CVE-2025-65897

8.8 HIGH

📋 TL;DR

This vulnerability in zdh_web allows authenticated users to upload arbitrary files to any location on the server due to insufficient path validation. Attackers can overwrite critical system files, potentially leading to privilege escalation or remote code execution. All users running zdh_web versions through 5.6.17 are affected.

💻 Affected Systems

Products:
  • zdh_web
Versions: through 5.6.17
Operating Systems: Any OS running zdh_web
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with file upload functionality enabled are vulnerable. Requires authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via remote code execution, data theft, and complete control of the zdh_web platform and underlying server.

🟠

Likely Case

Privilege escalation within zdh_web, unauthorized data access, and potential lateral movement to other systems.

🟢

If Mitigated

Limited impact with proper file system permissions and network segmentation, potentially only affecting zdh_web application files.

🌐 Internet-Facing: HIGH - If zdh_web is exposed to the internet, attackers can exploit authenticated access to gain full control.
🏢 Internal Only: HIGH - Even internally, authenticated users or compromised accounts can exploit this to escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once credentials are obtained. The vulnerability is well-documented in GitHub issues.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.6.18 or later

Vendor Advisory: https://github.com/zhaoyachao/zdh_web/commit/b2423378a8bf83f159f19ce4e14eac71c939793a

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Update zdh_web to version 5.6.18 or later from the official GitHub repository. 3. Restart the zdh_web service. 4. Verify the fix by testing file upload functionality.

🔧 Temporary Workarounds

Disable file upload functionality

all

Temporarily disable file upload features in zdh_web configuration

Edit zdh_web configuration to remove or disable upload endpoints

Restrict file system permissions

linux

Set strict file system permissions to limit where zdh_web can write files

chmod 750 /path/to/zdh_web/uploads
chown root:zdh_web /path/to/zdh_web/uploads

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate zdh_web from critical systems
  • Enforce least privilege access controls and monitor all authenticated user activity

🔍 How to Verify

Check if Vulnerable:

Check zdh_web version in web interface or configuration files. Versions 5.6.17 and earlier are vulnerable.

Check Version:

Check web interface or grep for version in configuration files

Verify Fix Applied:

Test file upload functionality with malicious path traversal attempts. Successful uploads should be restricted to designated directories.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns
  • Path traversal attempts in upload requests
  • Unauthorized file writes outside upload directories

Network Indicators:

  • HTTP POST requests to upload endpoints with suspicious path parameters

SIEM Query:

source="zdh_web" AND (http_method="POST" AND uri_path="*upload*" AND (request_contains="../" OR request_contains="..\"))

🔗 References

📤 Share & Export