AOMEI Cyber Backup Missing Authentication for Critical Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AOMEI Cyber Backup. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the StorageNode service, which listens on TCP port 9075 by default. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-26156.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-808/ |
![]() ![]() |
History
Mon, 25 Aug 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Aomei
Aomei cyber Backup |
|
CPEs | cpe:2.3:a:aomei:cyber_backup:3.7.0:*:*:*:*:*:*:* | |
Vendors & Products |
Aomei
Aomei cyber Backup |
Wed, 20 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 20 Aug 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | AOMEI Cyber Backup Missing Authentication for Critical Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AOMEI Cyber Backup. Authentication is not required to exploit this vulnerability. The specific flaw exists within the StorageNode service, which listens on TCP port 9075 by default. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-26156. | |
Title | AOMEI Cyber Backup Missing Authentication for Critical Function Remote Code Execution Vulnerability | |
Weaknesses | CWE-306 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2025-08-20T18:43:34.742Z
Reserved: 2025-08-05T19:59:21.371Z
Link: CVE-2025-8610

Updated: 2025-08-20T18:39:12.653Z

Status : Analyzed
Published: 2025-08-20T17:15:38.140
Modified: 2025-08-25T01:57:35.273
Link: CVE-2025-8610

No data.