The Sound4 PULSE-ECO AES67 1.22 web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware.
History

Tue, 23 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Sound4
Sound4 pulse-eco
Vendors & Products Sound4
Sound4 pulse-eco

Mon, 22 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-494
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 22 Sep 2025 17:15:00 +0000

Type Values Removed Values Added
Description The Sound4 PULSE-ECO AES67 1.22 web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-09-22T17:36:19.061Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-57431

cve-icon Vulnrichment

Updated: 2025-09-22T17:34:58.895Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-22T17:16:08.303

Modified: 2025-09-22T21:22:33.590

Link: CVE-2025-57431

cve-icon Redhat

No data.