The "update" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function triggers if the 'C' button is pressed at a specific time during the boot process. If an attacker is able to control or impersonate this IP address, they could upload and overwrite files on the device.
History

Tue, 25 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 25 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Description The "update" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function triggers if the 'C' button is pressed at a specific time during the boot process. If an attacker is able to control or impersonate this IP address, they could upload and overwrite files on the device.
Weaknesses CWE-912
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-02-25T17:23:02.222Z

Reserved: 2025-02-10T17:00:02.210Z

Link: CVE-2025-1204

cve-icon Vulnrichment

Updated: 2025-02-25T17:22:29.789Z

cve-icon NVD

Status : Received

Published: 2025-02-25T17:15:14.057

Modified: 2025-02-25T17:15:14.057

Link: CVE-2025-1204

cve-icon Redhat

No data.