Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-32197 | The Flock Safety Android Collins application (aka com.flocksafety.android.collins) 6.35.31 for Android lacks authentication. It is responsible for the camera feed on Falcon, Sparrow, and Bravo devices, but exposes administrative API endpoints on port 8080 without authentication. Endpoints include but are not limited to: /reboot, /logs, /crashpack, and /adb/enable. This results in multiple impacts including denial of service (DoS) via /reboot, information disclosure via /logs, and remote code execution (RCE) via /adb/enable. The latter specifically results in adb being started over TCP without debugging confirmation, providing an attacker in the LAN/WLAN with shell access. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 24 Oct 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flocksafety flock Safety
|
|
| CPEs | cpe:2.3:a:flocksafety:flock_safety:6.35.31:*:*:*:*:android:*:* | |
| Vendors & Products |
Flocksafety flock Safety
|
Fri, 03 Oct 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flocksafety
Flocksafety bravo Edge Ai Compute Device Flocksafety collins Flocksafety falcon Flocksafety license Plate Reader Google android |
|
| Vendors & Products |
Flocksafety
Flocksafety bravo Edge Ai Compute Device Flocksafety collins Flocksafety falcon Flocksafety license Plate Reader Google android |
Thu, 02 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 | |
| Metrics |
cvssV3_1
|
Thu, 02 Oct 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Flock Safety Android Collins application (aka com.flocksafety.android.collins) 6.35.31 for Android lacks authentication. It is responsible for the camera feed on Falcon, Sparrow, and Bravo devices, but exposes administrative API endpoints on port 8080 without authentication. Endpoints include but are not limited to: /reboot, /logs, /crashpack, and /adb/enable. This results in multiple impacts including denial of service (DoS) via /reboot, information disclosure via /logs, and remote code execution (RCE) via /adb/enable. The latter specifically results in adb being started over TCP without debugging confirmation, providing an attacker in the LAN/WLAN with shell access. | |
| References |
|
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-02T19:43:46.935Z
Reserved: 2025-09-15T00:00:00.000Z
Link: CVE-2025-59403
Updated: 2025-10-02T19:43:34.275Z
Status : Analyzed
Published: 2025-10-02T17:16:05.530
Modified: 2025-10-24T17:28:19.707
Link: CVE-2025-59403
No data.
OpenCVE Enrichment
Updated: 2025-10-03T08:22:32Z
EUVD