CVE-2025-10374
BaseFortify
Publication date: 2025-09-13
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| shenzhen_sixun | business_management_system | 7.11 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an improper authorization flaw in the Shenzhen Sixun Business Management System 7/11, specifically in the /Adm/OperatorStop file. It allows an attacker to bypass authorization checks and perform actions without proper permissions, such as forcibly disconnecting devices and accessing sensitive information. The flaw is due to incorrect or missing authorization controls in the system's business logic and can be exploited remotely without authentication. [1, 2]
How can this vulnerability impact me? :
The vulnerability can impact you by compromising the confidentiality, integrity, and availability of the affected system. An attacker can remotely disconnect devices connected to the system and gain unauthorized access to sensitive information, potentially disrupting business operations and exposing critical data. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for unauthorized or unexpected requests to the /Adm/OperatorStop endpoint, especially those that attempt to manipulate operator or device management functions without proper authorization. Since the exploit is publicly available and can be executed remotely without authentication, network traffic analysis tools or web application firewalls (WAF) can be used to detect suspicious access patterns to this endpoint. Specific commands are not provided in the resources, but using tools like curl or wget to test access to /Adm/OperatorStop without authentication could help identify vulnerable systems. Additionally, reviewing logs for unusual disconnection commands or unauthorized access attempts to administrative functions is recommended. [2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying restrictive firewall rules to block unauthorized remote access to the /Adm/OperatorStop endpoint and other administrative interfaces. Ensuring proper authorization checks are enforced in the application is critical. Since the vulnerability allows remote exploitation without authentication, limiting network exposure of the affected system and monitoring for exploit attempts is advised. Applying any available patches or updates from Shenzhen Sixun Software Co., Ltd. should also be prioritized. [2]