The Sound4 IMPACT web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware.
History

Wed, 19 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-494
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 18 Nov 2025 21:00:00 +0000

Type Values Removed Values Added
Description The Sound4 IMPACT web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-11-18T00:00:00.000Z

Updated: 2025-11-19T15:40:44.348Z

Reserved: 2025-10-27T00:00:00.000Z

Link: CVE-2025-63215

cve-icon Vulnrichment

Updated: 2025-11-19T15:40:29.445Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-18T22:15:51.447

Modified: 2025-11-19T19:14:59.327

Link: CVE-2025-63215

cve-icon Redhat

No data.