Advisory Details

August 1st, 2025

(0Day) (Pwn2Own) Alpine iLX-507 vCard Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability

ZDI-25-761
ZDI-CAN-26316

CVE ID CVE-2025-8472
CVSS SCORE 7.4, AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
AFFECTED VENDORS Alpine
AFFECTED PRODUCTS iLX-507
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.

The specific flaw exists within the parsing of vCard data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute arbitrary code in the context of root.

ADDITIONAL DETAILS

01/29/25 – ZDI reported the vulnerability to the vendor.

01/30/25 – The vendor acknowledged the report.

02/24/25 – The vendor requested additional details.

02/24/25 – ZDI followed up and provided more information about the case.

07/29/25 – ZDI asked for an update and informed the vendor that the case will be published as a zero-day advisory on 08/01/25.

-- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the product.


DISCLOSURE TIMELINE
  • 2025-01-27 - Vulnerability reported to vendor
  • 2025-08-01 - Coordinated public release of advisory
  • 2025-08-01 - Advisory Updated
CREDIT @ExLuck99
BACK TO ADVISORIES