The "update" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function triggers if the 'C' button is pressed at a specific time during the boot process. If an attacker is able to control or impersonate this IP address, they could upload and overwrite files on the device.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 25 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The "update" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function triggers if the 'C' button is pressed at a specific time during the boot process. If an attacker is able to control or impersonate this IP address, they could upload and overwrite files on the device. | |
Weaknesses | CWE-912 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-02-25T17:23:02.222Z
Reserved: 2025-02-10T17:00:02.210Z
Link: CVE-2025-1204

Updated: 2025-02-25T17:22:29.789Z

Status : Received
Published: 2025-02-25T17:15:14.057
Modified: 2025-02-25T17:15:14.057
Link: CVE-2025-1204

No data.