A critical OS command injection vulnerability in Soliton's FileZen file-sharing appliance is being actively exploited in the wild, giving attackers full remote code execution. A patch has been available since January — but many systems remain exposed.

Attackers are actively exploiting a critical command injection vulnerability in Soliton Systems' FileZen file-sharing appliance, a product widely deployed across Japanese enterprises and government agencies for secure file transfer. The flaw, tracked as CVE-2026-25108, allows an authenticated attacker to execute arbitrary operating system commands on the underlying server — effectively handing over complete control of the machine. Reports of in-the-wild exploitation began surfacing on February 13, 2026, according to advisories coordinated through JPCERT/CC and the Japan Vulnerability Notes (JVN) portal, and the vulnerability carries a CVSS v3 score of 8.8 (HIGH).
On February 13, 2026, Japan's JPCERT Coordination Center (JPCERT/CC) and Soliton Systems K.K. publicly disclosed CVE-2026-25108, an OS command injection vulnerability affecting FileZen versions V4.2.1 through V4.2.8 and V5.0.0 through V5.0.10. The vulnerability exists in the web management interface of the FileZen appliance and is triggered when a specific optional feature — the "FileZen Antivirus Check" option, which relies on a BitDefender license — is enabled.
Soliton had actually released a patched version, V5.0.11, as early as January 13, 2026 — a full month before the public disclosure. However, the confirmation of active exploitation on the same day as the public advisory suggests that threat actors discovered and weaponized the flaw before many organizations had applied the update. The exact method attackers used to obtain valid credentials — a prerequisite for exploitation — remains unknown, though brute-force attacks, credential stuffing, and phishing are all plausible vectors.
Notably, Soliton's cloud-based offering, FileZen S, is explicitly not affected by this vulnerability. The issue is confined to on-premises deployments of the traditional FileZen appliance.
At its core, CVE-2026-25108 is a textbook case of CWE-78: Improper Neutralization of Special Elements Used in an OS Command ("OS Command Injection"). The server-side code in the FileZen web management interface takes user-supplied input from a post-login web form and concatenates it directly into a system command line without performing any input validation, sanitization, or escaping. When the operating system shell interprets this concatenated string, any injected command metacharacters — such as ;, &&, `, or | — are treated as command separators or execution operators, allowing arbitrary commands to run with the privileges of the FileZen service process.
The vulnerability is only reachable when the optional "FileZen Antivirus Check" feature is enabled. This feature, which requires a BitDefender license, appears to invoke a system-level command to perform antivirus scanning on uploaded files. It is in this invocation path that the unsanitized input is passed to the OS shell.
Based on the consolidated analysis of the Soliton vendor advisory and the JVN entry, the exploitation follows this sequence:
Because the command runs at the OS level, the attacker can do anything the FileZen service account can do — read, modify, or delete files; download and execute additional tools; establish persistent backdoor access; or pivot laterally into other systems on the network.
The vulnerability has been assessed with the following severity metrics:
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HCVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:NThe key takeaway from the CVSS vector is that while authentication is required (PR:L), the attack complexity is low (AC:L), no user interaction is needed (UI:N), and the impact to confidentiality, integrity, and availability is all rated HIGH. The CISA ADP Vulnrichment assessment confirms the technical impact is "total" — meaning complete compromise of the affected system.
Soliton Systems K.K. | FileZen | V4.2.1 – V4.2.8 | V5.0.11 | On-premises appliance only |
Soliton Systems K.K. | FileZen | V5.0.0 – V5.0.10 | V5.0.11 | On-premises appliance only |
Soliton Systems K.K. | FileZen S (Cloud/SaaS) | — | — | NOT affected |
FileZen is a file-sharing and file-transfer appliance manufactured by Soliton Systems, a Japanese IT security company. The product is widely used across Japanese enterprises, government agencies, and educational institutions to facilitate secure file exchanges. Organizations that have the optional BitDefender-powered "Antivirus Check" feature enabled are at direct risk, though the prevalence of this configuration across deployed environments is currently unknown.
Any organization running FileZen versions within the affected range (V4.2.1 through V4.2.8 or V5.0.0 through V5.0.10) should treat this as a high-priority patching event, regardless of whether they believe the Antivirus Check feature is enabled — configuration drift and undocumented changes are common in production environments.
