The Sound4 PULSE-ECO AES67 1.22 web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware.
Metrics
Affected Vendors & Products
References
History
Tue, 23 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sound4
Sound4 pulse-eco |
|
Vendors & Products |
Sound4
Sound4 pulse-eco |
Mon, 22 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-494 | |
Metrics |
cvssV3_1
|
Mon, 22 Sep 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Sound4 PULSE-ECO AES67 1.22 web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-09-22T00:00:00.000Z
Updated: 2025-09-22T17:36:19.061Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57431

Updated: 2025-09-22T17:34:58.895Z

Status : Awaiting Analysis
Published: 2025-09-22T17:16:08.303
Modified: 2025-09-22T21:22:33.590
Link: CVE-2025-57431

No data.