### Vulnerability Key Information #### Basic Information - **Date**: December 30th, 2025 - **Title**: (0Day) Anritsu ShockLine CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability - **Identifiers**: - ZDI-25-1199 - ZDI-CAN-27833 - CVE-2025-15348 #### Vulnerability Rating and Details - **CVSS Score**: 7.8 - AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - **Affected Vendor**: Anritsu - **Affected Product**: ShockLine #### Vulnerability Details - **Description**: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu ShockLine. User interaction is required to exploit this vulnerability, as the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CHX files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process. - **Mitigation**: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the product. #### Additional Details - 09/19/25 - ZDI submitted the report to the vendor - 10/10/25 - ZDI asked for updates - 12/10/25 - ZDI notified the vendor of the intention to publish the case as a 0-day advisory on 12/30/25 #### Disclosure Timeline - 2025-09-19 - Vulnerability reported to vendor - 2025-12-30 - Coordinated public release of advisory - 2025-12-30 - Advisory Updated #### Acknowledgments - **Credit**: kimiya