CVE-2025-60739

9.6 CRITICAL

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in Ilevia EVE X1 Server firmware allows remote attackers to execute arbitrary code via the /bh_web_backend component. This affects Ilevia EVE X1 Server firmware versions v4.7.18.0.eden and earlier with Logic Version v6.00 - 2025_07_21. Attackers can trick authenticated users into performing unintended actions that lead to code execution.

💻 Affected Systems

Products:
  • Ilevia EVE X1 Server
Versions: Firmware v4.7.18.0.eden and earlier, Logic Version v6.00 - 2025_07_21
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the web interface to be accessible and an authenticated user to be tricked into visiting a malicious page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker gains full system control, installs persistent malware, pivots to internal networks, and exfiltrates sensitive data.

🟠

Likely Case

Attacker executes arbitrary commands on the server, potentially compromising the device and any connected systems or data.

🟢

If Mitigated

Attack fails due to CSRF protections, proper network segmentation, or lack of authenticated user interaction.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires social engineering to trick an authenticated user, but the technical execution is straightforward once the user interacts with malicious content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check vendor website for firmware updates. If available, download and apply the latest firmware version following vendor instructions.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to all state-changing requests in the web interface.

Restrict Network Access

linux

Limit access to the web interface to trusted IP addresses only.

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Isolate the device on a separate VLAN with strict firewall rules blocking all unnecessary inbound/outbound traffic.
  • Disable the web interface if not required and use alternative management methods.

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface or via SSH: grep -i version /etc/version or similar vendor-specific command.

Check Version:

Check web interface admin panel or vendor-specific CLI command (exact command unknown).

Verify Fix Applied:

Verify firmware version is newer than v4.7.18.0.eden and test CSRF protection by attempting to submit a form without valid tokens.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /bh_web_backend from unexpected sources
  • Multiple failed authentication attempts followed by successful CSRF exploitation

Network Indicators:

  • HTTP requests to /bh_web_backend with suspicious parameters from external IPs
  • Outbound connections from the device to unknown IPs post-exploit

SIEM Query:

source="ilevia_logs" AND uri="/bh_web_backend" AND method="POST"

🔗 References

📤 Share & Export