Advisory Details

August 5th, 2025

(0Day) (Pwn2Own) Kenwood DMX958XR JKRadioService Stack-based Buffer Overflow Remote Code Execution Vulnerability

ZDI-25-801
ZDI-CAN-26312

CVE ID CVE-2025-8653
CVSS SCORE 8.8, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Kenwood
AFFECTED PRODUCTS DMX958XR
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Kenwood DMX958XR. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the JKRadioService. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.

ADDITIONAL DETAILS

01/23/25 – ZDI reported the vulnerability to the vendor.

01/23/25 – The vendor acknowledged the report.

05/15/25 – The vendor requested additional time to decide on whether a fix would be released.

05/16/25 – ZDI agreed to wait until May 30th.

06/25/25 – The vendor states that are working on the reported vulnerabilities

07/29/25 – ZDI asked for an update and informed the vendor that if there is not a patch available that we will publish the case as a zero-day advisory on 08/01/25.

07/31/25 – The vendor requested an extension till late September, to which ZDI declined.

-- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the product.


DISCLOSURE TIMELINE
  • 2025-01-27 - Vulnerability reported to vendor
  • 2025-08-05 - Coordinated public release of advisory
  • 2025-08-05 - Advisory Updated
CREDIT hama7230
BACK TO ADVISORIES