Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34160: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shanghai Aishu Information Technology Co., Ltd. AnyShare

0
Critical
VulnerabilityCVE-2025-34160cvecve-2025-34160cwe-78
Published: Wed Aug 27 2025 (08/27/2025, 21:22:12 UTC)
Source: CVE Database V5
Vendor/Project: Shanghai Aishu Information Technology Co., Ltd.
Product: AnyShare

Description

AnyShare contains a critical unauthenticated remote code execution vulnerability in the ServiceAgent API exposed on port 10250. The endpoint /api/ServiceAgent/start_service accepts user-supplied input via POST and fails to sanitize command-like payloads. An attacker can inject shell syntax that is interpreted by the backend, enabling arbitrary command execution. The vulnerability is presumed to affect builds released prior to August 2025 and is said to be remediated in newer versions of the product, though the exact affected range remains undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-07-11 UTC.

AI-Powered Analysis

AILast updated: 09/04/2025, 00:58:40 UTC

Technical Analysis

CVE-2025-34160 is a critical unauthenticated remote code execution (RCE) vulnerability affecting the AnyShare product developed by Shanghai Aishu Information Technology Co., Ltd. The vulnerability stems from improper neutralization of special elements used in OS commands (CWE-78), specifically within the ServiceAgent API exposed on TCP port 10250. The vulnerable endpoint, /api/ServiceAgent/start_service, accepts POST requests containing user-supplied input that is not properly sanitized or validated. This allows an attacker to inject shell command syntax directly into the backend execution environment. Because the API does not require authentication, an attacker can remotely exploit this flaw without any credentials or user interaction, making it highly accessible and dangerous. The vulnerability affects all builds released prior to August 2025, although the exact affected version range is not precisely defined. The flaw was first observed being exploited or scanned for by the Shadowserver Foundation on July 11, 2025, indicating active reconnaissance or exploitation attempts in the wild. The CVSS 4.0 base score is 10.0, reflecting the highest severity due to the combination of network attack vector, no required privileges or user interaction, and the potential for complete system compromise (impacting confidentiality, integrity, and availability). This vulnerability enables attackers to execute arbitrary commands on the underlying operating system with the privileges of the service, potentially leading to full system takeover, data theft, destruction, or lateral movement within affected environments. No official patches or mitigations have been linked yet, but newer versions released after August 2025 are said to remediate the issue.

Potential Impact

For European organizations using AnyShare, this vulnerability poses a severe risk. AnyShare is an enterprise file sharing and collaboration platform, often deployed in corporate, government, and critical infrastructure environments. Exploitation could lead to unauthorized access to sensitive documents, intellectual property theft, disruption of business operations, and potential ransomware deployment. The unauthenticated nature of the flaw means attackers can scan and compromise vulnerable systems en masse, increasing the likelihood of widespread incidents. Given the criticality of data handled by such platforms, breaches could result in regulatory violations under GDPR, leading to heavy fines and reputational damage. Additionally, attackers could leverage compromised systems as footholds for further attacks within European networks, threatening supply chains and national security interests. The high severity and ease of exploitation make this a top priority threat for European enterprises relying on AnyShare for secure collaboration.

Mitigation Recommendations

European organizations should immediately identify any deployments of AnyShare, particularly those exposing port 10250 to untrusted networks. Network segmentation and firewall rules should be applied to restrict access to the ServiceAgent API endpoint, allowing only trusted internal hosts if possible. Until official patches or updates are available, organizations should consider disabling the vulnerable service or API endpoint to prevent exploitation. Monitoring network traffic for suspicious POST requests to /api/ServiceAgent/start_service can help detect exploitation attempts. Implementing Web Application Firewalls (WAFs) with custom rules to block command injection patterns may provide temporary protection. Organizations should engage with Shanghai Aishu Information Technology Co., Ltd. for timely updates and apply patches as soon as they are released. Additionally, conducting thorough incident response readiness and backup validation is critical to mitigate potential damage from exploitation. Finally, organizations should review and harden overall endpoint security and privilege management to limit the impact of any successful compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.566Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68af7981ad5a09ad006645aa

Added to database: 8/27/2025, 9:32:49 PM

Last enriched: 9/4/2025, 12:58:40 AM

Last updated: 10/14/2025, 10:14:24 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats