SB2025080627 - Multiple vulnerabilities in Kenwood DMX958XR
Published: August 6, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 29 secuirty vulnerabilities.
1) Command Injection (CVE-ID: CVE-2025-8628)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
2) Protection Mechanism Failure (CVE-ID: CVE-2025-8656)
The vulnerability allows a local attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures within the libSystemLib library. An attacker with physical access can bypass implemented security restrictions and downgrade software on the target devices.
3) Command Injection (CVE-ID: CVE-2025-8655)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
4) Command Injection (CVE-ID: CVE-2025-8654)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the ReadMVGImage function. A remote attacker on the local network can pass specially crafted data to the application and execute arbitrary commands.
5) Stack-based buffer overflow (CVE-ID: CVE-2025-8653)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the JKRadioService. A remote unauthenticated attacker on the local network can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
6) Command Injection (CVE-ID: CVE-2025-8652)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the JKWifiService. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
7) Command Injection (CVE-ID: CVE-2025-8651)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the JKWifiService. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
8) Command Injection (CVE-ID: CVE-2025-8650)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
9) Command Injection (CVE-ID: CVE-2025-8649)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the JKWifiService. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
10) Command Injection (CVE-ID: CVE-2025-8648)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
11) Command Injection (CVE-ID: CVE-2025-8647)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
12) Command Injection (CVE-ID: CVE-2025-8646)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
13) Command Injection (CVE-ID: CVE-2025-8645)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
14) Command Injection (CVE-ID: CVE-2025-8644)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
15) Command Injection (CVE-ID: CVE-2025-8643)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
16) Command Injection (CVE-ID: CVE-2025-8642)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
17) Command Injection (CVE-ID: CVE-2025-8641)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
18) Command Injection (CVE-ID: CVE-2025-8640)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
19) Command Injection (CVE-ID: CVE-2025-8639)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
20) Command Injection (CVE-ID: CVE-2025-8638)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
21) Command Injection (CVE-ID: CVE-2025-8637)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
22) Command Injection (CVE-ID: CVE-2025-8636)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
23) Command Injection (CVE-ID: CVE-2025-8635)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
24) Command Injection (CVE-ID: CVE-2025-8634)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
25) Command Injection (CVE-ID: CVE-2025-8633)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
26) Command Injection (CVE-ID: CVE-2025-8632)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
27) Command Injection (CVE-ID: CVE-2025-8631)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
28) Command Injection (CVE-ID: CVE-2025-8630)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
29) Command Injection (CVE-ID: CVE-2025-8629)
The vulnerability allows a local attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- https://www.zerodayinitiative.com/advisories/ZDI-25-776/
- https://www.zerodayinitiative.com/advisories/ZDI-25-804/
- https://www.zerodayinitiative.com/advisories/ZDI-25-803/
- https://www.zerodayinitiative.com/advisories/ZDI-25-802/
- https://www.zerodayinitiative.com/advisories/ZDI-25-801/
- https://www.zerodayinitiative.com/advisories/ZDI-25-800/
- https://www.zerodayinitiative.com/advisories/ZDI-25-799/
- https://www.zerodayinitiative.com/advisories/ZDI-25-798/
- https://www.zerodayinitiative.com/advisories/ZDI-25-797/
- https://www.zerodayinitiative.com/advisories/ZDI-25-796/
- https://www.zerodayinitiative.com/advisories/ZDI-25-795/
- https://www.zerodayinitiative.com/advisories/ZDI-25-794/
- https://www.zerodayinitiative.com/advisories/ZDI-25-793/
- https://www.zerodayinitiative.com/advisories/ZDI-25-792/
- https://www.zerodayinitiative.com/advisories/ZDI-25-791/
- https://www.zerodayinitiative.com/advisories/ZDI-25-790/
- https://www.zerodayinitiative.com/advisories/ZDI-25-789/
- https://www.zerodayinitiative.com/advisories/ZDI-25-788/
- https://www.zerodayinitiative.com/advisories/ZDI-25-787/
- https://www.zerodayinitiative.com/advisories/ZDI-25-786/
- https://www.zerodayinitiative.com/advisories/ZDI-25-785/
- https://www.zerodayinitiative.com/advisories/ZDI-25-784/
- https://www.zerodayinitiative.com/advisories/ZDI-25-783/
- https://www.zerodayinitiative.com/advisories/ZDI-25-782/
- https://www.zerodayinitiative.com/advisories/ZDI-25-781/
- https://www.zerodayinitiative.com/advisories/ZDI-25-780/
- https://www.zerodayinitiative.com/advisories/ZDI-25-779/
- https://www.zerodayinitiative.com/advisories/ZDI-25-778/
- https://www.zerodayinitiative.com/advisories/ZDI-25-777/