Both the Soliton vendor advisory and the JVN coordination entry confirm that exploitation of CVE-2026-25108 has been observed in the wild, with the first reports received by JPCERT/CC on or around February 13, 2026. No specific threat actor group has been attributed to the attacks, and no named campaigns have been publicly linked to the exploitation. The attackers are described simply as "unattributed remote attackers" in the JPCERT/CC reports.
It is worth noting that the CISA ADP assessment, timestamped February 13, 2026, lists exploitation as "none" — which may reflect a lag in CISA's own telemetry relative to the Japanese CERT's observations. Defenders should give greater weight to the JPCERT/CC confirmation and assume active exploitation is ongoing.
Once an attacker achieves OS command execution on the FileZen host, the consequences are severe:
As of this writing, no public proof-of-concept (PoC) exploit code has been released. The exact format of the injection payload has not been disclosed. However, the absence of a public PoC should not provide false comfort — command injection vulnerabilities of this type are typically straightforward to exploit once the vulnerable parameter is identified, and the confirmation of in-the-wild exploitation demonstrates that attackers have already developed working exploits.
If your organization runs Soliton FileZen, here are the steps you should take immediately, in order of priority:
Upgrade all FileZen installations to version V5.0.11 or later. The patch has been available since January 13, 2026, and there is no reason to delay. The vendor advisory and patch can be found at:
If immediate patching is not feasible due to change management constraints or other operational reasons, disable the "FileZen Antivirus Check" option in the product configuration. This removes the vulnerable code path and prevents exploitation. Be aware that this workaround has a side effect: antivirus scanning of files processed by FileZen will be disabled, reducing your protection against malware uploaded through the system. This should be treated as a temporary measure only — patching remains the definitive fix.
Rotate all credentials used to access the FileZen web management interface. This includes administrator accounts, service accounts, and any user accounts. If your FileZen deployment integrates with Active Directory or LDAP, review those credentials as well. Given that the exploitation requires valid credentials, credential compromise may have been the initial attack vector.
If your FileZen deployment supports multi-factor authentication (MFA), enable it for all accounts immediately. This significantly raises the bar for attackers who have obtained passwords but do not have access to the second factor.
Review your FileZen logs and system state for signs of compromise:
;, &&, ` (backticks), or | in parameter values./bin/sh, /bin/bash, cmd.exe, or other shell interpreters triggered by web UI actions.Limit network exposure of the FileZen management interface. The web UI should not be directly accessible from the public internet if at all possible. Place the appliance behind a VPN or restrict access to trusted management networks.
If you find any evidence that your FileZen appliance has been compromised, conduct a full security audit of all systems that communicated with it. Assume that any credentials stored on or passing through the appliance may have been harvested, and treat connected systems as potentially compromised until proven otherwise.
This is not the first time FileZen has found itself in attackers' crosshairs. Soliton's file-transfer appliance has historically been targeted in campaigns against Japanese organizations, and file-transfer products as a category have become one of the most frequently exploited classes of enterprise software in recent years. The pattern is familiar: products like MOVEit Transfer, GoAnywhere MFT, and Accellion FTA have all suffered critical vulnerabilities that were rapidly weaponized by ransomware groups and state-sponsored actors. File-transfer appliances sit at a uniquely dangerous intersection — they handle sensitive data, they are often internet-facing, and they frequently run with elevated privileges.
The timeline of CVE-2026-25108 also raises important questions. The patch was released on January 13, 2026, but in-the-wild exploitation was confirmed on February 13 — exactly one month later. This suggests either that attackers reverse-engineered the patch to identify the vulnerability (a well-documented technique known as "patch diffing"), or that exploitation was already occurring before the patch was released and simply wasn't detected until later. Either way, the lesson is clear: when a vendor releases a security update for a network-facing appliance, the clock is already ticking. Every day of delay in applying the patch is a day of exposure to potential compromise.
Organizations that operate FileZen or similar file-transfer appliances should also take this as an opportunity to review their broader appliance security posture. Are all appliances inventoried? Are they on supported firmware versions? Are unnecessary features — like the Antivirus Check option in this case — disabled by default? And critically, are credentials for these systems managed with the same rigor as credentials for any other internet-facing service?
The answers to those questions may determine whether CVE-2026-25108 is a close call or a full-blown breach.