CVE ID | CVE-2025-8630 |
CVSS SCORE | 6.8, AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
AFFECTED VENDORS |
Kenwood |
AFFECTED PRODUCTS |
DMX958XR |
VULNERABILITY DETAILS |
This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Kenwood DMX958XR devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware update process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. |
ADDITIONAL DETAILS |
03/04/25 – ZDI reported the vulnerability to the vendor. 03/18/25 – The vendor acknowledged the report. 05/15/25 – The vendor requested additional time to decide on whether a fix would be released. 06/25/25 – The vendor states that are working on the reported vulnerabilities 07/29/25 – ZDI asked for an update and informed the vendor that if there is not a patch available that we will publish the case as a zero-day advisory on 08/01/25. 07/31/25 – The vendor requested an extension till late September, to which ZDI declined. -- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the product. |
DISCLOSURE TIMELINE |
|
CREDIT | @ByteInsight |