Resources
>
Research
>
Security Advisory: Remote Code Execution on Evertz SDVN (CVE-2025-4009)

Security Advisory: Remote Code Execution on Evertz SDVN (CVE-2025-4009)

Security Advisory: Remote Code Execution on Evertz SDVN (CVE-2025-4009)
Quentin Kaiser
Quentin Kaiser
Lead Security Researcher
TablE of contents

READY TO UPGRADE YOUR RISK MANAGEMENT?

Make cybersecurity and compliance efficient and effective with ONEKEY.

Book a Demo

Since the inception of ONEKEY Research Labs, we coordinated vulnerability disclosures with more than 20 vendors for close to 50 different vulnerabilities. While we sometimes had to agree on deadline extensions given the unique nature of affected devices, we never had to go full disclosure due to the absence of answer from the vendor. Until today.

We tried to report this unauthenticated command injection to Evertz through different channels (emails, LinkedIn, Twitter) and ended up opening up a case with CERT.CC but heard nothing back from them. We're therefore publishing details today (May 28th 2025) two days after the 90-days deadline (May 26th 2025).

Evertz is quite ubiquitous in the broadcasting industry and we feel it is our responsibility to make the administrators of those networks aware that such a flaw affects virtually all product lines of Evertz since it affects the core of their web admin interface, which is shared by all devices.

Unauthenticated Arbitrary Command Injection

Affected
vendor &
product
The following systems are considered to be affected, but not all of them were tested:
  • Evertz SDVN 3080ipx-10G (confirmed)
  • Evertz MViP-II
  • Evertz cVIP
  • Evertz 7890IXG
  • Evertz CC Access Server
  • Evertz 5782XPS-APP-4E
  • ewb v.1.4, v1.5, v1.6 (confirmed)
Vendor
Advisory
N/A
Vulnerable
version
All
Fixed version N/A
CVE IDs CVE-2025-4009
Impact
(CVSS)
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:N/AU:Y/V:C
(9.3 - Critical)
Credit ONEKEY Research Lab

Summary

The Evertz SDVN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product features, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, also named ‘ewb’ by Evertz.

This web interface has two endpoints that are vulnerable to arbitrary command injection and the authentication mechanism has a flaw leading to authentication bypass.

Impact

Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.

This level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others.

Description

The file usr/htdocs/v.1.5/php/features/feature-transfer-import.php builds a command from user controlled parameters action , filename , and slot :

Since no sanitization is applied, this allows for arbitrary command injections by sending requests like this:

curl 'http://ip.of.device/v.1.5/php/features/feature-transfer-import.php?action=id;&filename=&varid=&slot='

Similarly, the file usr/htdocs/v.1.5/php/features/feature-transfer-export.php builds a command from user controlled parameters action, filename, and slot:

Since no sanitization is applied, this allows for arbitrary command injections by sending requests like this:

curl 'http://ip.of.device/v.1.5/php/features/feature-transfer-export.php?action=id;&filename=&varid=&slot='

While exploitation is limited to authenticated users, we have found a way to bypass authentication.

In usr/htdocs/login.php, the following logic can be observed:

preauthorized users ? what's this ?

So if a user sends a request with an authorized GET parameter, the parseAuthorizedUsers function is called. This function expects a JSON structure or a base64 encoded JSON structure. The structure is parsed and a user with a role attached is created from the data provided in the JSON structure. There is no validation in place and more importantly no authentication checks, such as checking that the parameter was created by the application itself.

Therefore, an unauthenticated user can gain access as an administrator by crafting a valid base64 encoded JSON structure
representing an admin user with a role without restrictions.

The authentication bypass can be achieved with this curl command. We can see from the server response that the user is indeed authenticated.

easy-loggedin indeed

By combining both the authentication bypass and the command injection, unauthenticated arbitrary command injection can be obtained.

Key Takeaways

First Full Disclosure in 90-Day Process - After coordinating nearly 50 vulnerabilities across 20+ vendors, this marks our first public disclosure—published two days past the 90-day deadline—due solely to Evertz’s unresponsiveness.

Unauthenticated Root-Level Command Injection - The PHP-based webEASY (ewb) interface in multiple Evertz product lines allows remote attackers to achieve arbitrary shell execution as root, due to two feature endpoints that accept unsanitized parameters combined with an authentication-bypass.

Broad Product Impact - All major Evertz devices sharing the vulnerable web admin core are at risk of full system compromise.

Serious Business Consequences - Exploitation can disrupt or manipulate video streams, tamper with closed captions, and interrupt broadcast operations, posing severe operational and reputational damage.

Immediate Mitigation Recommended - Administrators should isolate Evertz web management interfaces from untrusted networks, apply network-level access controls, and monitor for anomalous web requests or shell-spawning processes pending an official vendor patch.

Timeline

  • 25/02/2025 - ONEKEY sends a notification to Service@evertz.com
  • 28/02/2025 - ONEKEY sends a notification to Service@evertz.com, info@evertz.com, security@evertz.com, psirt@evertz.com, support@evertz.com
  • 28/03/2025 - ONEKEY sends a reminder to Service@evertz.com, info@evertz.com, security@evertz.com, psirt@evertz.com, support@evertz.com, ukservice@evertz.com, sales@evertz.com, Vertrieb@evertz.com
  • 10/04/2025 - ONEKEY attempts to get in touch with Evertz through its @EvertzTV account on x.com
  • 11/04/2025 - ONEKEY sends inmails to different Linkedin users working in cybersecurity teams at Evertz
  • 27/04/2025 - ONEKEY opens a case with CERT.CC on VINCE (Vulnerability Information and Coordination Environment)
  • 28/05/2025 - ONEKEY publish this advisory

Share

About Onekey

ONEKEY is the leading European specialist in Product Cybersecurity & Compliance Management and part of the investment portfolio of PricewaterhouseCoopers Germany (PwC). The unique combination of the automated ONEKEY Product Cybersecurity & Compliance Platform (OCP) with expert knowledge and consulting services provides fast and comprehensive analysis, support, and management to improve product cybersecurity and compliance from product purchasing, design, development, production to end-of-life.

CONTACT:
Sara Fortmann

Senior Marketing Manager
sara.fortmann@onekey.com

euromarcom public relations GmbH
team@euromarcom.de

RELATED RESEARCH ARTICLES

Security Advisory: Remote Code Execution on Diviotec IP Camera (CVE-2025-5113)
Security Advisory: Remote Command Execution on Netcomm NTC 6200 and NWL 222
Security Advisory: Remote Command Execution on Smartbedded MeteoBridge (CVE-2025-4008)

Ready to automate your Product Cybersecurity & Compliance?

Make cybersecurity and compliance efficient and effective with ONEKEY.