ID

VAR-202508-0173


CVE

CVE-2025-8631


TITLE

JVCKENWOOD Corporation  of  DMX958XR  in the firmware  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2025-011090

DESCRIPTION

Kenwood DMX958XR Firmware Update Command Injection Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Kenwood DMX958XR devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware update process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26254. JVCKENWOOD Corporation of DMX958XR The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Kenwood DMX958XR is an in-vehicle infotainment system from Kenwood

Trust: 2.79

sources: NVD: CVE-2025-8631 // JVNDB: JVNDB-2025-011090 // ZDI: ZDI-25-779 // CNVD: CNVD-2025-20424

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-20424

AFFECTED PRODUCTS

vendor:jvckenwoodmodel:dmx958xrscope:eqversion:1.0.0005.4600

Trust: 1.0

vendor:jvckenwoodmodel:dmx958xrscope: - version: -

Trust: 0.8

vendor:jvckenwoodmodel:dmx958xrscope:eqversion: -

Trust: 0.8

vendor:jvckenwoodmodel:dmx958xrscope:eqversion:dmx958xr firmware 1.0.0005.4600

Trust: 0.8

vendor:kenwoodmodel:dmx958xrscope: - version: -

Trust: 0.7

vendor:kenwoodmodel:dmx958xrscope:eqversion:1.0.0005.4600

Trust: 0.6

sources: ZDI: ZDI-25-779 // CNVD: CNVD-2025-20424 // JVNDB: JVNDB-2025-011090 // NVD: CVE-2025-8631

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2025-8631
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-011090
value: MEDIUM

Trust: 0.8

ZDI: CVE-2025-8631
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2025-20424
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-20424
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2025-8631
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.0

Trust: 1.0

OTHER: JVNDB-2025-011090
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2025-8631
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-25-779 // CNVD: CNVD-2025-20424 // JVNDB: JVNDB-2025-011090 // NVD: CVE-2025-8631

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:OS Command injection (CWE-78) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-011090 // NVD: CVE-2025-8631

EXTERNAL IDS

db:NVDid:CVE-2025-8631

Trust: 3.9

db:ZDIid:ZDI-25-779

Trust: 2.5

db:JVNDBid:JVNDB-2025-011090

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-26254

Trust: 0.7

db:CNVDid:CNVD-2025-20424

Trust: 0.6

sources: ZDI: ZDI-25-779 // CNVD: CNVD-2025-20424 // JVNDB: JVNDB-2025-011090 // NVD: CVE-2025-8631

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-25-779/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-8631

Trust: 0.8

sources: JVNDB: JVNDB-2025-011090 // NVD: CVE-2025-8631

CREDITS

@ByteInsight

Trust: 0.7

sources: ZDI: ZDI-25-779

SOURCES

db:ZDIid:ZDI-25-779
db:CNVDid:CNVD-2025-20424
db:JVNDBid:JVNDB-2025-011090
db:NVDid:CVE-2025-8631

LAST UPDATE DATE

2025-09-08T23:23:07.990000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-25-779date:2025-08-05T00:00:00
db:CNVDid:CNVD-2025-20424date:2025-09-05T00:00:00
db:JVNDBid:JVNDB-2025-011090date:2025-08-08T09:01:00
db:NVDid:CVE-2025-8631date:2025-08-07T17:00:45.080

SOURCES RELEASE DATE

db:ZDIid:ZDI-25-779date:2025-08-05T00:00:00
db:CNVDid:CNVD-2025-20424date:2025-09-05T00:00:00
db:JVNDBid:JVNDB-2025-011090date:2025-08-08T00:00:00
db:NVDid:CVE-2025-8631date:2025-08-06T02:15:50.873