Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46581: CWE-94 Improper Control of Generation of Code ('Code Injection') in ZTE ZXCDN

0
Critical
VulnerabilityCVE-2025-46581cvecve-2025-46581cwe-94
Published: Tue Oct 14 2025 (10/14/2025, 08:54:42 UTC)
Source: CVE Database V5
Vendor/Project: ZTE
Product: ZXCDN

Description

CVE-2025-46581 is a critical remote code execution vulnerability in ZTE's ZXCDN-SNS V3. 01. 02 product, caused by improper control of code generation (CWE-94). It allows unauthenticated attackers to execute arbitrary commands remotely with non-root privileges. The vulnerability stems from a Struts component, enabling exploitation over the network without user interaction. The CVSS score of 9. 8 reflects its high impact on confidentiality, integrity, and availability. Although no public exploits are known yet, the severity and ease of exploitation make it a significant threat. European organizations using ZXCDN for content delivery or network services are at risk, especially in countries with higher ZTE market presence. Immediate mitigation involves applying vendor patches once available, restricting network access to ZXCDN management interfaces, and monitoring for suspicious activity.

AI-Powered Analysis

AILast updated: 10/21/2025, 11:59:04 UTC

Technical Analysis

CVE-2025-46581 is a critical vulnerability identified in ZTE's ZXCDN-SNS V3.01.02, a content delivery network product. The flaw is categorized under CWE-94, indicating improper control over code generation, which in this case manifests as a remote code execution (RCE) vulnerability via the Apache Struts framework integrated within ZXCDN. An unauthenticated attacker can exploit this vulnerability remotely without any user interaction, executing arbitrary commands on the affected system with non-root privileges. The vulnerability arises due to insufficient input validation or sanitization in the Struts component, allowing malicious payloads to be injected and executed as code. The CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) highlights the ease of exploitation (network vector, no privileges or user interaction required) and the severe impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the vulnerability's nature and criticality suggest that attackers could develop exploits rapidly. ZXCDN is typically deployed in network infrastructure to accelerate content delivery, making this vulnerability particularly dangerous as it could lead to data breaches, service disruption, or lateral movement within networks.

Potential Impact

For European organizations, the impact of CVE-2025-46581 could be substantial. ZXCDN is used in telecommunications and content delivery sectors, which are critical infrastructure components in Europe. Exploitation could lead to unauthorized access to sensitive data, disruption of content delivery services, and potential compromise of network integrity. This could affect service providers, ISPs, and enterprises relying on ZTE ZXCDN for network acceleration or content distribution. The non-root execution privileges limit but do not eliminate the risk of privilege escalation or further compromise. Given the criticality of the vulnerability and the strategic importance of telecommunications infrastructure in Europe, successful exploitation could result in significant operational and reputational damage, regulatory penalties under GDPR for data breaches, and potential national security concerns in countries with high ZTE deployment.

Mitigation Recommendations

1. Apply official patches from ZTE immediately once they are released to address CVE-2025-46581. 2. Until patches are available, restrict network access to ZXCDN management and API interfaces using firewalls and network segmentation to limit exposure. 3. Implement strict input validation and web application firewall (WAF) rules to detect and block suspicious Struts payloads targeting the vulnerability. 4. Monitor logs and network traffic for unusual commands or patterns indicative of exploitation attempts. 5. Conduct regular vulnerability scans and penetration tests focusing on ZXCDN deployments. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts related to Struts RCE vulnerabilities. 7. Review and harden system configurations, minimizing unnecessary services and privileges on ZXCDN hosts. 8. Establish incident response plans specifically addressing potential exploitation of this vulnerability to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zte
Date Reserved
2025-04-25T00:28:13.909Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee12ad7eab8b438cfa7656

Added to database: 10/14/2025, 9:06:53 AM

Last enriched: 10/21/2025, 11:59:04 AM

Last updated: 12/3/2025, 6:05:27 PM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats