CVE-2025-34035

9.8 CRITICAL

📋 TL;DR

An unauthenticated remote OS command injection vulnerability in EnGenius EnShare Cloud Service allows attackers to execute arbitrary shell commands with root privileges. This affects version 1.4.11 and earlier, enabling complete system takeover. The vulnerability is actively exploited in the wild.

💻 Affected Systems

Products:
  • EnGenius EnShare Cloud Service
Versions: 1.4.11 and earlier
Operating Systems: Embedded Linux systems running EnShare
Default Config Vulnerable: ⚠️ Yes
Notes: The usbinteract.cgi script is typically accessible without authentication in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root access, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Unauthenticated attackers gain root shell access, install cryptocurrency miners or botnet clients, and pivot to internal networks.

🟢

If Mitigated

If properly segmented and monitored, lateral movement is limited but initial compromise still occurs.

🌐 Internet-Facing: HIGH - The vulnerable service is typically internet-facing and exploitation requires no authentication.
🏢 Internal Only: MEDIUM - If exposed internally, attackers could pivot from other compromised systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit scripts exist, and Shadowserver observed active exploitation in December 2024.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

No official patch available. Consider workarounds or replacement.

🔧 Temporary Workarounds

Disable usbinteract.cgi script

linux

Remove or restrict access to the vulnerable CGI script

mv /www/cgi-bin/usbinteract.cgi /www/cgi-bin/usbinteract.cgi.disabled
chmod 000 /www/cgi-bin/usbinteract.cgi.disabled

Network access control

linux

Restrict access to EnShare service using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_networks -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Immediately isolate affected devices from internet and critical internal networks
  • Implement strict network segmentation and monitor for suspicious outbound connections

🔍 How to Verify

Check if Vulnerable:

Check if usbinteract.cgi exists and is accessible: curl -v http://device-ip/cgi-bin/usbinteract.cgi?path=test

Check Version:

Check device web interface or firmware version in administration panel

Verify Fix Applied:

Verify usbinteract.cgi is no longer accessible or returns 404/403

📡 Detection & Monitoring

Log Indicators:

  • Unusual CGI script access patterns
  • Suspicious commands in web server logs
  • Multiple failed then successful usbinteract.cgi requests

Network Indicators:

  • Unexpected outbound connections from EnShare devices
  • Traffic to known C2 servers or mining pools

SIEM Query:

source="web_logs" AND uri="/cgi-bin/usbinteract.cgi" AND (query CONTAINS "|" OR query CONTAINS ";" OR query CONTAINS "`")

🔗 References

📤 Share & Export