Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') (CWE-95)
Xspeeder SXZOS through version 2025-12-26 contains an eval injection vulnerability in vLogin.py that allows unauthenticated remote code execution. The vulnerability exists in the chkid parameter, which accepts base64-encoded Python code that is improperly executed. The title and oIP parameters are also involved in the attack vector.
Unauthenticated network attackers can exploit this vulnerability to achieve root-level remote code execution with complete system compromise. Attackers can execute arbitrary Python code without authentication or user interaction, resulting in total confidentiality, integrity, and availability breaches. Active exploitation has been reported affecting approximately 70,000 hosts worldwide.
Multiple proof-of-concept exploits are available on pwn.ai, github.com. There is no evidence of proof of exploitation at the moment.
Versions released after 2025-12-26 contain patches for this vulnerability. Organizations should upgrade to patched versions immediately.
Immediately upgrade Xspeeder SXZOS systems to a version released after 2025-12-26. Implement network segmentation to restrict access to the vLogin.py endpoint. Monitor for suspicious requests to vLogin.py containing base64-encoded payloads in the chkid parameter. Implement Web Application Firewall (WAF) rules to block requests with suspicious base64 encoding patterns to vLogin.py. Given the active exploitation affecting 70,000 hosts and the trivial attack complexity, this should be treated as a critical priority for immediate patching.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
NVD published the first details for CVE-2025-54322
A CVSS base score of 10 has been assigned.
Feedly found the first article mentioning CVE-2025-54322. See article
Feedly estimated the CVSS as HIGH based on the CVE details, attack complexity, and exploit information. Learn more
This CVE started to trend in security discussions
FIRST assigned an EPSS Score of 0.29% (Percentile: 51.8%)
RedHat CVE advisory released a security advisory (CVE-2025-54322).
CVE-2025-54322 is a critical vulnerability with a CVSS score of 10.0, allowing unauthenticated remote attackers to execute arbitrary Python code with root privileges on XSpeeder SXZOS firmware via a malformed HTTP request, affecting over 70,000 corporate gateways. The vulnerability stems from a lack of input validation in the vLogin.py script, and exploitation is categorized as low complexity, requiring no user interaction or prior credentials. There is no information provided regarding proof-of-concept exploits, mitigations, detections, patches, or downstream impacts on third-party vendors or technology. See article
This CVE stopped trending in security discussions
CVE-2025-54322
Weekly Intelligence Report - 09 January 2026
Trending Topics
How CVE-2025-54322 is Turning 70,000+ Corporate Gateways into Hacker Backdoors
8 changes (2 new | 6 updated):
2026s Unsettling Opening Act
⚡ Weekly Recap: AI Automation Exploits, Telecom Espionage, Prompt Poaching & More
⚡ Weekly Recap: AI Automation Exploits, Telecom Espionage, Prompt Poaching & More
Weekly Intelligence Report - 09 January 2026