A critical remote code execution (RCE) vulnerability, tracked as CVE-2025-54322, has been disclosed in Xspeeder SXZOS networking appliances. The flaw allows a remote and unauthenticated attacker to execute arbitrary code with root privileges, effectively granting them complete control over the affected device. The vulnerability is present in the appliance's login endpoint and can be exploited by sending a specially crafted payload. Given its low complexity and high impact, this vulnerability poses a severe risk to organizations using this hardware. Immediate patching is strongly recommended.
The vulnerability exists in the /vLogin API endpoint of the Xspeeder SXZOS operating system. This endpoint fails to properly sanitize user-supplied input, allowing an attacker to submit a base64-encoded Python payload.
CVE-2025-54322The server decodes the submitted payload and executes it on the underlying system with root permissions. This allows an attacker to achieve full remote code execution without needing any prior access or credentials.
All versions of Xspeeder SXZOS up to and including the build released on December 26, 2025, are affected. Organizations using these networking appliances should assume they are vulnerable until a patch is applied.
The vulnerability was publicly disclosed on December 26, 2025. While there are no confirmed reports of active exploitation in the wild, the public nature of the disclosure and the simplicity of the exploit mean that weaponization is likely imminent. Attackers will almost certainly begin scanning the internet for exposed Xspeeder devices.
Exploitation of CVE-2025-54322 results in a full compromise of the Xspeeder appliance. An attacker with root access can:
Because networking appliances are often trusted devices at the edge of a network, their compromise can have catastrophic consequences for an organization's security posture.
Security teams can hunt for exploitation attempts by looking for specific network patterns.
| Type | Value | Description |
|---|---|---|
| url_pattern | /vLogin |
Any POST requests to this specific API endpoint should be considered highly suspicious. |
| network_traffic_pattern | Base64 strings in POST requests to /vLogin |
The exploit payload is base64-encoded. Payloads containing Python commands like os.system or subprocess.run are definitive indicators. |
| process_name | python |
A python process being spawned by the web server process on the appliance is a strong indicator of exploitation. |
/vLogin endpoint. This is a form of D3FEND's D3-NTA: Network Traffic Analysis./vLogin containing base64 data).CVE-2025-54322 to identify all affected appliances on the network.M1051 - Update Software.M1035 - Limit Access to Resource Over Network.Xspeeder vendor unresponsive for 7+ months regarding CVE-2025-54322, now confirmed CVSS 10.0 and unpatched. Discovered by AI agent, leaving users exposed.
New information reveals that Xspeeder, the vendor of SXZOS firmware, has been unresponsive for over seven months to disclosure attempts for CVE-2025-54322. The vulnerability now has a confirmed CVSS score of 10.0, making it a critical, unpatched RCE flaw. This lack of vendor support means no official patch is available, significantly increasing the risk to affected organizations. Researchers at Pwn.ai, who publicly disclosed the flaw, also claim it was discovered using an AI agent. Due to the vendor's unresponsiveness, the primary remediation advice is now to isolate or replace affected devices, as patching is not an option.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats