CarlinKit CPC200-CCPA Improper Verification of Cryptographic Signature Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of update packages on USB drives. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24356.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-179/ |
![]() ![]() |
History
Wed, 23 Apr 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 23 Apr 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | CarlinKit CPC200-CCPA Improper Verification of Cryptographic Signature Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of update packages on USB drives. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24356. | |
Title | CarlinKit CPC200-CCPA Improper Verification of Cryptographic Signature Code Execution Vulnerability | |
Weaknesses | CWE-347 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published: 2025-04-23T16:48:00.717Z
Updated: 2025-04-23T18:14:09.276Z
Reserved: 2025-03-24T19:42:39.949Z
Link: CVE-2025-2763

Updated: 2025-04-23T18:14:05.433Z

Status : Awaiting Analysis
Published: 2025-04-23T17:16:54.290
Modified: 2025-04-29T13:52:47.470
Link: CVE-2025-2763

No data.