CarlinKit CPC200-CCPA Improper Verification of Cryptographic Signature Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of update packages on USB drives. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24356.
History

Wed, 23 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 23 Apr 2025 17:00:00 +0000

Type Values Removed Values Added
Description CarlinKit CPC200-CCPA Improper Verification of Cryptographic Signature Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of update packages on USB drives. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24356.
Title CarlinKit CPC200-CCPA Improper Verification of Cryptographic Signature Code Execution Vulnerability
Weaknesses CWE-347
References
Metrics cvssV3_0

{'score': 6.8, 'vector': 'CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published: 2025-04-23T16:48:00.717Z

Updated: 2025-04-23T18:14:09.276Z

Reserved: 2025-03-24T19:42:39.949Z

Link: CVE-2025-2763

cve-icon Vulnrichment

Updated: 2025-04-23T18:14:05.433Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-23T17:16:54.290

Modified: 2025-04-29T13:52:47.470

Link: CVE-2025-2763

cve-icon Redhat

No data.