CVE-2025-46581: CWE-94 Improper Control of Generation of Code ('Code Injection') in ZTE ZXCDN
ZTE's ZXCDN product is affected by a Struts remote code execution (RCE) vulnerability. An unauthenticated attacker can remotely execute commands with non-root privileges.
AI Analysis
Technical Summary
CVE-2025-46581 is a critical remote code execution vulnerability affecting ZTE's ZXCDN-SNS version 3.01.02, a content delivery network product. The root cause is improper control of code generation (CWE-94), specifically related to Apache Struts components integrated within ZXCDN. This vulnerability allows an unauthenticated attacker to remotely execute arbitrary commands on the affected system with non-root privileges, bypassing authentication and requiring no user interaction. The vulnerability is rated with a CVSS 3.1 score of 9.8, reflecting its critical nature and the potential for complete compromise of confidentiality, integrity, and availability of the system. Although no public exploits have been reported yet, the vulnerability's characteristics make it highly exploitable. ZXCDN is used in network infrastructure to optimize content delivery, so exploitation could lead to unauthorized access, data theft, service disruption, or lateral movement within networks. The lack of available patches at the time of publication increases the urgency for defensive measures. The vulnerability was reserved in April 2025 and published in October 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, exploitation of CVE-2025-46581 could lead to severe consequences including unauthorized access to sensitive data, disruption of content delivery services, and potential lateral movement within corporate networks. Given the critical CVSS score and unauthenticated remote exploitability, attackers could compromise affected systems quickly, impacting business continuity and data privacy compliance obligations such as GDPR. Organizations relying on ZTE ZXCDN for network or content delivery services may face service outages or data breaches, damaging reputation and incurring regulatory penalties. The impact is heightened in sectors with critical infrastructure or high-value data, such as telecommunications, finance, and government. The vulnerability's exploitation could also be leveraged for broader attacks against European digital infrastructure, especially if combined with other vulnerabilities or insider threats.
Mitigation Recommendations
Since no patches are currently available, European organizations should implement immediate compensating controls. These include isolating ZXCDN systems from untrusted networks using strict network segmentation and firewall rules to limit exposure. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious Struts-related payloads. Conduct continuous monitoring and logging of ZXCDN traffic and system behavior to identify anomalous command execution attempts. Restrict administrative access and enforce least privilege principles on ZXCDN management interfaces. Engage with ZTE for timely patch releases and apply updates as soon as they become available. Additionally, perform vulnerability scanning and penetration testing focused on ZXCDN deployments to identify potential exploitation paths. Educate security teams on this specific vulnerability to improve incident response readiness.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-46581: CWE-94 Improper Control of Generation of Code ('Code Injection') in ZTE ZXCDN
Description
ZTE's ZXCDN product is affected by a Struts remote code execution (RCE) vulnerability. An unauthenticated attacker can remotely execute commands with non-root privileges.
AI-Powered Analysis
Technical Analysis
CVE-2025-46581 is a critical remote code execution vulnerability affecting ZTE's ZXCDN-SNS version 3.01.02, a content delivery network product. The root cause is improper control of code generation (CWE-94), specifically related to Apache Struts components integrated within ZXCDN. This vulnerability allows an unauthenticated attacker to remotely execute arbitrary commands on the affected system with non-root privileges, bypassing authentication and requiring no user interaction. The vulnerability is rated with a CVSS 3.1 score of 9.8, reflecting its critical nature and the potential for complete compromise of confidentiality, integrity, and availability of the system. Although no public exploits have been reported yet, the vulnerability's characteristics make it highly exploitable. ZXCDN is used in network infrastructure to optimize content delivery, so exploitation could lead to unauthorized access, data theft, service disruption, or lateral movement within networks. The lack of available patches at the time of publication increases the urgency for defensive measures. The vulnerability was reserved in April 2025 and published in October 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, exploitation of CVE-2025-46581 could lead to severe consequences including unauthorized access to sensitive data, disruption of content delivery services, and potential lateral movement within corporate networks. Given the critical CVSS score and unauthenticated remote exploitability, attackers could compromise affected systems quickly, impacting business continuity and data privacy compliance obligations such as GDPR. Organizations relying on ZTE ZXCDN for network or content delivery services may face service outages or data breaches, damaging reputation and incurring regulatory penalties. The impact is heightened in sectors with critical infrastructure or high-value data, such as telecommunications, finance, and government. The vulnerability's exploitation could also be leveraged for broader attacks against European digital infrastructure, especially if combined with other vulnerabilities or insider threats.
Mitigation Recommendations
Since no patches are currently available, European organizations should implement immediate compensating controls. These include isolating ZXCDN systems from untrusted networks using strict network segmentation and firewall rules to limit exposure. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious Struts-related payloads. Conduct continuous monitoring and logging of ZXCDN traffic and system behavior to identify anomalous command execution attempts. Restrict administrative access and enforce least privilege principles on ZXCDN management interfaces. Engage with ZTE for timely patch releases and apply updates as soon as they become available. Additionally, perform vulnerability scanning and penetration testing focused on ZXCDN deployments to identify potential exploitation paths. Educate security teams on this specific vulnerability to improve incident response readiness.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zte
- Date Reserved
- 2025-04-25T00:28:13.909Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee12ad7eab8b438cfa7656
Added to database: 10/14/2025, 9:06:53 AM
Last enriched: 10/14/2025, 9:07:10 AM
Last updated: 10/16/2025, 4:09:49 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62580: CWE-121 Stack-based Buffer Overflow in Delta Electronics ASDA-Soft
HighCVE-2025-62579: CWE-121 Stack-based Buffer Overflow in Delta Electronics ASDA-Soft
HighCVE-2025-10700: CWE-352 Cross-Site Request Forgery (CSRF) in elemntor Ally – Web Accessibility & Usability
MediumCVE-2025-11683: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in TODDR YAML::Syck
UnknownCVE-2025-11619: CWE-295 Improper Certificate Validation in Devolutions Devolutions Server
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.