Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10394: Code Injection in fcba_zzm ics-park Smart Park Management System

0
Medium
VulnerabilityCVE-2025-10394cvecve-2025-10394
Published: Sun Sep 14 2025 (09/14/2025, 06:32:05 UTC)
Source: CVE Database V5
Vendor/Project: fcba_zzm
Product: ics-park Smart Park Management System

Description

A vulnerability has been found in fcba_zzm ics-park Smart Park Management System 2.0. Affected is an unknown function of the file ruoyi-quartz/src/main/java/com/ruoyi/quartz/controller/JobController.java of the component Scheduled Task Module. Such manipulation leads to code injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 09/22/2025, 00:32:33 UTC

Technical Analysis

CVE-2025-10394 is a code injection vulnerability identified in version 2.0 of the fcba_zzm ics-park Smart Park Management System, specifically within an unspecified function of the Scheduled Task Module located in the file ruoyi-quartz/src/main/java/com/ruoyi/quartz/controller/JobController.java. The vulnerability allows an attacker to inject arbitrary code remotely without requiring user interaction or elevated privileges beyond those of an authenticated user. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and no user interaction (UI:N) is needed. However, the attacker must have high privileges (PR:H) on the system to exploit this vulnerability. The impact on confidentiality, integrity, and availability is low (VC:L, VI:L, VA:L), indicating that while exploitation can lead to unauthorized code execution, the overall damage potential is limited. The vulnerability does not affect system components related to security controls or scope changes. The vulnerability has been publicly disclosed but no known exploits are currently observed in the wild. The CVSS v4.0 base score is 5.1, categorizing it as a medium severity issue. The vulnerability arises from improper input validation or sanitization in the Scheduled Task Module, allowing malicious input to be executed as code, which could lead to unauthorized command execution or system manipulation within the context of the application. Since the affected component manages scheduled tasks, exploitation could allow attackers to alter or inject malicious scheduled jobs, potentially leading to persistent unauthorized access or disruption of park management operations.

Potential Impact

For European organizations using the fcba_zzm ics-park Smart Park Management System version 2.0, this vulnerability poses a moderate risk. The ability to inject code remotely could allow attackers with high privileges to manipulate scheduled tasks, potentially disrupting parking management services, causing operational downtime, or enabling further lateral movement within the network. Although the impact on confidentiality, integrity, and availability is rated low, the disruption of critical infrastructure services such as smart parking can have cascading effects on urban mobility and public safety. Additionally, unauthorized code execution could be leveraged to exfiltrate sensitive operational data or interfere with billing and access control systems. Given the increasing adoption of smart city technologies across Europe, any compromise of such systems could undermine public trust and lead to regulatory scrutiny under frameworks like GDPR if personal data is affected. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially if attackers develop new exploit techniques.

Mitigation Recommendations

1. Immediate patching: Organizations should monitor for official patches or updates from fcba_zzm and apply them promptly once available. 2. Access control hardening: Restrict access to the Scheduled Task Module and JobController endpoints to only trusted administrators, employing network segmentation and strong authentication mechanisms. 3. Privilege management: Review and minimize the number of users with high privileges required to exploit this vulnerability, implementing the principle of least privilege. 4. Input validation: Implement additional input sanitization and validation at the application and network layers to detect and block malicious payloads targeting scheduled tasks. 5. Monitoring and logging: Enable detailed logging of scheduled task creation and modification activities, and deploy anomaly detection to identify suspicious behavior indicative of exploitation attempts. 6. Incident response readiness: Prepare response plans specific to smart infrastructure compromise, including isolating affected systems and forensic analysis. 7. Network security: Employ web application firewalls (WAFs) with custom rules to detect and block code injection patterns targeting the vulnerable module. 8. Vendor engagement: Engage with fcba_zzm for timely vulnerability disclosures and coordinate on security improvements.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T15:13:02.580Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c7591939776bc2a1466a6a

Added to database: 9/15/2025, 12:08:57 AM

Last enriched: 9/22/2025, 12:32:33 AM

Last updated: 10/30/2025, 6:58:57 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats