Home

Description

Dongsheng Logistics Software exposes an unauthenticated endpoint at /CommMng/Print/UploadMailFile that fails to enforce proper file type validation and access control. An attacker can upload arbitrary files, including executable scripts such as .ashx, via a crafted multipart/form-data POST request. This allows remote code execution on the server, potentially leading to full system compromise. The vulnerability is presumed to affect builds released prior to July 2025 and is said to be remediated in newer versions of the product, though the exact affected range remains undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-07-23 UTC.

PUBLISHED Reserved 2025-04-15 | Published 2025-08-27 | Updated 2025-08-28 | Assigner VulnCheck




CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

Product status

Default status
unknown

*
affected

Credits

Qian'an Security finder

References

cn-sec.com/archives/4243708.html technical-description exploit

www.dongshengsoft.com/ product patch

www.vulncheck.com/...s-software-unauth-arbitrary-file-upload third-party-advisory

cve.org (CVE-2025-34163)

nvd.nist.gov (CVE-2025-34163)

Download JSON