Kapsch TrafficCom RIS-9260 RSU LEO v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to contain Android Debug Bridge (ADB) pre-installed (/mnt/c3platpersistent/opt/platform-tools/adb) and enabled by default, allowing unauthenticated root shell access to the cellular modem via the default 'kapsch' user.
References
| Link | Resource |
|---|---|
| https://cwe.mitre.org/data/definitions/306.html | Technical Description |
| https://phrack.org/issues/72/16_md | Exploit Third Party Advisory |
| https://www.kapsch.net/_Resources/Persistent/3d251a8445e0bf50093903ad70b3dbed34dec7e7/KTC-CVS_RIS-9260_DataSheet.pdf | Broken Link |
| https://www.kapsch.net/en | Product |
| https://www.kapsch.net/en/press/releases/ktc-20200813-pr-en | Product |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
History
No history.
Information
Published : 2025-08-26 15:15
Updated : 2025-10-22 15:15
NVD link : CVE-2025-25736
Mitre link : CVE-2025-25736
CVE.ORG link : CVE-2025-25736
JSON object : View
Products Affected
kapsch
- ris-9260_firmware
- ris-9260
- ris-9160_firmware
- ris-9160
CWE
CWE-306
Missing Authentication for Critical Function
