Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25070: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Anhui Seeker Electronic Technology Co., LTD. XikeStor SKS8310-8X

0
Critical
VulnerabilityCVE-2026-25070cvecve-2026-25070cwe-78
Published: Sat Mar 07 2026 (03/07/2026, 00:20:03 UTC)
Source: CVE Database V5
Vendor/Project: Anhui Seeker Electronic Technology Co., LTD.
Product: XikeStor SKS8310-8X

Description

CVE-2026-25070 is a critical OS command injection vulnerability in the Anhui Seeker Electronic Technology XikeStor SKS8310-8X network switch firmware versions 1. 04. B07 and earlier. The flaw exists in the /goform/PingTestSet endpoint, where the destIp parameter is improperly sanitized, allowing unauthenticated remote attackers to execute arbitrary OS commands with root privileges. This vulnerability requires no authentication or user interaction and can lead to full system compromise, including control over network traffic and device configuration. Although no known exploits are currently reported in the wild, the high CVSS score of 9. 3 reflects the severe risk posed by this issue. Organizations using affected devices should prioritize patching or apply mitigations immediately to prevent potential exploitation. The threat primarily impacts sectors and countries where these network switches are deployed, especially in critical infrastructure and enterprise networks. Due to the device’s role in network management, exploitation could disrupt availability and confidentiality of network operations.

AI-Powered Analysis

AILast updated: 03/07/2026, 01:15:54 UTC

Technical Analysis

CVE-2026-25070 is an OS command injection vulnerability identified in the XikeStor SKS8310-8X network switch firmware versions 1.04.B07 and earlier, produced by Anhui Seeker Electronic Technology Co., LTD. The vulnerability resides in the /goform/PingTestSet HTTP endpoint, which accepts a destIp parameter used to perform ping tests. Due to improper neutralization of special elements (CWE-78), attackers can inject arbitrary operating system commands via this parameter. The vulnerability allows unauthenticated remote attackers to execute commands with root-level privileges, effectively granting full control over the affected device. The CVSS 4.0 base score is 9.3, indicating critical severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). This means exploitation is straightforward and can cause complete compromise of the device. The vulnerability can be exploited remotely without authentication, making it highly dangerous. No patches or official fixes are currently listed, and no known exploits have been reported in the wild yet. However, the potential for attackers to gain root shell access on network infrastructure devices poses a significant risk to network security and stability. The device’s role in managing network traffic and configurations means exploitation could lead to interception, manipulation, or denial of network services.

Potential Impact

The impact of CVE-2026-25070 is severe for organizations using the affected XikeStor SKS8310-8X network switches. Successful exploitation grants attackers root-level remote code execution, enabling full control over the device. This can lead to unauthorized interception or manipulation of network traffic, disruption of network availability, and compromise of network management functions. Attackers could deploy persistent backdoors, pivot to internal networks, or launch further attacks against connected systems. Critical infrastructure, enterprise networks, and service providers relying on these switches face risks of operational disruption, data breaches, and loss of network integrity. The lack of authentication and user interaction requirements increases the likelihood of automated exploitation attempts once the vulnerability becomes widely known. The absence of patches further exacerbates the risk, potentially leading to widespread exploitation and significant damage to organizational security postures.

Mitigation Recommendations

Given the absence of official patches, organizations should immediately implement compensating controls to mitigate CVE-2026-25070. These include restricting network access to the management interface of the XikeStor SKS8310-8X switches using firewalls or access control lists (ACLs) to limit exposure to trusted IP addresses only. Network segmentation should isolate these devices from untrusted networks and the internet. Monitoring and alerting on unusual traffic patterns or command execution attempts targeting the /goform/PingTestSet endpoint can help detect exploitation attempts. Disabling or restricting the vulnerable functionality if possible, such as disabling remote ping test features or the affected endpoint, can reduce attack surface. Organizations should engage with the vendor for firmware updates or patches and plan for timely deployment once available. Additionally, conducting regular security audits and penetration testing on network devices can help identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-28T21:47:35.120Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ab78cec48b3f10ff0845ac

Added to database: 3/7/2026, 1:01:02 AM

Last enriched: 3/7/2026, 1:15:54 AM

Last updated: 3/7/2026, 3:33:36 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses