CVE-2025-34163

CRITICAL EXPLOITED

Dongsheng Logistics Software - RCE

Title source: llm
STIX 2.1

Description

Dongsheng Logistics Software exposes an unauthenticated endpoint at /CommMng/Print/UploadMailFile that fails to enforce proper file type validation and access control. An attacker can upload arbitrary files, including executable scripts such as .ashx, via a crafted multipart/form-data POST request. This allows remote code execution on the server, potentially leading to full system compromise. The vulnerability is presumed to affect builds released prior to July 2025 and is said to be remediated in newer versions of the product, though the exact affected range remains undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-07-23 UTC.

References (3)

Core 3
Core References
Various Sources technical-description exploit
https://cn-sec.com/archives/4243708.html
Various Sources product patch
http://www.dongshengsoft.com/

Scores

CVSS v4 10.0
EPSS 0.0102
EPSS Percentile 77.3%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

VulnCheck KEV 2025-07-23
CWE
CWE-434
Status published
Products (1)
Qingdao Dongsheng Weiye Software Co., Ltd./Dongsheng Logistics Software < pre-July 2025 builds
Published Aug 27, 2025
Tracked Since Feb 18, 2026