CVE-2025-41108
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-22

Last updated on: 2025-10-31

Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)

Description
The communication protocol implemented in Ghost Robotics Vision 60 v0.27.2 could allow an attacker to send commands to the robot from an external attack station, impersonating the control station (tablet) and gaining unauthorised full control of the robot. The absence of encryption and authentication mechanisms in the communication protocol allows an attacker to capture legitimate traffic between the robot and the controller, replicate it, and send any valid command to the robot from any attacking computer or device. The communication protocol used in this interface is based on MAVLink, a widely documented protocol, which increases the likelihood of attack. There are two methods for connecting to the robot remotely: Wi-Fi and 4G/LTE.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-22
Last Modified
2025-10-31
Generated
2026-05-07
AI Q&A
2025-10-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
ghostrobotics vision_60_firmware 0.27.2
ghostrobotics vision_60 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
CWE-NVD-CWE-noinfo
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the communication protocol of Ghost Robotics Vision 60 v0.27.2, which lacks encryption and authentication. An attacker can impersonate the control station (tablet) by capturing and replicating legitimate traffic between the robot and its controller. This allows the attacker to send commands from any device to gain unauthorized full control of the robot. The protocol is based on MAVLink and the robot can be connected remotely via Wi-Fi or 4G/LTE.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to take full unauthorized control of the robot remotely. This could lead to misuse or malicious operation of the robot, potentially causing physical damage, safety risks, or disruption of intended operations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart