Home

Description

Ilevia EVE X1/X5 Server version ≤ 4.7.18.0.eden contains a misconfiguration in the sudoers file that allows passwordless execution of certain Bash scripts. If these scripts are writable by web-facing users or accessible via command injection, attackers can replace them with malicious payloads. Execution with sudo grants full root access, resulting in remote privilege escalation and potential system compromise.

PUBLISHED Reserved 2025-04-15 | Published 2025-09-16 | Updated 2025-09-16 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-269 Improper Privilege Management

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

* (custom)
affected

Credits

Gjoko Krstic of Zero Science Lab finder

References

www.ilevia.com/ product

www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5959.php technical-description exploit

packetstorm.news/files/id/209226/ exploit

www.vulncheck.com/...evia-eve-x1-x5-server-reverse-rootshell third-party-advisory

cve.org (CVE-2025-34187)

nvd.nist.gov (CVE-2025-34187)

Download JSON