CVE-2025-6666
BaseFortify
Publication date: 2025-11-29
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| motogadget | mo.lock | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-320 | Key Management Errors |
| CWE-321 | The product uses a hard-coded, unchangeable cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability could allow an attacker with physical access to the device to exploit the use of a hard-coded cryptographic key, potentially compromising the security of the ignition lock system. However, the attack is difficult to perform and the overall impact is low according to the CVSS scores.
Can you explain this vulnerability to me?
This vulnerability exists in the motogadget mo.lock Ignition Lock up to version 20251125, specifically in an unknown functionality of the NFC Handler component. It allows an attacker to manipulate the system to use a hard-coded cryptographic key. The attack requires physical access to the device and is considered difficult to execute due to its high complexity.