The "update" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function triggers if the 'C' button is pressed at a specific time during the boot process. If an attacker is able to control or impersonate this IP address, they could upload and overwrite files on the device.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 25 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The "update" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function triggers if the 'C' button is pressed at a specific time during the boot process. If an attacker is able to control or impersonate this IP address, they could upload and overwrite files on the device. | |
| Weaknesses | CWE-912 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: icscert
Published: 2025-02-25T17:00:16.133Z
Updated: 2025-02-25T17:23:02.222Z
Reserved: 2025-02-10T17:00:02.210Z
Link: CVE-2025-1204
Updated: 2025-02-25T17:22:29.789Z
Status : Received
Published: 2025-02-25T17:15:14.057
Modified: 2025-02-25T17:15:14.057
Link: CVE-2025-1204
No data.