Home

Description

Ilevia EVE X1/X5 Server version ≤ 4.7.18.0.eden contains a vulnerability in its authentication mechanism. Unsanitized input is passed to a system() call for authentication, allowing attackers to inject special characters and manipulate command parsing. Due to the binary's interpretation of non-zero exit codes as successful authentication, remote attackers can bypass authentication and gain full access to the system.

PUBLISHED Reserved 2025-04-15 | Published 2025-09-16 | Updated 2025-09-16 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-287 Improper Authentication

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

* (custom)
affected

Credits

Gjoko Krstic of Zero Science Lab finder

References

www.ilevia.com/ product

www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5958.php technical-description exploit

packetstorm.news/files/id/208871/ exploit

www.vulncheck.com/...ies/ilevia-eve-x1-x5-server-auth-bypass third-party-advisory

cve.org (CVE-2025-34186)

nvd.nist.gov (CVE-2025-34186)

Download JSON