漏洞关键信息 基本信息 日期: December 30th, 2025 标题: (0Day) Anritsu ShockLine CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability 标识符: - ZDI-25-1199 - ZDI-CAN-27833 - CVE-2025-15348 漏洞评分与信息 CVSS 评分: 7.8 - AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 影响供应商: Anritsu 影响产品: ShockLine 漏洞详情 Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu ShockLine. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CHX files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process. Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the product. 其他细节 09/19/25 - ZDI submitted the report to the vendor 10/10/25 - ZDI asked for updates 12/10/25 - ZDI notified the vendor of the intention to publish the case as a 0-day advisory on 12/30/25 披露时间线 2025-09-19 - Vulnerability reported to vendor 2025-12-30 - Coordinated public release of advisory 2025-12-30 - Advisory Updated 致谢 Credit: kimiya