The Sound4 PULSE-ECO AES67 1.22 web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware.
References
Link | Resource |
---|---|
https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57431 | Exploit Third Party Advisory |
https://www.sound4.com | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
14 Oct 2025, 19:53
Type | Values Removed | Values Added |
---|---|---|
First Time |
Sound4
Sound4 pulse-eco Aes67 Sound4 pulse-eco Aes67 Firmware |
|
CPE | cpe:2.3:o:sound4:pulse-eco_aes67_firmware:1.22:*:*:*:*:*:*:* cpe:2.3:h:sound4:pulse-eco_aes67:-:*:*:*:*:*:*:* |
|
References | () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57431 - Exploit, Third Party Advisory | |
References | () https://www.sound4.com - Product |
22 Sep 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-494 |
22 Sep 2025, 17:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-22 17:16
Updated : 2025-10-14 19:53
NVD link : CVE-2025-57431
Mitre link : CVE-2025-57431
CVE.ORG link : CVE-2025-57431
JSON object : View
Products Affected
sound4
- pulse-eco_aes67_firmware
- pulse-eco_aes67
CWE
CWE-494
Download of Code Without Integrity Check