SB2025080627 - Multiple vulnerabilities in Kenwood DMX958XR



SB2025080627 - Multiple vulnerabilities in Kenwood DMX958XR

Published: August 6, 2025

Security Bulletin ID SB2025080627
Severity
Medium
Patch available
NO
Number of vulnerabilities 29
Exploitation vector Adjecent network
Highest impact Code execution

Breakdown by Severity

Medium 7% Low 93%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 29 secuirty vulnerabilities.


1) Command Injection (CVE-ID: CVE-2025-8628)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


2) Protection Mechanism Failure (CVE-ID: CVE-2025-8656)

The vulnerability allows a local attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient implementation of security measures within the libSystemLib library. An attacker with physical access can bypass implemented security restrictions and downgrade software on the target devices.


3) Command Injection (CVE-ID: CVE-2025-8655)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


4) Command Injection (CVE-ID: CVE-2025-8654)

The vulnerability allows a remote attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the ReadMVGImage function. A remote attacker on the local network can pass specially crafted data to the application and execute arbitrary commands.


5) Stack-based buffer overflow (CVE-ID: CVE-2025-8653)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the JKRadioService. A remote unauthenticated attacker on the local network can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Command Injection (CVE-ID: CVE-2025-8652)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the JKWifiService. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


7) Command Injection (CVE-ID: CVE-2025-8651)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the JKWifiService. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


8) Command Injection (CVE-ID: CVE-2025-8650)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


9) Command Injection (CVE-ID: CVE-2025-8649)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the JKWifiService. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


10) Command Injection (CVE-ID: CVE-2025-8648)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


11) Command Injection (CVE-ID: CVE-2025-8647)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


12) Command Injection (CVE-ID: CVE-2025-8646)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


13) Command Injection (CVE-ID: CVE-2025-8645)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


14) Command Injection (CVE-ID: CVE-2025-8644)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


15) Command Injection (CVE-ID: CVE-2025-8643)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


16) Command Injection (CVE-ID: CVE-2025-8642)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


17) Command Injection (CVE-ID: CVE-2025-8641)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


18) Command Injection (CVE-ID: CVE-2025-8640)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


19) Command Injection (CVE-ID: CVE-2025-8639)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


20) Command Injection (CVE-ID: CVE-2025-8638)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


21) Command Injection (CVE-ID: CVE-2025-8637)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


22) Command Injection (CVE-ID: CVE-2025-8636)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


23) Command Injection (CVE-ID: CVE-2025-8635)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


24) Command Injection (CVE-ID: CVE-2025-8634)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


25) Command Injection (CVE-ID: CVE-2025-8633)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


26) Command Injection (CVE-ID: CVE-2025-8632)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


27) Command Injection (CVE-ID: CVE-2025-8631)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


28) Command Injection (CVE-ID: CVE-2025-8630)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


29) Command Injection (CVE-ID: CVE-2025-8629)

The vulnerability allows a local attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation within the firmware update process. An attacker with physical access can pass specially crafted data to the application and execute arbitrary commands.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.

References