Cyber Posture

CVE-2025-34514

HighPublic PoCRCE

Published: 16 October 2025

Published
16 October 2025
Modified
25 November 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0030 52.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-34514 is a high-severity OS Command Injection (CWE-78) vulnerability in Ilevia Eve X1 Server Firmware. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 47.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents OS command injection by validating and sanitizing user inputs to vulnerable PHP scripts before invoking exec().

prevent

Mitigates network-accessible exploitation by monitoring and controlling traffic to port 8080, aligning with vendor advice against internet exposure.

prevent

Limits damage from injected arbitrary commands by enforcing least privilege on processes handling authenticated low-privilege sessions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

The vulnerability is an authenticated OS command injection in web-accessible PHP scripts using exec(), enabling exploitation of a public-facing application (T1190) to execute arbitrary Unix shell commands (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Ilevia EVE X1 Server firmware versions ≤ 4.7.18.0.eden contain authenticated OS command injection vulnerabilities in multiple web-accessible PHP scripts that call exec() and allow an authenticated attacker to execute arbitrary commands. Ilevia has declined to service this vulnerability, and recommends…

more

that customers not expose port 8080 to the internet.

Deeper analysisAI

CVE-2025-34514 is an authenticated OS command injection vulnerability (CWE-78) in Ilevia EVE X1 Server firmware versions up to and including 4.7.18.0.eden. The flaw exists in multiple web-accessible PHP scripts that invoke the exec() function, allowing injection of arbitrary commands.

An attacker with valid low-privilege authentication (PR:L) and network access (AV:N) can exploit the vulnerability with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation enables execution of arbitrary operating system commands on the server, resulting in high impacts to confidentiality, integrity, and availability (CVSSv3.1 base score of 8.8, unchanged scope).

Ilevia has declined to service or patch this vulnerability and advises customers not to expose port 8080 to the internet. Further technical details are documented in advisories from VulnCheck and Zero Science Labs.

Details

CWE(s)

Affected Products

ilevia
eve x1 server firmware
≤ 4.7.18.0

CVEs Like This One

CVE-2025-34184Same product: Ilevia Eve X1 Server
CVE-2025-34513Same product: Ilevia Eve X1 Server
CVE-2025-60738Same product: Ilevia Eve X1 Server
CVE-2025-34186Same product: Ilevia Eve X1 Server
CVE-2025-34187Same product: Ilevia Eve X1 Server
CVE-2025-60739Same product: Ilevia Eve X1 Server
CVE-2025-34515Same product: Ilevia Eve X1 Server
CVE-2025-34516Same product: Ilevia Eve X1 Server
CVE-2026-25070Shared CWE-78
CVE-2026-34796Shared CWE-78

References