10.0
CRITICAL CVSS 3.1
CVE-2025-54322
Xspeeder SXZOS Remote Code Execution Vulnerability
Description

Xspeeder SXZOS through 2025-12-26 allows root remote code execution via base64-encoded Python code in the chkid parameter to vLogin.py. The title and oIP parameters are also used.

INFO

Published Date :

Dec. 27, 2025, 2:15 p.m.

Last Modified :

Jan. 9, 2026, 8:33 p.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2025-54322 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Xspeeder sxzos
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 CRITICAL [email protected]
CVSS 3.1 CRITICAL MITRE-CVE
CVSS 3.1 CRITICAL [email protected]
Solution
Remediate by restricting input to the chkid parameter and sanitizing all user-supplied data.
  • Sanitize all user-supplied input.
  • Validate and restrict input for chkid parameter.
  • Disable or restrict access to vLogin.py.
  • Update Xspeeder SXZOS to the latest version.
Public PoC/Exploit Available at Github

CVE-2025-54322 has a 3 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2025-54322.

URL Resource
https://pwn.ai/blog/cve-2025-54322-zeroday-unauthenticated-root-rce-affecting-70-000-hosts Exploit Third Party Advisory
https://www.xspeeder.com Product
https://pwn.ai/blog/cve-2025-54322-zeroday-unauthenticated-root-rce-affecting-70-000-hosts Exploit Third Party Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-54322 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Python

Updated: 3 weeks, 3 days ago
2 stars 0 fork 0 watcher
Born at : Dec. 31, 2025, 5:13 p.m. This repo has been linked 1 different CVEs too.

CVE-2025-54322 - XSpeeder SXZOS Pre-Auth RCE 0day Finder Quick

Python

Updated: 3 weeks, 5 days ago
5 stars 2 fork 2 watcher
Born at : Dec. 26, 2025, 8:54 p.m. This repo has been linked 1 different CVEs too.

爬取secwiki和xuanwu.github.io/sec.today,分析安全信息站点、安全趋势、提取安全工作者账号(twitter,weixin,github等)

Python HTML

Updated: 2 weeks, 3 days ago
1409 stars 236 fork 236 watcher
Born at : Feb. 19, 2019, 10:24 a.m. This repo has been linked 11 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-54322 vulnerability anywhere in the article.

  • Daily CyberSecurity
One Request to Rule Them All: Critical Trendnet Flaw (CVE-2025-15471) Allows Total Takeover

A critical pre-authentication command injection vulnerability has been uncovered in the Trendnet TEW-713RE Wi-Fi extender, allowing remote attackers to seize full control of the device with a single H ... Read more

Published Date: Jan 08, 2026 (2 weeks, 4 days ago)
  • Daily CyberSecurity
CVE-2025-60262: Critical Misconfiguration in H3C Wireless Gear Hands Control to Hackers

A glaring configuration oversight in select H3C wireless controllers and access points has opened the door for remote attackers to seize root-level control of the devices. The vulnerability, tracked a ... Read more

Published Date: Jan 08, 2026 (2 weeks, 4 days ago)
  • Daily CyberSecurity
Self-Hosters Beware: 3 Critical Coolify Flaws Grant Root Access

The self-hosting community is on high alert following the disclosure of three critical vulnerabilities in Coolify, the open-source platform designed to simplify application deployment. Security resear ... Read more

Published Date: Jan 07, 2026 (2 weeks, 5 days ago)
  • Daily CyberSecurity
The 1000Hz Illusion: NVIDIA Unveils G-SYNC Pulsar and DLSS 4.5 at CES 2026

As CES 2026 approaches, NVIDIA unveiled a slate of consumer-facing updates for gamers and creators during its pre-show event. Highlights include G-SYNC Pulsar technology, capable of delivering 1000Hz- ... Read more

Published Date: Jan 07, 2026 (2 weeks, 5 days ago)
  • Daily CyberSecurity
CVE-2025-14026: Forcepoint DLP Flaw Lets Attackers Unchain Restricted Python

A high-severity vulnerability in the Forcepoint One DLP Client has been disclosed, revealing a method for attackers to break out of a vendor-imposed “sandbox” and execute arbitrary code on protected e ... Read more

Published Date: Jan 07, 2026 (2 weeks, 5 days ago)
  • Daily CyberSecurity
Google Patches High-Severity “WebView” Flaw in Chrome 143

Google has announced an important security update for the Stable channel of its Chrome browser, rolling out patches to Windows, Mac, and Linux users to address a high-severity vulnerability that could ... Read more

Published Date: Jan 07, 2026 (2 weeks, 5 days ago)
  • Daily CyberSecurity
Zero-Day Chronomaly Exploit Grants Root Access to Vulnerable Linux Kernels

Cybersecurity researcher farazsth98 has presented new findings related to an exploited security issue in Linux kernel flaw that could be abused by an attacker to privilege escalation. The vulnerabilit ... Read more

Published Date: Jan 07, 2026 (2 weeks, 5 days ago)
  • Daily CyberSecurity
CVE-2025-67732: Dify Patch Fixes High-Severity Plaintext API Key Exposure

Dify, the popular open-source platform used by developers to build Large Language Model (LLM) applications and RAG pipelines, has patched a high-severity vulnerability that could leave administrators ... Read more

Published Date: Jan 07, 2026 (2 weeks, 5 days ago)
  • Daily CyberSecurity
n8n Sandbox Escape: How CVE-2025-68668 Turns Workflows into Weapons

A critical vulnerability in the popular workflow automation platform n8n has been dissected in a new analysis by security researcher Rhoda Smart, revealing how a feature designed for flexibility becam ... Read more

