First published: Wed Apr 23 2025(Updated: )
Sonos Era 300 Speaker libsmb2 Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of SMB data. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25535.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sonos Era 300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1048 is rated as a critical severity vulnerability due to its potential for remote code execution without authentication.
To fix CVE-2025-1048, users should update their Sonos Era 300 speakers to the latest firmware version provided by Sonos.
CVE-2025-1048 affects installations of Sonos Era 300 speakers that are accessible on the same network as an attacker.
CVE-2025-1048 is classified as a use-after-free vulnerability that allows for remote code execution.
No, authentication is not required to exploit CVE-2025-1048, making it particularly dangerous.