The Sound4 PULSE-ECO AES67 1.22 web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware.
References
| Link | Resource |
|---|---|
| https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57431 | Exploit Third Party Advisory |
| https://www.sound4.com | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-09-22 17:16
Updated : 2025-10-14 19:53
NVD link : CVE-2025-57431
Mitre link : CVE-2025-57431
CVE.ORG link : CVE-2025-57431
JSON object : View
Products Affected
sound4
- pulse-eco_aes67_firmware
- pulse-eco_aes67
CWE
CWE-494
Download of Code Without Integrity Check
