CVE-2025-41108
BaseFortify
Publication date: 2025-10-22
Last updated on: 2025-10-31
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ghostrobotics | vision_60_firmware | 0.27.2 |
| ghostrobotics | vision_60 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the communication protocol of Ghost Robotics Vision 60 v0.27.2, which lacks encryption and authentication. An attacker can impersonate the control station (tablet) by capturing and replicating legitimate traffic between the robot and its controller. This allows the attacker to send commands from any device to gain unauthorized full control of the robot. The protocol is based on MAVLink and the robot can be connected remotely via Wi-Fi or 4G/LTE.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to take full unauthorized control of the robot remotely. This could lead to misuse or malicious operation of the robot, potentially causing physical damage, safety risks, or disruption of intended operations.