Pioneer DMH-WT7600NEX Root Filesystem Insufficient Verification of Data Authenticity Vulnerability. This vulnerability allows physically present attackers to bypass authentication on affected installations of Pioneer DMH-WT7600NEX devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the operating system. The issue results from the lack of properly configured protection for the root file system. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26077.
History

Wed, 25 Jun 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Jun 2025 18:15:00 +0000

Type Values Removed Values Added
Description Pioneer DMH-WT7600NEX Root Filesystem Insufficient Verification of Data Authenticity Vulnerability. This vulnerability allows physically present attackers to bypass authentication on affected installations of Pioneer DMH-WT7600NEX devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the operating system. The issue results from the lack of properly configured protection for the root file system. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26077.
Title Pioneer DMH-WT7600NEX Root Filesystem Insufficient Verification of Data Authenticity Vulnerability
Weaknesses CWE-345
References
Metrics cvssV3_0

{'score': 4.6, 'vector': 'CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published: 2025-06-25T17:58:18.809Z

Updated: 2025-06-25T18:23:36.170Z

Reserved: 2025-06-06T19:40:42.518Z

Link: CVE-2025-5833

cve-icon Vulnrichment

Updated: 2025-06-25T18:23:28.883Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-25T18:15:24.203

Modified: 2025-06-26T18:57:43.670

Link: CVE-2025-5833

cve-icon Redhat

No data.