Metrics
Affected Vendors & Products
Solution
The vendor was unresponsive to multiple communication attempts during over one year of responsible disclosure after submitting the technical details to them. It is unknown to SEC Consult whether a patch is available. Customers of SIMCom are urged to reach out to their contact person at SIMCom or distributors to demand a patch which removes the backdoor command.
Workaround
No workaround given by the vendor.
Sun, 13 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Wed, 18 Jun 2025 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 11 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Wed, 11 Jun 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The SIMCom SIM7600G modem supports an undocumented AT command, which allows an attacker to execute system commands with root permission on the modem. An attacker needs either physical access or remote shell access to a device that interacts directly with the modem via AT commands. | |
Title | Undocumented Root Shell Access in SIMCom SIM7600G Modem | |
Weaknesses | CWE-912 | |
References |
|

Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-06-18T04:08:24.730Z
Reserved: 2025-02-10T07:48:38.352Z
Link: CVE-2025-26412

Updated: 2025-06-18T04:08:24.730Z

Status : Awaiting Analysis
Published: 2025-06-11T09:15:22.067
Modified: 2025-06-18T05:15:48.290
Link: CVE-2025-26412

No data.

No data.