CVE-2025-34035

CRITICAL EXPLOITED NUCLEI

EnGenius EnShare Cloud Service <1.4.11 - Command Injection

Title source: llm

Description

An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise. Exploitation evidence was observed by the Shadowserver Foundation on 2024-12-05 UTC.

Exploits (1)

exploitdb WORKING POC
by LiquidWorm · pythonwebappshardware
https://www.exploit-db.com/exploits/42114

Nuclei Templates (1)

EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 Root Remote Code Execution
CRITICALVERIFIEDby intelligent-ears
Shodan: html:"/web/cgi-bin/usbinfo.cgi"
FOFA: body="/web/cgi-bin/usbinfo.cgi"

Scores

CVSS v3 9.8
EPSS 0.1015
EPSS Percentile 93.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2025-06-23
CWE
CWE-78
Status published
Products (50)
EnGenius/EnShare IoT Gigabit Cloud Service < 1.4.11
engeniustech/epg5000_firmware 1.2.0
engeniustech/epg5000_firmware 1.3.0
engeniustech/epg5000_firmware 1.3.2
engeniustech/epg5000_firmware 1.3.3
engeniustech/epg5000_firmware 1.3.3.17
engeniustech/epg5000_firmware 1.3.7.20
engeniustech/epg5000_firmware 1.3.9.21
engeniustech/esr1200_firmware 1.1.0
engeniustech/esr1200_firmware 1.3.1.34
... and 40 more
Published Jun 24, 2025
Tracked Since Feb 18, 2026