Cyber Posture

CVE-2025-34515

CriticalPublic PoC

Published: 16 October 2025

Published
16 October 2025
Modified
06 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 36.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-34515 is a critical-severity Execution with Unnecessary Privileges (CWE-250) vulnerability in Ilevia Eve X1 Server Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 36.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-6 enforces least privilege, directly preventing the sync_project.sh script from executing with unnecessary root privileges and blocking escalation.

prevent

SC-7 implements boundary protection to control access to port 8080, mitigating remote network exploitation of the unauthenticated vulnerability as recommended by the vendor.

prevent

SI-2 requires organizations to identify and remediate flaws like this unpatched privilege escalation vulnerability through workarounds or isolation despite vendor refusal to patch.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

CVE-2025-34515 enables unauthenticated remote exploitation of a public-facing application (port 8080) for direct root privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Ilevia EVE X1 Server firmware versions ≤ 4.7.18.0.eden contain an execution with unnecessary privileges vulnerability in sync_project.sh that allows an attacker to escalate privileges to root. Ilevia has declined to service this vulnerability, and recommends that customers not expose port…

more

8080 to the internet.

Deeper analysisAI

CVE-2025-34515 is an execution with unnecessary privileges vulnerability (CWE-250) in the sync_project.sh script of Ilevia EVE X1 Server firmware versions up to and including 4.7.18.0.eden. Published on 2025-10-16, it allows an attacker to escalate privileges to root level.

The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), making it remotely exploitable over the network with low attack complexity, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. An unauthenticated attacker who can reach the affected service can leverage this flaw to gain full root access on the device.

Ilevia has declined to service or patch this vulnerability, recommending instead that customers not expose port 8080 to the internet. Further technical details are provided in advisories from VulnCheck and Zero Science Lab.

Details

CWE(s)

Affected Products

ilevia
eve x1 server firmware
≤ 4.7.18.0

CVEs Like This One

CVE-2025-60738Same product: Ilevia Eve X1 Server
CVE-2025-34184Same product: Ilevia Eve X1 Server
CVE-2025-60739Same product: Ilevia Eve X1 Server
CVE-2025-34186Same product: Ilevia Eve X1 Server
CVE-2025-34516Same product: Ilevia Eve X1 Server
CVE-2025-34513Same product: Ilevia Eve X1 Server
CVE-2025-34514Same product: Ilevia Eve X1 Server
CVE-2025-34187Same product: Ilevia Eve X1 Server
CVE-2025-34274Shared CWE-250
CVE-2025-13375Shared CWE-250

References