Evertz SDN Vulnerability Allows Arbitrary Command Execution

Home/Arbitrary Code Execution, Internet Security, Security Advisory, Security Update, vulnerability/Evertz SDN Vulnerability Allows Arbitrary Command Execution

Evertz SDN Vulnerability Allows Arbitrary Command Execution

A critical vulnerability (CVE-2025-4009) was found in Evertz’s Software Defined Video Network (SDVN) products, allowing attackers to run remote code without logging in.

Evertz SDN Vulnerability

Discovered by ONEKEY Research Labs, the issue affects the main web admin interface used across several Evertz devices, threatening global media systems.The problem is an unauthenticated command injection in the PHP-based webEASY (ewb) interface. Devices like the SDVN 3080ipx-10G, MViP-II, cVIP, 7890IXG, CC Access Server, and 5782XPS-APP-4E are all affected.

Attackers can send special HTTP requests to run commands as root without needing any credentials.

The vulnerability comes from two PHP files—feature-transfer-import.php and feature-transfer-export.php—which use user input (action, filename, slot) to build shell commands without checking or sanitizing the input.

This lets attackers run commands by sending a simple request like:

curl ‘http:///v.1.5/php/features/feature-transfer-import.php?action=id;&filename=&varid=&slot=’

or

curl ‘http:///v.1.5/php/features/feature-transfer-export.php?action=id;&filename=&varid=&slot=’

To make things worse, the login.php authentication is broken. Attackers can create a base64-encoded JSON string that mimics an admin account to bypass the login:

bashcurl 'http://<device-ip>/login.php?authorized=<base64-encoded-admin-json>'

Using both flaws, an attacker can take full control of the device without logging in, run commands as root, and fully compromise the system.

Affected Products

Product / ComponentStatusVulnerable VersionsFixed VersionCVE IDCVSS Score
Evertz SDVN 3080ipx-10GConfirmedAllN/ACVE-2025-40099.3
Evertz MViP-IISuspectedAllN/ACVE-2025-40099.3
Evertz cVIPSuspectedAllN/ACVE-2025-40099.3
Evertz 7890IXGSuspectedAllN/ACVE-2025-40099.3
Evertz CC Access ServerSuspectedAllN/ACVE-2025-40099.3
Evertz 5782XPS-APP-4ESuspectedAllN/ACVE-2025-40099.3
ewb v1.4, v1.5, v1.6ConfirmedAllN/ACVE-2025-40099.3

Business Impact

This critical vulnerability (CVSS 9.3) allows attackers to run commands as root without logging in. If exploited, it can lead to:

  • Stream disruptions – Live feeds can be stopped or changed.
  • Content tampering – Attackers might alter media or captions.
  • Full system takeover – Gaining root access to key broadcast systems.

Disclosure & Mitigation

Despite many contact attempts—including emails, social media, and CERT.CC—Evertz did not respond. As a result, the vulnerability was publicly disclosed two days after the 90-day deadline.

🔑 Key Points:

  • This is ONEKEY’s first full public disclosure after 50 coordinated advisories.
  • The flaw affects most Evertz products using the shared web admin backend.

🛡️ Recommended Actions:

  • Disconnect vulnerable interfaces from public or untrusted networks.
  • Restrict access at the network level.
  • Monitor traffic and logs for unusual web requests or shell activity.
  • Wait for vendor patches and apply them as soon as available.

‍Follow Us on: Twitter, InstagramFacebook to get the latest security news!

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!