Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Home/CyberSecurity News/8000+ SmarterMail Hosts Vulnerable to RCE Attack – PoC Exploit
CyberSecurity News

8000+ SmarterMail Hosts Vulnerable to RCE Attack – PoC Exploit

More than 8,000 internet-exposed SmarterMail servers remain vulnerable to a critical remote code execution flaw, CVE-2025-52691. Scans conducted on January 12, 2026, confirmed this widespread...

Jennifer sherman
Jennifer sherman
January 13, 2026 2 Min Read
2 0

More than 8,000 internet-exposed SmarterMail servers remain vulnerable to a critical remote code execution flaw, CVE-2025-52691. Scans conducted on January 12, 2026, confirmed this widespread exposure.

Security researchers identified 8,001 unique IP addresses likely affected out of 18,783 exposed instances, with proof-of-concept exploits now publicly available. This maximum-severity vulnerability poses severe risks to organizations relying on the email platform for enterprise communications.​

CVE-2025-52691 stems from an unauthenticated arbitrary file upload flaw in SmarterMail versions Build 9406 and earlier. Attackers can upload malicious files to any server location without credentials, enabling remote code execution under the service’s privileges.

The National Vulnerability Database (NVD) assigns it a CVSS v3.1 score of 10.0 with the vector AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H, marking it as critically exploitable over the network with low complexity.

Detail Information
CVE ID CVE-2025-52691 ​
Description Unauthenticated arbitrary file upload leading to RCE ​
CVSS Score 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) ​
Affected Versions SmarterMail Build 9406 and earlier ​
Fixed Version Build 9413 and later ​
CWE CWE-434 (Unrestricted Upload of File with Dangerous Type) ​

Successful exploitation allows full server compromise, data exfiltration, webshell deployment, or lateral movement. Disclosed in late December 2025, the flaw prompted alerts from agencies including Singapore’s Cyber Security Agency (CSA) and Belgium’s CCB.x+3​

Shadowserver UK’s latest dashboard reveals widespread exposure, with the United States hosting around 5,000 vulnerable instances, followed by the UK and Malaysia.

We are scanning & reporting out SmarterMail hosts vulnerable to CVE-2025-52691 RCE (CVSS 10).
8001 unique IPs likely vulnerable on 2026-01-12 (out of 18783 exposed). Note Exploit PoCs are public.

Tree Map view: https://t.co/ErLTyjDFPH

Raw IP data in https://t.co/qxv0Gv5ELc pic.twitter.com/PrdQTqCge2

— The Shadowserver Foundation (@Shadowserver) January 13, 2026

Scans confirm 42.6% of exposed SmarterMail hosts (8,001/18,783) fail vulnerability checks, likely due to delayed patching. Censys reported similar figures earlier, noting over 16,000 exposed globally, predominantly in the US (12,500+).

Public PoCs on platforms like Sploitus demonstrate simple HTTP requests for file uploads, escalating to RCE via ASPX webshells. No widespread in-the-wild exploitation is confirmed yet, but the public exploits heighten risks for unpatched mail servers directly internet-facing.

Administrators must upgrade to SmarterMail Build 9413 or later, ideally the newest Build 9483, for remediation. Interim steps include restricting external access to admin interfaces, monitoring logs for anomalous uploads, and scanning for IOCs like unexpected files in executable directories.

Organizations should verify exposure via tools like Shadowserver reports and prioritize email infrastructure in patch management.

This vulnerability underscores the dangers of unpatched email servers, potentially enabling spam relays, phishing bases, or ransomware vectors. With CVSS perfection and easy exploits, rapid action is essential to avert breaches.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCVEExploitPatchphishingransomwareSecurityVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

HoneyTrap: New LLM Defense Framework Counters Jailbreak

Next Post

FortiOS & FortiSwitchManager RCE Vulnerability Explained

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Hackers Steal Crypto & Passwords via Fake OpenClaw Installer
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us