An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise. Exploitation evidence was observed by the Shadowserver Foundation on 2024-12-05 UTC.
References
| Link | Resource |
|---|---|
| https://cxsecurity.com/issue/WLB-2017060050 | Exploit Third Party Advisory |
| https://packetstormsecurity.com/files/142792 | Broken Link |
| https://vulncheck.com/advisories/engenius-enshare-iot-gigabit-cloud-service | Third Party Advisory |
| https://www.exploit-db.com/exploits/42114 | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
| AND |
|
History
20 Nov 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise. Exploitation evidence was observed by the Shadowserver Foundation on 2024-12-05 UTC. |
17 Nov 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise. Exploitation evidence was observed by the Shadowserver Foundation on 2025-08-27 UTC. | |
| CWE |
Information
Published : 2025-06-24 01:15
Updated : 2025-11-20 22:15
NVD link : CVE-2025-34035
Mitre link : CVE-2025-34035
CVE.ORG link : CVE-2025-34035
JSON object : View
Products Affected
engeniustech
- esr300
- esr900
- esr1750_firmware
- esr1750
- esr300_firmware
- esr900_firmware
- epg5000
- esr350
- esr350_firmware
- esr1200_firmware
- epg5000_firmware
- esr1200
- esr600
- esr600_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
