On February 24, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert adding a critical vulnerability, CVE-2026-25108, to its Known Exploited Vulnerabilities (KEV) catalog. The flaw is an OS command injection vulnerability in the FileZen secure file transfer appliance, developed by Soliton Systems K.K.. Its inclusion in the KEV catalog confirms active, in-the-wild exploitation by malicious actors. This type of vulnerability is extremely dangerous as it can allow an attacker to execute arbitrary commands on the device's operating system, effectively leading to a full takeover. U.S. federal agencies are now required to remediate this flaw, and all other organizations are strongly advised to patch immediately.
CVE-2026-25108 is being actively exploited. Secure file transfer appliances are a high-value target for attackers because they are internet-facing, often process sensitive data, and can serve as a beachhead into a target's network. The use of automated, AI-enhanced tools for discovery and exploitation means that any unpatched, internet-accessible FileZen device is at immediate risk of compromise.
Security teams should monitor web server logs on their FileZen appliances for suspicious requests that may indicate exploitation attempts:
;, |, &&, $(...), or `.GET /some/script.php?filename=test.txt;whoami.D3-ITF - Inbound Traffic Filtering.whoami, id, uname, wget, curl) in URL requests.D3-SU - Software Update.The most critical action is to apply the security patches from Soliton Systems immediately.
Use a Web Application Firewall (WAF) to provide a virtual patch by blocking command injection attempts.
Restrict access to the file transfer appliance from the internet to only known, trusted IP addresses.
For a critical, actively exploited RCE vulnerability like CVE-2026-25108 in the FileZen appliance, the only truly effective remediation is to apply the vendor-supplied patch immediately. Given that attackers are using automated scanners to find vulnerable instances, any unpatched, internet-facing device is a ticking time bomb. Organizations must treat this as an emergency change, bypassing normal change management windows if necessary. A comprehensive asset inventory is crucial to ensure all instances of FileZen are identified and patched. This single action removes the vulnerability and is the most important step an organization can take.
As a defense-in-depth measure, organizations should place a Web Application Firewall (WAF) in front of their FileZen appliances. The WAF should be configured with a strict rule set to detect and block OS command injection attacks. This includes filtering for common shell metacharacters (;, |, &, ), command substitutions ($()), and known shell commands (wget, curl, whoami`) within URL parameters and other user-supplied input. This provides a 'virtual patch' that can protect the appliance from exploitation attempts while the official patch is being tested and deployed, and it offers ongoing protection against similar future vulnerabilities.
For organizations with vulnerable FileZen appliances, it is critical to assume compromise and hunt for evidence of it. System file analysis, often performed by an EDR agent or a file integrity monitoring (FIM) tool, should be used to scan the appliance's filesystem for unauthorized changes. Security teams should look for suspicious files in web-accessible directories, unexpected executables in /tmp or /var/tmp, and unauthorized modifications to system configuration files or cron jobs that could be used for persistence. Comparing a snapshot of the current filesystem against a known-good baseline is an effective way to identify an attacker's foothold.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats