The specific flaw exists within the firmware update process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26264.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23693 | Kenwood DMX958XR Firmware Update Command Injection Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Kenwood DMX958XR devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware update process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26264. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-25-789/ |
|
Thu, 07 Aug 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jvckenwood
Jvckenwood dmx958xr Jvckenwood dmx958xr Firmware |
|
| CPEs | cpe:2.3:h:jvckenwood:dmx958xr:-:*:*:*:*:*:*:* cpe:2.3:o:jvckenwood:dmx958xr_firmware:1.0.0005.4600:*:*:*:*:*:*:* |
|
| Vendors & Products |
Jvckenwood
Jvckenwood dmx958xr Jvckenwood dmx958xr Firmware |
Thu, 07 Aug 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kenwood
Kenwood dmx958xr |
|
| Vendors & Products |
Kenwood
Kenwood dmx958xr |
Wed, 06 Aug 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 Aug 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kenwood DMX958XR Firmware Update Command Injection Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Kenwood DMX958XR devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware update process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26264. | |
| Title | Kenwood DMX958XR Firmware Update Command Injection Vulnerability | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2025-08-06T16:13:23.313Z
Reserved: 2025-08-06T01:04:10.759Z
Link: CVE-2025-8641
Updated: 2025-08-06T16:07:47.944Z
Status : Analyzed
Published: 2025-08-06T02:15:52.343
Modified: 2025-08-07T16:52:21.790
Link: CVE-2025-8641
No data.
OpenCVE Enrichment
Updated: 2025-08-06T15:12:43Z
EUVD