Ilevia EVE X1/X5 Server version ≤ 4.7.18.0.eden contains a vulnerability in its authentication mechanism. Unsanitized input is passed to a system() call for authentication, allowing attackers to inject special characters and manipulate command parsing. Due to the binary's interpretation of non-zero exit codes as successful authentication, remote attackers can bypass authentication and gain full access to the system.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 16 Sep 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 16 Sep 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Ilevia EVE X1/X5 Server version ≤ 4.7.18.0.eden contains a vulnerability in its authentication mechanism. Unsanitized input is passed to a system() call for authentication, allowing attackers to inject special characters and manipulate command parsing. Due to the binary's interpretation of non-zero exit codes as successful authentication, remote attackers can bypass authentication and gain full access to the system. | |
Title | Ilevia EVE X1/X5 Server 4.7.18.0.eden Authentication Bypass | |
Weaknesses | CWE-287 CWE-78 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-09-16T20:25:08.709Z
Reserved: 2025-04-15T19:15:22.568Z
Link: CVE-2025-34186

Updated: 2025-09-16T20:25:02.676Z

Status : Received
Published: 2025-09-16T20:15:34.720
Modified: 2025-09-16T20:15:34.720
Link: CVE-2025-34186

No data.

No data.