CVE-2025-10822
📋 TL;DR
CVE-2025-10822 is an improper authorization vulnerability in the fuyang_lipengjun platform 1.0 that allows unauthorized access to SMS log data via the SysSmsLogController function. Attackers can remotely exploit this to view sensitive SMS logs without proper authentication. Organizations using fuyang_lipengjun platform 1.0 are affected.
💻 Affected Systems
- fuyang_lipengjun platform
📦 What is this software?
Platform by Fuyang Lipengjun
⚠️ Risk & Real-World Impact
Worst Case
Complete exposure of all SMS log data including potentially sensitive user information, message contents, and metadata to unauthorized parties.
Likely Case
Unauthorized viewing of SMS logs containing user phone numbers, timestamps, and potentially message content or metadata.
If Mitigated
Limited to no impact if proper authentication and authorization controls are implemented and enforced.
🎯 Exploit Status
Exploit has been publicly disclosed and requires some authentication but bypasses authorization checks. Attackers need some level of access to the system.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown - check vendor for updated version
Vendor Advisory: Not available - check project repository or maintainer
Restart Required: No
Instructions:
1. Contact the fuyang_lipengjun platform maintainers for patch information. 2. Apply any available security updates. 3. Review and update authorization logic for SysSmsLogController.
🔧 Temporary Workarounds
Access Control Restriction
allImplement proper authorization checks before allowing access to SMS log data
Implement role-based access control for /sys/smslog/queryAll endpoint
Network Segmentation
allRestrict network access to the vulnerable endpoint
Configure firewall rules to limit access to /sys/smslog/* paths
🧯 If You Can't Patch
- Implement strict authentication and authorization middleware for all sensitive endpoints
- Monitor access to /sys/smslog/queryAll endpoint and alert on unauthorized attempts
🔍 How to Verify
Check if Vulnerable:
Test if unauthorized users can access /sys/smslog/queryAll endpoint and retrieve SMS log data
Check Version:
Check platform configuration files or admin interface for version information
Verify Fix Applied:
Verify that proper authorization checks are enforced before allowing access to SMS log data
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to /sys/smslog/queryAll
- Multiple failed authentication attempts followed by successful SMS log access
Network Indicators:
- Unusual traffic patterns to SMS log endpoints
- Requests to /sys/smslog/queryAll from unauthorized IPs
SIEM Query:
source="web_logs" AND (uri="/sys/smslog/queryAll" OR uri="/sys/smslog/*") AND (user="unauthorized" OR auth_status="failed")