The Sound4 PULSE-ECO AES67 1.22 web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 22 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-494 | |
Metrics |
cvssV3_1
|
Mon, 22 Sep 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Sound4 PULSE-ECO AES67 1.22 web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-22T17:36:19.061Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57431

Updated: 2025-09-22T17:34:58.895Z

Status : Awaiting Analysis
Published: 2025-09-22T17:16:08.303
Modified: 2025-09-22T21:22:33.590
Link: CVE-2025-57431

No data.

No data.