PT-2025-53622 · Unknown · Xspeeder Sxzos
Published
2025-12-27
·
Updated
2026-02-02
·
CVE-2025-54322
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
XSpeeder SXZOS through 2025-12-26
Description
XSpeeder SXZOS through 2025-12-26 contains a critical flaw allowing unauthenticated attackers to achieve root remote code execution. The issue stems from the unsafe evaluation of base64-decoded input received through the
chkid parameter of the ''https://t.co/v9YXzNh19c'' endpoint. The title and oIP parameters are also implicated in the vulnerability. Approximately 70,000 internet-exposed devices are currently affected, including routers, SD-WAN appliances, and smart TV controllers, primarily in industrial and branch environments. The vulnerability was discovered by an AI agent and has not been addressed by the vendor after seven months of disclosure attempts. Exploitation requires only a single HTTP request and does not require authentication. The vulnerable component uses eval() on base64-decoded input, enabling command execution.Recommendations
Versions prior to 2025-12-26 should be updated when a patch becomes available.
As a temporary workaround, restrict access to the ''https://t.co/v9YXzNh19c'' endpoint.
Avoid using the
chkid, title, and oIP parameters in the affected endpoint until the issue is resolved.Exploit
Fix
RCE
Eval Injection
Code Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
CVE-2025-54322
Affected Products
Xspeeder Sxzos
References · 39
- 🔥 https://pwn.ai/blog/cve-2025-54322-zeroday-unauthenticated-root-rce-affecting-70-000-hosts · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-54322 · Security Note
- https://reddit.com/r/CVEWatch/comments/1pxosu8/top_10_trending_cves_28122025 · Reddit Post
- https://twitter.com/SecAideInfo/status/2005946307471462836 · Twitter Post
- https://twitter.com/CVEnew/status/2004934258549555664 · Twitter Post
- https://t.me/cveNotify/146933 · Telegram Post
- https://xspeeder.com · Note
- https://reddit.com/r/CVEWatch/comments/1q0ahfr/top_10_trending_cves_31122025 · Reddit Post
- https://twitter.com/The_Hunt_x/status/2006611699085050111 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1pysw6m/critical_0day_flaw_exposes_70k_xspeeder_devices · Reddit Post
- https://twitter.com/akaclandestine/status/2004957470951608577 · Twitter Post
- https://twitter.com/akaclandestine/status/2004961049003409819 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1pzfce7/top_10_trending_cves_30122025 · Reddit Post
- https://twitter.com/nxtgen579255/status/2005792493082927139 · Twitter Post
- https://twitter.com/Dinosn/status/2004922084485640345 · Twitter Post