PT-2025-53622 · Unknown · Xspeeder Sxzos
Published
2025-12-27
·
Updated
2025-12-30
·
CVE-2025-54322
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
XSpeeder SXZOS versions through 2025-12-26
Description
XSpeeder SXZOS through 2025-12-26 contains a critical remote code execution flaw. An unauthenticated attacker can achieve root access by sending a crafted HTTP request with base64-encoded Python code in the
chkid parameter to the /webInfos/ API endpoint. The title and oIP parameters are also implicated in the vulnerability. Approximately 70,000 internet-exposed devices are affected. The vulnerability allows for full device takeover, potentially enabling traffic interception and lateral movement within a network. The flaw stems from the use of eval() on base64-decoded input, allowing for arbitrary command execution.Recommendations
Versions prior to 2025-12-26 should be updated when a patch becomes available.
As a temporary workaround, restrict access to the
/webInfos/ API endpoint.
Avoid using the chkid, title, and oIP parameters in the affected API endpoint until the issue is resolved.Exploit
Fix
RCE
Eval Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2025-54322
Affected Products
Xspeeder Sxzos
References · 31
- 🔥 https://pwn.ai/blog/cve-2025-54322-zeroday-unauthenticated-root-rce-affecting-70-000-hosts · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-54322 · Security Note
- https://twitter.com/gothburz/status/2005688869526626317 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1pysw6m/critical_0day_flaw_exposes_70k_xspeeder_devices · Reddit Post
- https://twitter.com/TheHackerWire/status/2004930209209102436 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1pzfce7/top_10_trending_cves_30122025 · Reddit Post
- https://twitter.com/akaclandestine/status/2004961049003409819 · Twitter Post
- https://twitter.com/akaclandestine/status/2004957470951608577 · Twitter Post
- https://xspeeder.com · Note
- https://twitter.com/taku888infinity/status/2005450243417231554 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1pxosu8/top_10_trending_cves_28122025 · Reddit Post
- https://t.me/pentestingnews/71992 · Telegram Post
- https://twitter.com/ThreatSynop/status/2006140187995144420 · Twitter Post
- https://twitter.com/cyberkendra/status/2004953255974252896 · Twitter Post
- https://t.me/cveNotify/146933 · Telegram Post