First published: Wed Apr 23 2025(Updated: )
Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of ID3 data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25601.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sonos Era 300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1049 has a high severity rating due to its potential for remote code execution.
To address CVE-2025-1049, ensure that your Sonos Era 300 speaker firmware is updated to the latest version.
CVE-2025-1049 is identified as a heap-based buffer overflow vulnerability.
CVE-2025-1049 affects users of the Sonos Era 300 speakers.
No, authentication is not required to exploit CVE-2025-1049.