The specific flaw exists within the JKRadioService. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26312.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23680 | Kenwood DMX958XR JKRadioService Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Kenwood DMX958XR. Authentication is not required to exploit this vulnerability. The specific flaw exists within the JKRadioService. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26312. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-25-801/ |
|
Thu, 07 Aug 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jvckenwood
Jvckenwood dmx958xr Jvckenwood dmx958xr Firmware |
|
| CPEs | cpe:2.3:h:jvckenwood:dmx958xr:-:*:*:*:*:*:*:* cpe:2.3:o:jvckenwood:dmx958xr_firmware:1.0.0509.3100:*:*:*:*:*:*:* |
|
| Vendors & Products |
Jvckenwood
Jvckenwood dmx958xr Jvckenwood dmx958xr Firmware |
Thu, 07 Aug 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kenwood
Kenwood dmx958xr |
|
| Vendors & Products |
Kenwood
Kenwood dmx958xr |
Wed, 06 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 Aug 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kenwood DMX958XR JKRadioService Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Kenwood DMX958XR. Authentication is not required to exploit this vulnerability. The specific flaw exists within the JKRadioService. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26312. | |
| Title | Kenwood DMX958XR JKRadioService Stack-based Buffer Overflow Remote Code Execution Vulnerability | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2025-08-06T18:20:21.925Z
Reserved: 2025-08-06T01:05:04.082Z
Link: CVE-2025-8653
Updated: 2025-08-06T18:20:00.478Z
Status : Analyzed
Published: 2025-08-06T02:15:54.083
Modified: 2025-08-07T16:53:22.800
Link: CVE-2025-8653
No data.
OpenCVE Enrichment
Updated: 2025-08-06T15:12:40Z
EUVD