{"id":84682,"date":"2025-10-26T08:33:04","date_gmt":"2025-10-26T08:33:04","guid":{"rendered":""},"modified":"2025-10-29T16:22:06","modified_gmt":"2025-10-29T22:22:06","slug":"cve-2025-9365-arbitrary-code-execution-vulnerability-in-fuji-electric-frenic-loader-4","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-9365-arbitrary-code-execution-vulnerability-in-fuji-electric-frenic-loader-4\/","title":{"rendered":"<strong>CVE-2025-9365: Arbitrary Code Execution Vulnerability in Fuji Electric FRENIC-Loader 4<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>This report provides an in-depth look at the critical vulnerability identified as CVE-2025-9365. This vulnerability affects Fuji Electric&#8217;s FRENIC-Loader 4 and poses a significant threat due to its potential for arbitrary code execution. Being a widely used industrial product, the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-25176-high-severity-stack-buffer-overflow-vulnerability-in-luajit\/\"  data-wpil-monitor-id=\"91541\">severity and potential impact of this vulnerability<\/a> should not be underestimated.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-9365<br \/>\nSeverity: High (7.8 CVSS)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: Low<br \/>\nUser Interaction: Required<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-30400-potential-system-compromise-with-privilege-elevation-in-windows-dwm\/\"  data-wpil-monitor-id=\"91829\">System compromise<\/a>, potential data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1845541578\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Fuji Electric FRENIC-Loader | 4.0<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit hinges on a deserialization <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-23968-unrestricted-file-upload-vulnerability-in-wpcenter-aibud-wp\/\"  data-wpil-monitor-id=\"91550\">vulnerability present in the file<\/a> import function of FRENIC-Loader 4. An attacker can craft a malicious file which, when imported through a specific window in the application, allows the execution of <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-43568-use-after-free-vulnerability-in-substance3d-stager-resulting-in-arbitrary-code-execution\/\"  data-wpil-monitor-id=\"91547\">arbitrary code<\/a>. This is due to the application\u2019s failure to properly validate or sanitize the imported data before processing it.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-3410335047\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here is a conceptual example of how the vulnerability might be exploited. This is a representation of a malicious <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-30385-critical-privilege-escalation-vulnerability-in-windows-common-log-file-system-driver\/\"  data-wpil-monitor-id=\"91841\">file that could be used to trigger the vulnerability<\/a>.<\/p>\n<pre><code class=\"\" data-line=\"\">import java.io.*;\nimport java.util.*;\npublic class Exploit{\npublic static void main(String[] args) {\ntry {\nProcessBuilder pb = new ProcessBuilder(&quot;cmd.exe&quot;, &quot;\/c&quot;, &quot;your malicious command&quot;);\nProcess p = pb.start();\n} catch (IOException e) {\ne.printStackTrace();\n}\n}\n}<\/code><\/pre>\n<p>This Java code would be serialized into a file, which would then be imported into FRENIC-Loader 4. The deserialization <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-43569-arbitrary-code-execution-vulnerability-in-substance3d-stager\/\"  data-wpil-monitor-id=\"91545\">vulnerability would allow the execution of the arbitrary code<\/a> contained within the file.<\/p>\n<p><strong>Mitigation<\/strong><\/p>\n<p>Users are urged to apply the latest patch provided by the vendor, Fuji Electric, which addresses this vulnerability. As a temporary mitigation measure, users can also employ Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) to detect and prevent attempted exploits. However, these measures are not substitutes for applying the vendor-provided patch.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview This report provides an in-depth look at the critical vulnerability identified as CVE-2025-9365. This vulnerability affects Fuji Electric&#8217;s FRENIC-Loader 4 and poses a significant threat due to its potential for arbitrary code execution. Being a widely used industrial product, the severity and potential impact of this vulnerability should not be underestimated. Vulnerability Summary CVE [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[80],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-84682","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-rce"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/84682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=84682"}],"version-history":[{"count":6,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/84682\/revisions"}],"predecessor-version":[{"id":85018,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/84682\/revisions\/85018"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=84682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=84682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=84682"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=84682"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=84682"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=84682"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=84682"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=84682"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=84682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}