← Back to CVEs
CVE-2025-34035
CRITICAL9.8
Description
An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise. Exploitation evidence was observed by the Shadowserver Foundation on 2024-12-05 UTC.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published6/24/2025
Last Modified11/20/2025
Sourcenvd
Honeypot Sightings0
Affected Products
engeniustech:epg5000engeniustech:epg5000_firmwareengeniustech:esr1200engeniustech:esr1200_firmwareengeniustech:esr1750engeniustech:esr1750_firmwareengeniustech:esr300engeniustech:esr300_firmwareengeniustech:esr350engeniustech:esr350_firmwareengeniustech:esr600engeniustech:esr600_firmwareengeniustech:esr900engeniustech:esr900_firmware
Weaknesses (CWE)
CWE-78CWE-78
References
https://cxsecurity.com/issue/WLB-2017060050(disclosure@vulncheck.com)
https://packetstormsecurity.com/files/142792(disclosure@vulncheck.com)
https://vulncheck.com/advisories/engenius-enshare-iot-gigabit-cloud-service(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/42114(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.