CVE-2025-34513
BaseFortify
Publication date: 2025-10-16
Last updated on: 2025-10-23
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ilevia | eve_x1_server_firmware | to 4.7.18.0 (inc) |
| ilevia | eve_x1_server | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an OS command injection in the Ilevia EVE X1 Server firmware versions up to 4.7.18.0.eden, specifically in the mbus_build_from_csv.php file. It allows an unauthenticated attacker to execute arbitrary code on the server.
How can this vulnerability impact me? :
An attacker can exploit this vulnerability to execute arbitrary code on the affected server without authentication, potentially leading to full system compromise, data theft, or disruption of services.
What immediate steps should I take to mitigate this vulnerability?
Ilevia recommends that customers do not expose port 8080 to the internet as an immediate mitigation step.