CVE-2025-63215
BaseFortify
Publication date: 2025-11-18
Last updated on: 2025-11-19
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sound4 | impact | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-494 | The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Sound4 IMPACT web-based management interface has a vulnerability that allows Remote Code Execution (RCE). This happens because the firmware update process does not properly validate the integrity of a script called manual.sh. An attacker can modify this script within a malicious firmware update package and inject arbitrary commands, which then get executed on the system.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to execute arbitrary code remotely on the affected system. This could lead to unauthorized control over the device, data theft, disruption of services, or further compromise of the network where the device is deployed.