CVE-2025-10398

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to upload arbitrary files to the fcba_zzm ics-park Smart Park Management System 2.0 due to insufficient validation in the FileUploadUtils.java component. Attackers can exploit this to upload malicious files, potentially leading to system compromise. Organizations using this specific parking management system version are affected.

💻 Affected Systems

Products:
  • fcba_zzm ics-park Smart Park Management System
Versions: 2.0
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with the vulnerable FileUploadUtils.java component exposed to network access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, or ransomware deployment across the parking management infrastructure.

🟠

Likely Case

File upload leading to web shell installation, data exfiltration, or service disruption of parking management functions.

🟢

If Mitigated

Limited impact with proper file validation and restricted execution environments preventing malicious file execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit details are publicly available in GitHub references, requiring some technical knowledge to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Contact vendor for patched version. 2. Apply vendor-provided patch. 3. Verify file upload functionality is properly secured.

🔧 Temporary Workarounds

Implement File Upload Restrictions

all

Configure web application firewall or server rules to block malicious file uploads.

🧯 If You Can't Patch

  • Isolate the system from internet access and restrict to internal network only.
  • Implement strict file type validation and size limits on all upload endpoints.

🔍 How to Verify

Check if Vulnerable:

Test file upload functionality with malicious file extensions to see if they're accepted without validation.

Check Version:

Check system documentation or admin interface for version information.

Verify Fix Applied:

Attempt to upload files with restricted extensions and verify they are rejected with proper error messages.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activity, especially with executable extensions
  • Large number of upload requests from single IP

Network Indicators:

  • HTTP POST requests to upload endpoints with suspicious file types
  • Unusual outbound connections after file uploads

SIEM Query:

source="web_logs" AND (uri="*upload*" OR uri="*file*" OR method="POST") AND (file_ext="*.jsp" OR file_ext="*.php" OR file_ext="*.exe")

🔗 References

📤 Share & Export