CVE-2025-34035 Scanner
CVE-2025-34035 Scanner - OS Command Injection vulnerability in EnGenius EnShare
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
12 days 1 hour
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
EnGenius EnShare is a cloud service platform used in IoT and network devices to allow for remote access and management. It is commonly utilized by network administrators and IT professionals to facilitate device configuration and management. The software provides gigabit-level connectivity and enables users to access and interact with data stored on devices connected to the cloud service. Its widespread use in various network setups makes it a crucial tool for managing IT infrastructures. The platform is not only useful for business environments but also in smart home settings where remote control over devices is necessary. This versatility makes it a popular choice in environments requiring efficient network solutions.
The OS Command Injection vulnerability detected in EnGenius EnShare can compromise the security of systems using this service. This flaw allows unauthenticated remote attackers to inject arbitrary shell commands into the system. The vulnerability is particularly severe because it grants attackers the capability to execute these commands with root privileges. This kind of vulnerability can lead to potential full system compromises, jeopardizing the integrity and security of the affected devices. The issue arises from improper sanitization of user inputs within specific scripts, making it accessible through network-based exploitation.
Technical details of the vulnerability point to the usbinteract.cgi script as the primary source of risk. The path parameter within this script fails to correctly sanitize user inputs, permitting arbitrary command injections. When an attacker exploits this deficiency, they can input malicious shell commands that the system executes with elevated privileges. The endpoints exploited are typically accessible over common network interfaces, making the attack feasible over the internet. The vulnerability exists in version 1.4.11 and earlier, indicating that systems using these outdated versions are at high risk.
Possible effects upon exploitation include unauthorized access and control over the affected devices. Attackers could manipulate device settings, siphon sensitive data, or execute harmful software, leading to data breaches, denials of service, or further penetration into network infrastructure. Such a compromise could also propagate to other connected systems, resulting in broader network vulnerabilities. Organizations using the affected versions may face significant business risks and operational disruptions if attackers exploit this vulnerability.
REFERENCES