An incorrect encryption implementation vulnerability exists in the system log dump feature of BYD's DiLink 3.0 OS (e.g. in the model ATTO3). An attacker with physical access to the vehicle can bypass the encryption of log dumps on the In-Vehicle Infotainment (IVI) unit's storage. This allows the attacker to access and read system logs containing sensitive data, including personally identifiable information (PII) and location data.
This vulnerability was introduced in a patch intended to fix CVE-2024-54728.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://asrg.io/security-advisories/cve-2025-7020/ |
![]() ![]() |
History
Tue, 12 Aug 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Byd
Byd dilink Os |
|
Vendors & Products |
Byd
Byd dilink Os |
Mon, 11 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 09 Aug 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An incorrect encryption implementation vulnerability exists in the system log dump feature of BYD's DiLink 3.0 OS (e.g. in the model ATTO3). An attacker with physical access to the vehicle can bypass the encryption of log dumps on the In-Vehicle Infotainment (IVI) unit's storage. This allows the attacker to access and read system logs containing sensitive data, including personally identifiable information (PII) and location data. This vulnerability was introduced in a patch intended to fix CVE-2024-54728. | |
Title | BYD DiLink OS Incorrect encryption Implementation of system log dumps | |
Weaknesses | CWE-656 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: ASRG
Published:
Updated: 2025-08-11T15:54:36.036Z
Reserved: 2025-07-02T12:24:26.302Z
Link: CVE-2025-7020

Updated: 2025-08-11T15:54:33.300Z

Status : Awaiting Analysis
Published: 2025-08-09T13:15:25.180
Modified: 2025-08-11T18:32:48.867
Link: CVE-2025-7020

No data.