /etc/bftpd.conf

Check Version:

Check web interface or use command: cat /etc/version

Verify Fix Applied:

Verify USERLIMIT_GLOBAL is set to a non-zero value in configuration and bftpd service respects the limit.

📡 Detection & Monitoring

Log Indicators:

  • High number of connection attempts in bftpd logs
  • Connection limit warnings or errors
  • Unusual spike in authentication attempts

Network Indicators:

  • Abnormal number of connections to port 21 (FTP)
  • Multiple connection attempts from single IPs
  • Network performance degradation

SIEM Query:

source="bftpd" AND ("connection limit" OR "max connections" OR "USERLIMIT")

🔗 References

📤 Share & Export