3080ipx-10G - RCE (CVE-2025-4009)
88Exploiting IPs reported
The Evertz SDVN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product features, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, also named ‘ewb’ by Evertz. This web interface has two endpoints that are vulnerable to arbitrary command injection and the authentication mechanism has a flaw leading to authentication bypass. Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices. This level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others.
CrowdSec analysis
CVE-2025-4009 is a critical vulnerability in the Evertz 3080ipx-10G and related products that allows remote, unauthenticated attackers to bypass authentication and execute arbitrary commands as root via exposed web management endpoints. Exploitation of this flaw could result in full system compromise, enabling attackers to disrupt media streaming, alter broadcast content, or manipulate closed captions, posing significant risks to broadcast and media operations.
CrowdSec has been tracking this vulnerability and its exploits since 17th of June 2025.
Insights from the CrowdSec network reveal that the attackers trying to exploit CVE-2025-4009 are composed of a fairly even mix of opportunistic and targeted actors. Some attackers employ preliminary reconnaissance, while others use indiscriminate scanning. Data from the CrowdSec community also indicates a gradual decrease in attacks targeting CVE-2025-4009. While still present in the wild, exploitation levels have dropped noticeably week-over-week. This may signal that the vulnerability is becoming less relevant or that defenses are improving fast enough for attackers to lose interest.
Attackers may probe for or attempt to interact with endpoints such a login.php
and feature-transfer-export.php
on vulnerable parameters, which can be a sign of RCE attempts or reconnaissance.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.