Advisory Details

August 1st, 2025

(0Day) (Pwn2Own) Alpine iLX-507 CarPlay Stack-based Buffer Overflow Code Execution Vulnerability

ZDI-25-763
ZDI-CAN-26318

CVE ID CVE-2025-8474
CVSS SCORE 6.8, AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Alpine
AFFECTED PRODUCTS iLX-507
VULNERABILITY DETAILS

This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the implementation of the Apple CarPlay protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.

ADDITIONAL DETAILS

01/29/25 – ZDI reported the vulnerability to the vendor.

01/30/25 – The vendor acknowledged the report.

02/24/25 – The vendor requested additional details.

02/24/25 – ZDI followed up and provided more information about the case.

07/29/25 – ZDI asked for an update and informed the vendor that the case will be published as a zero-day advisory on 08/01/25.

-- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the product.


DISCLOSURE TIMELINE
  • 2025-01-27 - Vulnerability reported to vendor
  • 2025-08-01 - Coordinated public release of advisory
  • 2025-08-01 - Advisory Updated
CREDIT Radu Motspan (@_moradek_) from PCAutomotive
BACK TO ADVISORIES