Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25070: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Anhui Seeker Electronic Technology Co., LTD. XikeStor SKS8310-8X

0
Critical
VulnerabilityCVE-2026-25070cvecve-2026-25070cwe-78
Published: Sat Mar 07 2026 (03/07/2026, 00:20:03 UTC)
Source: CVE Database V5
Vendor/Project: Anhui Seeker Electronic Technology Co., LTD.
Product: XikeStor SKS8310-8X

Description

XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain an OS command injection vulnerability in the /goform/PingTestSet endpoint that allows unauthenticated remote attackers to execute arbitrary operating system commands. Attackers can inject malicious commands through the destIp parameter to achieve remote code execution with root privileges on the network switch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 19:33:32 UTC

Technical Analysis

CVE-2026-25070 is an OS command injection vulnerability identified in the firmware of the Anhui Seeker Electronic Technology Co., LTD. XikeStor SKS8310-8X network switch, specifically affecting firmware versions 1.04.B07 and earlier. The vulnerability resides in the /goform/PingTestSet HTTP endpoint, which accepts a destIp parameter. Due to improper neutralization of special elements (CWE-78), attackers can inject malicious shell commands into this parameter. Because the endpoint does not require authentication, remote attackers can exploit this flaw without any credentials or user interaction. Successful exploitation results in arbitrary command execution with root-level privileges on the device, effectively granting full control over the network switch. This can lead to unauthorized network traffic manipulation, interception, or denial of service. The CVSS 4.0 base score is 9.3, reflecting the critical nature of this vulnerability with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No patches or official fixes have been published yet, and no exploits have been reported in the wild, though the vulnerability's characteristics make it highly exploitable. The affected product is a network switch used in enterprise and industrial environments, making this a significant risk for organizations relying on this hardware for critical network infrastructure.

Potential Impact

The impact of CVE-2026-25070 is severe for organizations using the XikeStor SKS8310-8X network switch. Since exploitation allows unauthenticated remote code execution with root privileges, attackers can fully compromise the device. This can lead to interception or manipulation of network traffic, disruption of network services, and potential lateral movement within the network. Confidentiality is at risk as attackers may capture sensitive data passing through the switch. Integrity is compromised due to the ability to alter device configurations or inject malicious traffic. Availability can be affected by causing device crashes or denial of service. Given the critical role of network switches in enterprise and industrial networks, exploitation could disrupt business operations, cause data breaches, or facilitate further attacks on connected systems. The lack of authentication and ease of exploitation increase the likelihood of attacks, especially in environments where these devices are exposed to untrusted networks.

Mitigation Recommendations

1. Immediately isolate affected XikeStor SKS8310-8X devices from untrusted networks to reduce exposure. 2. Disable or restrict access to the /goform/PingTestSet endpoint if possible via device configuration or firewall rules. 3. Implement strict network segmentation to limit access to management interfaces of network switches. 4. Monitor network traffic and device logs for unusual or unauthorized commands targeting the destIp parameter or the affected endpoint. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect command injection attempts. 6. Contact Anhui Seeker Electronic Technology Co., LTD. for firmware updates or patches and apply them promptly once available. 7. Consider replacing vulnerable devices if no timely patch is provided, especially in critical infrastructure environments. 8. Enforce strong network access controls and multi-factor authentication on management interfaces to reduce risk from other vulnerabilities. 9. Conduct regular security assessments of network devices to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-28T21:47:35.120Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ab78cec48b3f10ff0845ac

Added to database: 3/7/2026, 1:01:02 AM

Last enriched: 3/14/2026, 7:33:32 PM

Last updated: 4/20/2026, 8:43:57 AM

Views: 120

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses