{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14276","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-08T16:23:09.183Z","datePublished":"2025-12-08T21:32:08.167Z","dateUpdated":"2026-02-24T05:44:58.788Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T05:44:58.788Z"},"title":"Ilevia EVE X1 Server leaf_search.php command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Ilevia","product":"EVE X1 Server","versions":[{"version":"4.6.5.0.eden","status":"affected"}],"cpes":["cpe:2.3:o:ilevia:eve_x1_server_firmware:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A vulnerability was determined in Ilevia EVE X1 Server up to 4.6.5.0.eden. Impacted is an unknown function of the file /ajax/php/leaf_search.php. This manipulation of the argument line causes command injection. The attack can be initiated remotely. A high degree of complexity is needed for the attack. The exploitability is considered difficult. The exploit has been publicly disclosed and may be utilized. Upgrading the affected component is recommended. The vendor confirms the issue and recommends: \"We already know that issue and on most devices are already solved, also it’s not needed to open the port to outside world so we advised our customer to close it\"."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.6,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.6,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.1,"vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2025-12-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-08T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-09T00:29:34.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"niix330 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.334802","name":"VDB-334802 | Ilevia EVE X1 Server leaf_search.php command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.334802","name":"VDB-334802 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.702649","name":"Submit #702649 | Ilevia Srl. Ilevia EVE X1 Server 4.6.5.0.eden Command Injection","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.715521","name":"Submit #715521 | Ilevia Srl Ilevia EVE X1/X5 Server 4.6.5.0.eden Command Injection (Duplicate)","tags":["third-party-advisory"]},{"url":"https://www.yuque.com/yuqueyonghuexlgkz/zepczx/ahygt5u6sgqpk5tt?singleDoc","tags":["broken-link","exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-09T14:38:11.471505Z","id":"CVE-2025-14276","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-09T16:05:40.812Z"}}]}}