Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 09 Jan 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:o:xspeeder:sxzos:*:*:*:*:*:*:*:* |
Mon, 29 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xspeeder
Xspeeder sxzos |
|
| Vendors & Products |
Xspeeder
Xspeeder sxzos |
Mon, 29 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 27 Dec 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Xspeeder SXZOS through 2025-12-26 allows root remote code execution via base64-encoded Python code in the chkid parameter to vLogin.py. The title and oIP parameters are also used. | |
| Weaknesses | CWE-95 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-29T16:51:30.437Z
Reserved: 2025-07-20T00:00:00.000Z
Link: CVE-2025-54322
Updated: 2025-12-29T16:43:44.580Z
Status : Analyzed
Published: 2025-12-27T14:15:49.547
Modified: 2026-01-09T20:33:24.920
Link: CVE-2025-54322
No data.
OpenCVE Enrichment
Updated: 2025-12-29T23:04:00Z