CVE-2025-10374
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-13

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in Shenzhen Sixun Business Management System 7/11. This affects an unknown part of the file /Adm/OperatorStop. Performing manipulation results in improper authorization. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-13
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-09-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
shenzhen_sixun business_management_system 7.11
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an improper authorization flaw in the Shenzhen Sixun Business Management System 7/11, specifically in the /Adm/OperatorStop file. It allows an attacker to bypass authorization checks and perform actions without proper permissions, such as forcibly disconnecting devices and accessing sensitive information. The flaw is due to incorrect or missing authorization controls in the system's business logic and can be exploited remotely without authentication. [1, 2]


How can this vulnerability impact me? :

The vulnerability can impact you by compromising the confidentiality, integrity, and availability of the affected system. An attacker can remotely disconnect devices connected to the system and gain unauthorized access to sensitive information, potentially disrupting business operations and exposing critical data. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unauthorized or unexpected requests to the /Adm/OperatorStop endpoint, especially those that attempt to manipulate operator or device management functions without proper authorization. Since the exploit is publicly available and can be executed remotely without authentication, network traffic analysis tools or web application firewalls (WAF) can be used to detect suspicious access patterns to this endpoint. Specific commands are not provided in the resources, but using tools like curl or wget to test access to /Adm/OperatorStop without authentication could help identify vulnerable systems. Additionally, reviewing logs for unusual disconnection commands or unauthorized access attempts to administrative functions is recommended. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying restrictive firewall rules to block unauthorized remote access to the /Adm/OperatorStop endpoint and other administrative interfaces. Ensuring proper authorization checks are enforced in the application is critical. Since the vulnerability allows remote exploitation without authentication, limiting network exposure of the affected system and monitoring for exploit attempts is advised. Applying any available patches or updates from Shenzhen Sixun Software Co., Ltd. should also be prioritized. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart