Cyber Posture

CVE-2025-34513

CriticalPublic PoC

Published: 16 October 2025

Published
16 October 2025
Modified
23 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1471 94.5th percentile
Risk Priority 28 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2025-34513 is an OS command injection vulnerability (CWE-78) affecting Ilevia EVE X1 Server firmware versions up to and including 4.7.18.0.eden. The flaw resides in the mbus_build_from_csv.php component, enabling an unauthenticated attacker to execute arbitrary operating system commands. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and potential for complete system compromise.

An unauthenticated remote attacker can exploit this vulnerability over the network by sending a specially crafted request to the vulnerable endpoint, achieving arbitrary code execution on the underlying server. Successful exploitation grants high confidentiality, integrity, and availability impacts, potentially allowing full control over the affected device, including data exfiltration, persistence, or further lateral movement within the target environment.

Advisories from VulnCheck and Zero Science Labs detail the issue, while Ilevia has explicitly declined to provide a patch or further servicing. The vendor recommends that customers avoid exposing port 8080 to the internet as the primary mitigation, emphasizing network segmentation and access controls to prevent exploitation.

Details

CWE(s)
CWE-78

Affected Products

ilevia
eve x1 server firmware
≤ 4.7.18.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Unauthenticated OS command injection in a network-accessible PHP endpoint (port 8080) enables exploitation of a public-facing application (T1190) for arbitrary Unix shell command execution (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References