Skip to main content

CVE-2025-10364: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Evertz 3080ipx-10G

Critical
VulnerabilityCVE-2025-10364cvecve-2025-10364cwe-77
Published: Fri Sep 12 2025 (09/12/2025, 13:48:18 UTC)
Source: CVE Database V5
Vendor/Project: Evertz
Product: 3080ipx-10G

Description

The Evertz SDVN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product features, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, also named ‘ewb’ by Evertz. This web interface has two endpoints that are vulnerable to arbitrary command injection (CVE-2025-4009, CVE-2025-10364) and the authentication mechanism has a flaw leading to authentication bypass (CVE-2025-10365). CVE-2025-4009 covers the command injection in feature-transfer-import.php CVE-2025-10364 covers the command injection in feature-transfer-export.php Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices. This level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others.

AI-Powered Analysis

AILast updated: 09/12/2025, 13:54:01 UTC

Technical Analysis

CVE-2025-10364 is a critical remote command injection vulnerability affecting the Evertz SDVN 3080ipx-10G, a high bandwidth Ethernet switching fabric device used primarily in video applications. The device exposes a web management interface on port 80, developed in PHP using the webEASY SDK (ewb). This interface allows administrators to configure network switching, control product features, and manage licenses. The vulnerability exists specifically in the feature-transfer-export.php endpoint, where improper neutralization of special elements (CWE-77) allows unauthenticated remote attackers to inject arbitrary commands. Exploitation leads to arbitrary command execution with root privileges, enabling full system compromise. This is compounded by related vulnerabilities including another command injection (CVE-2025-4009) and an authentication bypass flaw (CVE-2025-10365), which together significantly increase the attack surface and ease of exploitation. The CVSS 4.0 base score is 9.3 (critical), reflecting the vulnerability's network attack vector, no required authentication or user interaction, and high impact on confidentiality, integrity, and availability. Successful exploitation could disrupt media streaming services, alter streamed content, or manipulate closed captions, causing severe operational and reputational damage to organizations relying on these devices for broadcast or media distribution.

Potential Impact

For European organizations, particularly broadcasters, media companies, and service providers using Evertz 3080ipx-10G devices, this vulnerability poses a severe risk. Compromise could lead to interruption or manipulation of live media streams, impacting service availability and content integrity. This could result in financial losses, regulatory penalties (especially under GDPR for service disruptions), and damage to brand reputation. The ability for unauthenticated remote attackers to gain root access means attackers could pivot within networks, potentially compromising other critical infrastructure. Given the device's role in high bandwidth video switching, attacks could affect large-scale media distribution across Europe, disrupting communications and entertainment services. The lack of known exploits in the wild currently provides a window for mitigation, but the critical nature demands immediate attention.

Mitigation Recommendations

Organizations should immediately assess their exposure to the Evertz 3080ipx-10G device, especially those with web management interfaces accessible from untrusted networks. Specific mitigations include: 1) Isolate the management interface on a secure, internal network segment with strict access controls and network segmentation to prevent unauthorized external access. 2) Implement web application firewalls (WAFs) with custom rules to detect and block command injection patterns targeting feature-transfer-export.php and related endpoints. 3) Monitor network traffic and device logs for unusual commands or access attempts indicative of exploitation attempts. 4) Coordinate with Evertz for firmware updates or patches addressing these vulnerabilities; if unavailable, consider temporary compensating controls such as disabling the vulnerable web interface or restricting access via VPN. 5) Conduct regular vulnerability scans and penetration tests focusing on these devices to ensure no residual exposure. 6) Train operational staff to recognize signs of compromise and respond swiftly to incidents involving media infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ONEKEY
Date Reserved
2025-09-12T13:40:55.090Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c425deaba797cca94012aa

Added to database: 9/12/2025, 1:53:34 PM

Last enriched: 9/12/2025, 1:54:01 PM

Last updated: 9/13/2025, 12:23:33 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats