top of page

Critical 0day flaw Exposes Thousands of XSpeeder Devices

  • Dec 29, 2025
  • 2 min read

Key Findings


  • Vulnerability CVE-2025-54322 in XSpeeder networking devices allows for remote root access without a password.

  • The vulnerability earned a perfect 10.0 (Critical) CVSS score, the highest possible threat rating.

  • The vulnerability was discovered by the research firm pwn.ai using its proprietary AI tool.

  • Over 70,000 XSpeeder devices are currently exposed online due to this vulnerability.

  • Despite the research team's 7-month effort to notify the vendor, XSpeeder has not issued any patch or advisory to address the issue.


Background


XSpeeder is a Chinese vendor known for "edge" devices like routers, SD-WAN appliances, and smart TV controllers. Their core software, SXZOS, is used heavily in factories and remote offices.


To find the vulnerability, the pwn.ai tool tasked its "swarm" of AI agents to emulate these devices and hunt for weaknesses. These agents use a custom architecture built on decades of hacking experience to copy a device's behaviour and scan it for holes.


According to the technical research, the AI targeted a file called `vLogin.py` and found that by stuffing malicious code into a data field called the `chkid` parameter, it could trick the device into running its own commands. Researchers noted this is "the first agent-found, remotely exploitable 0-day" ever made public.


Vendor Unresponsive for 7 Months


While the discovery of the vulnerability by an AI tool is impressive, the real issue lies in the vendor's lack of response. The pwn.ai team spent over 7 months trying to get XSpeeder to fix the issue, but unfortunately, "no patch or advisory has been issued."


"We chose it as our first disclosure because, unlike other vendors, we have been unable to get any response from XSpeeder despite more than seven months of outreach. As a result, at the time of publication, this unfortunately remains to be a zero-day vulnerability," researchers wrote.


Massive Risk Exposure


With no fix in sight and 70,000 systems currently exposed online, the risk to industrial and branch environments is massive. The blog post revealed that a hacker doesn't need to be a genius to exploit this vulnerability; "all the attacker needs to know is the IP of the target."


Pwn.ai's investigation shows that its tool has already found nearly 20 other major vulnerabilities, making it clear that the way we find and fight security vulnerabilities has changed forever.


Vendor Responsiveness Issues


The XSpeeder case is not an isolated incident. Vendors often ignore or downplay vulnerability reports, even from reputable researchers. A recent example involves Eurostar, the European train service giant, which accused researchers from Pen Test Partners of blackmail after they reported serious flaws in its AI-powered chatbot.


Incidents like this aren't rare. They've happened around the world, which may be why countries like Portugal have started updating their cybercrime laws to protect ethical hackers and researchers from prosecution simply for identifying and reporting security issues.


Sources


  • https://hackread.com/xspeeder-0day-flaw-devices-vendor-ignores-alert/

  • https://x.com/HackRead/status/2005618940979073223

  • https://www.reddit.com/r/pwnhub/comments/1pysw6m/critical_0day_flaw_exposes_70k_xspeeder_devices/

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page