Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34518: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Ilevia Srl. EVE X1 Server

0
High
VulnerabilityCVE-2025-34518cvecve-2025-34518cwe-22
Published: Thu Oct 16 2025 (10/16/2025, 17:55:00 UTC)
Source: CVE Database V5
Vendor/Project: Ilevia Srl.
Product: EVE X1 Server

Description

CVE-2025-34518 is a high-severity path traversal vulnerability in Ilevia Srl. 's EVE X1 Server firmware versions up to 4. 7. 18. 0. eden. The flaw exists in the get_file_content. php script, allowing unauthenticated remote attackers to read arbitrary files on the server by exploiting improper pathname restrictions. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, typically via port 8080. Ilevia has declined to provide a patch and advises customers not to expose port 8080 to the internet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:33:01 UTC

Technical Analysis

CVE-2025-34518 is a path traversal vulnerability classified under CWE-22 found in the Ilevia EVE X1 Server firmware versions up to 4.7.18.0.eden. The vulnerability resides in the get_file_content.php endpoint, which fails to properly restrict relative pathnames, allowing attackers to traverse directories and read arbitrary files on the server filesystem. The vulnerability can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 base score is 8.7 (high), reflecting its network attack vector, low complexity, no privileges required, and no user interaction needed, with a high impact on confidentiality. The vendor, Ilevia Srl., has declined to patch this vulnerability and recommends that customers avoid exposing port 8080, the default port for the vulnerable service, to the internet. No known exploits have been reported in the wild yet, but the vulnerability's characteristics make it a prime candidate for exploitation. The lack of a patch means organizations must rely on compensating controls such as network segmentation, firewall rules, and monitoring to mitigate risk. This vulnerability could allow attackers to access sensitive configuration files, credentials, or other critical data stored on the device, potentially leading to further compromise or data breaches.

Potential Impact

The primary impact of CVE-2025-34518 is the unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Attackers can exploit this vulnerability to access configuration files, credentials, logs, or other sensitive data stored on the EVE X1 Server, compromising confidentiality. This can facilitate further attacks such as privilege escalation, lateral movement, or data exfiltration. Since the vulnerability requires no authentication and can be exploited remotely, it significantly increases the attack surface. Organizations relying on the EVE X1 Server for critical operations may face operational disruptions if attackers leverage obtained information to disrupt services or gain deeper access. The inability to patch the vulnerability exacerbates risk, forcing reliance on network controls and monitoring. This threat is particularly severe for organizations with internet-exposed EVE X1 Servers or those lacking robust network segmentation. The potential for data breaches and operational impact makes this a critical concern for affected entities worldwide.

Mitigation Recommendations

Given the vendor's refusal to patch, organizations must implement compensating controls to mitigate CVE-2025-34518. First, immediately restrict access to port 8080 on all EVE X1 Servers by applying strict firewall rules limiting connections to trusted internal IP addresses only. Deploy network segmentation to isolate these servers from the internet and untrusted networks. Employ intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious requests targeting get_file_content.php or unusual file access patterns. Regularly audit server logs for signs of exploitation attempts or unauthorized file access. Consider deploying web application firewalls (WAFs) with custom rules to detect and block path traversal payloads. If possible, replace or upgrade affected devices with alternative solutions not vulnerable to this issue. Educate IT staff about the vulnerability and ensure incident response plans include steps for detecting and responding to exploitation attempts. Finally, maintain up-to-date backups of critical data to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.612Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f132679f8a5dbaeaef9b86

Added to database: 10/16/2025, 5:59:03 PM

Last enriched: 3/24/2026, 12:33:01 AM

Last updated: 3/24/2026, 5:39:18 AM

Views: 141

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses