The Sound4 PULSE-ECO AES67 1.22 web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware.
Metrics
Affected Vendors & Products
References
History
Tue, 14 Oct 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sound4 pulse-eco Aes67
Sound4 pulse-eco Aes67 Firmware |
|
| CPEs | cpe:2.3:h:sound4:pulse-eco_aes67:-:*:*:*:*:*:*:* cpe:2.3:o:sound4:pulse-eco_aes67_firmware:1.22:*:*:*:*:*:*:* |
|
| Vendors & Products |
Sound4 pulse-eco Aes67
Sound4 pulse-eco Aes67 Firmware |
Tue, 23 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sound4
Sound4 pulse-eco |
|
| Vendors & Products |
Sound4
Sound4 pulse-eco |
Mon, 22 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-494 | |
| Metrics |
cvssV3_1
|
Mon, 22 Sep 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Sound4 PULSE-ECO AES67 1.22 web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-09-22T00:00:00.000Z
Updated: 2025-09-22T17:36:19.061Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57431
Updated: 2025-09-22T17:34:58.895Z
Status : Analyzed
Published: 2025-09-22T17:16:08.303
Modified: 2025-10-14T19:53:19.917
Link: CVE-2025-57431
No data.