Ilevia EVE X1 Server version ≤ 4.7.18.0.eden contains an unauthenticated OS command injection vulnerability in the /ajax/php/login.php script. Remote attackers can execute arbitrary system commands by injecting payloads into the 'passwd' HTTP POST parameter, leading to full system compromise or denial of service.
References
| Link | Resource |
|---|---|
| https://packetstorm.news/files/id/207717/ | Exploit Third Party Advisory |
| https://www.ilevia.com/ | Product |
| https://www.vulncheck.com/advisories/ilevia-eve-x1-server-neuro-code-unauth-code-injection | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5956.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5956.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-09-16 20:15
Updated : 2025-09-25 14:56
NVD link : CVE-2025-34184
Mitre link : CVE-2025-34184
CVE.ORG link : CVE-2025-34184
JSON object : View
Products Affected
ilevia
- eve_x1_server_firmware
- eve_x1_server
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