Published Date: Jan 06, 2026 (2 weeks, 6 days ago)
  • Daily CyberSecurity
The Robotics Revolution: NVIDIA Unveils Physical AI and the Jetson T4000 at CES 2026

At CES 2026 this year, NVIDIA shifted its focus decisively from the digital realm of generative AI toward “Physical AI”—systems designed to interact directly with the real world. NVIDIA CEO Jensen Hua ... Read more

Published Date: Jan 06, 2026 (2 weeks, 6 days ago)
  • Daily CyberSecurity
The Desk-Side Revolution: NVIDIA’s DGX Spark Update Delivers 2.5× AI Speed Boost

As downloads of open-source AI models and frameworks are expected to surge explosively in 2026, NVIDIA announced a major update to its desktop AI development platform, DGX Spark, at CES 2026. This upd ... Read more

Published Date: Jan 06, 2026 (2 weeks, 6 days ago)
  • Daily CyberSecurity
CVE-2025-68428: Critical Flaw in jsPDF Library Allows Server-Side File Theft

A critical vulnerability has been discovered in jsPDF, one of the most popular JavaScript libraries for generating PDF documents. The flaw, assigned a scorching CVSS score of 9.2, allows attackers to ... Read more

Published Date: Jan 06, 2026 (2 weeks, 6 days ago)
  • Daily CyberSecurity
Aiohttp Patches Seven Vulnerabilities Including High-Severity DoS Risks

Maintainers of aiohttp, the popular asynchronous HTTP client/server framework for Python, have released a sweeping security update addressing seven distinct vulnerabilities. The update, version 3.13.3 ... Read more

Published Date: Jan 06, 2026 (2 weeks, 6 days ago)
  • Daily CyberSecurity
Apache SIS Patch Blocks XML Attack That Leaks Server Files

The Apache Software Foundation has issued a security advisory for the Apache Spatial Information System (SIS), a key Java library used for developing geospatial applications. A newly discovered vulner ... Read more

Published Date: Jan 06, 2026 (2 weeks, 6 days ago)
  • Daily CyberSecurity
CVE-2025-66518: High-Severity Flaw in Apache Kyuubi Exposes Local Server Files

Apache Kyuubi, the distributed gateway designed to provide secure, serverless SQL access to massive data lakes, has patched a high-severity vulnerability that could allow unauthorized access to the se ... Read more

Published Date: Jan 06, 2026 (2 weeks, 6 days ago)
  • Daily CyberSecurity
Attacking from Within: How Adobe ColdFusion Admins Can Weaponize Remote Shares

Image: Brian Adobe has issued critical updates for its ColdFusion platform after security researcher Brian Reilly uncovered a clever logic flaw that allows authenticated administrators to turn a stand ... Read more

Published Date: Jan 06, 2026 (2 weeks, 6 days ago)
  • Daily CyberSecurity
New TCC Bypass (CVE-2025-43530) Exposes macOS to Unchecked Automation

Apple’s privacy fortress, the Transparency, Consent, and Control (TCC) framework, has been breached once again. Security researcher Mickey Jin (@patch1t) has disclosed a sophisticated new vulnerabilit ... Read more

Published Date: Jan 06, 2026 (2 weeks, 6 days ago)
  • Daily CyberSecurity
Riot Games Login Outage Traced to Expired SSL Certificate

odified Chrome TLS certificate error page Source: urlscan) The well-known game developer Riot Games recently suffered another widespread service disruption after failing to renew an expired digital ce ... Read more

Published Date: Jan 05, 2026 (3 weeks ago)
  • Daily CyberSecurity
Systems over Slop: Nadella’s 2026 AI Vision Sparks “Microslop” Revolt

As the first week of 2026 unfolds, Microsoft CEO Satya Nadella published his latest reflections on the state of the AI industry on his newly launched personal blog, SN Scratchpad. In the post, he urge ... Read more

Published Date: Jan 05, 2026 (3 weeks ago)
  • Daily CyberSecurity
CVE-2026-21440: New AdonisJS 9.2 Critical Flaw Allows Arbitrary File Writes and RCE

A critical security vulnerability has been discovered in AdonisJS, a popular full-stack Node.js web framework known for its focus on ergonomics and speed. The flaw, assigned a CVSS score of 9.2, resid ... Read more

Published Date: Jan 05, 2026 (3 weeks ago)

The following table lists the changes that have been made to the CVE-2025-54322 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Jan. 09, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-94
    Added CPE Configuration OR *cpe:2.3:o:xspeeder:sxzos:*:*:*:*:*:*:*:* versions up to (including) 2025-12-26
    Added Reference Type CISA-ADP: https://pwn.ai/blog/cve-2025-54322-zeroday-unauthenticated-root-rce-affecting-70-000-hosts Types: Exploit, Third Party Advisory
    Added Reference Type MITRE: https://pwn.ai/blog/cve-2025-54322-zeroday-unauthenticated-root-rce-affecting-70-000-hosts Types: Exploit, Third Party Advisory
    Added Reference Type MITRE: https://www.xspeeder.com Types: Product
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Dec. 29, 2025

    Action Type Old Value New Value
    Added Reference https://pwn.ai/blog/cve-2025-54322-zeroday-unauthenticated-root-rce-affecting-70-000-hosts
  • New CVE Received by [email protected]

    Dec. 27, 2025

    Action Type Old Value New Value
    Added Description Xspeeder SXZOS through 2025-12-26 allows root remote code execution via base64-encoded Python code in the chkid parameter to vLogin.py. The title and oIP parameters are also used.
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    Added CWE CWE-95
    Added Reference https://pwn.ai/blog/cve-2025-54322-zeroday-unauthenticated-root-rce-affecting-70-000-hosts
    Added Reference https://www.xspeeder.com
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 10.0
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact