Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 was discovered to contain an unauthenticated EFI shell which allows attackers to execute arbitrary code or escalate privileges during the boot process.
References
| Link | Resource |
|---|---|
| https://cwe.mitre.org/data/definitions/1233.html | Technical Description |
| https://phrack.org/issues/72/16_md | Exploit Third Party Advisory |
| https://www.kapsch.net/_Resources/Persistent/3d251a8445e0bf50093903ad70b3dbed34dec7e7/KTC-CVS_RIS-9260_DataSheet.pdf | Broken Link |
| https://www.kapsch.net/_Resources/Persistent/55fb8d0fb279262809eac88d457894db1b3efcd5/Kapsch_RIS-9160_Datasheet_EN.pdf | Product |
| https://www.kapsch.net/en | Product |
| https://www.kapsch.net/en/press/releases/ktc-20200813-pr-en | Product |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
History
No history.
Information
Published : 2025-08-26 15:15
Updated : 2025-10-22 15:15
NVD link : CVE-2025-25734
Mitre link : CVE-2025-25734
CVE.ORG link : CVE-2025-25734
JSON object : View
Products Affected
kapsch
- ris-9260_firmware
- ris-9260
- ris-9160_firmware
- ris-9160
