CVE-2025-46581

9.8 CRITICAL

📋 TL;DR

ZTE's ZXCDN product has a critical Apache Struts vulnerability allowing unauthenticated remote code execution. Attackers can execute arbitrary commands with non-root privileges on affected systems. This affects all organizations using vulnerable ZXCDN deployments.

💻 Affected Systems

Products:
  • ZTE ZXCDN
Versions: Specific versions not detailed in advisory; all vulnerable versions should be assumed affected
Operating Systems: Linux-based systems running ZXCDN
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in Apache Struts framework implementation within ZXCDN product

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, lateral movement, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Unauthenticated attackers gain shell access, install cryptocurrency miners, exfiltrate sensitive data, or use the system as a pivot point for further attacks.

🟢

If Mitigated

If properly segmented and monitored, impact limited to the affected ZXCDN system with no lateral movement to critical assets.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Struts RCE vulnerabilities are frequently weaponized; unauthenticated nature makes this highly attractive to attackers

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check ZTE advisory for specific patched versions

Vendor Advisory: https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/3747693852734546826

Restart Required: Yes

Instructions:

1. Review ZTE advisory 2. Download appropriate patch from ZTE support portal 3. Apply patch following ZTE documentation 4. Restart ZXCDN services 5. Verify patch application

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ZXCDN systems from internet and restrict internal network access

WAF Rule Implementation

all

Deploy web application firewall rules to block Struts exploitation patterns

🧯 If You Can't Patch

  • Immediately isolate affected systems from network
  • Implement strict network access controls and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check ZXCDN version against ZTE advisory; systems running vulnerable Struts versions are affected

Check Version:

Check ZXCDN administration interface or consult ZTE documentation for version command

Verify Fix Applied:

Verify ZXCDN version matches patched version in ZTE advisory and test for Struts vulnerability

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to Struts endpoints
  • Command execution patterns in web logs
  • Unexpected process creation from web server

Network Indicators:

  • HTTP requests with OGNL expressions
  • Outbound connections from ZXCDN to suspicious IPs

SIEM Query:

source="ZXCDN" AND (http_uri="*.action" OR http_uri="*.do") AND (http_user_agent CONTAINS "curl" OR http_user_agent CONTAINS "wget")

🔗 References

📤 Share & Export