Skip to main content

CVE-2025-34160: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shanghai Aishu Information Technology Co., Ltd. AnyShare

Critical
VulnerabilityCVE-2025-34160cvecve-2025-34160cwe-78
Published: Wed Aug 27 2025 (08/27/2025, 21:22:12 UTC)
Source: CVE Database V5
Vendor/Project: Shanghai Aishu Information Technology Co., Ltd.
Product: AnyShare

Description

AnyShare contains a critical unauthenticated remote code execution vulnerability in the ServiceAgent API exposed on port 10250. The endpoint /api/ServiceAgent/start_service accepts user-supplied input via POST and fails to sanitize command-like payloads. An attacker can inject shell syntax that is interpreted by the backend, enabling arbitrary command execution. The vulnerability is presumed to affect builds released prior to August 2025 and is said to be remediated in newer versions of the product, though the exact affected range remains undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-07-11 UTC.

AI-Powered Analysis

AILast updated: 08/27/2025, 21:48:30 UTC

Technical Analysis

CVE-2025-34160 is a critical unauthenticated remote code execution (RCE) vulnerability affecting the AnyShare product developed by Shanghai Aishu Information Technology Co., Ltd. The vulnerability resides in the ServiceAgent API, specifically exposed on port 10250. The vulnerable endpoint, /api/ServiceAgent/start_service, accepts POST requests containing user-supplied input that is not properly sanitized. This improper neutralization of special elements (CWE-78) allows an attacker to inject shell commands that the backend executes directly. Because the API does not require authentication, any remote attacker with network access to the exposed port can exploit this flaw to execute arbitrary commands on the underlying system. The vulnerability affects all builds released prior to August 2025, though the exact affected version range is not precisely defined. The vendor has reportedly remediated the issue in newer versions released after this date. The CVSS 4.0 base score is 10.0, reflecting the highest severity due to the vulnerability's characteristics: network attack vector (AV:N), no attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). This means exploitation can lead to full system compromise, data theft, destruction, or disruption without any prerequisite conditions. No known exploits in the wild have been reported yet, but the critical nature and ease of exploitation make this a high-risk threat. The vulnerability is a classic OS command injection, where unsanitized input is passed to a shell or command interpreter, enabling arbitrary command execution with the privileges of the vulnerable service. Given the exposed port and unauthenticated access, this vulnerability is highly exploitable in exposed network environments.

Potential Impact

For European organizations using AnyShare, this vulnerability poses a severe risk. Successful exploitation can lead to complete system compromise, allowing attackers to execute arbitrary commands, potentially leading to data breaches, ransomware deployment, lateral movement within networks, and disruption of business operations. Confidentiality is at high risk as attackers can access sensitive files and data. Integrity is compromised since attackers can modify or delete data and system configurations. Availability is also threatened due to potential service disruption or destruction of critical files. Given that AnyShare is an enterprise file sharing and collaboration platform, exploitation could expose sensitive corporate documents and intellectual property. The unauthenticated nature of the vulnerability means attackers do not need valid credentials, increasing the attack surface. European organizations with AnyShare instances exposed to untrusted networks or insufficiently segmented internal networks are particularly vulnerable. The lack of known exploits in the wild currently provides a small window for proactive patching and mitigation before widespread attacks emerge. However, the critical severity and ease of exploitation demand immediate attention to prevent potential large-scale compromises.

Mitigation Recommendations

1. Immediate upgrade to the latest AnyShare version released after August 2025 that includes the patch for CVE-2025-34160. 2. If patching is not immediately possible, restrict network access to port 10250 using firewalls or network segmentation to allow only trusted management hosts. 3. Implement strict input validation and sanitization at the application layer if custom integrations exist, to prevent injection of shell commands. 4. Monitor network traffic to and from port 10250 for anomalous POST requests or unusual command patterns. 5. Employ host-based intrusion detection systems (HIDS) to detect suspicious command execution or process spawning related to the ServiceAgent service. 6. Conduct thorough audits of AnyShare deployments to identify exposed instances and verify version levels. 7. Enforce the principle of least privilege for the AnyShare service account to limit the impact of potential exploitation. 8. Maintain up-to-date backups of critical data to enable recovery in case of compromise. 9. Educate IT and security teams about this vulnerability and ensure incident response plans include steps for this specific threat. These measures go beyond generic advice by focusing on network-level controls, monitoring, and operational readiness specific to the exposed API and service.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.566Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68af7981ad5a09ad006645aa

Added to database: 8/27/2025, 9:32:49 PM

Last enriched: 8/27/2025, 9:48:30 PM

Last updated: 9/2/2025, 12:34:19 AM

Views: 34

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats