First published: Wed Apr 23 2025(Updated: )
CarlinKit CPC200-CCPA Improper Verification of Cryptographic Signature Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of update packages on USB drives. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24356.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
CarlinKit CPC200-CCPA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2763 has been classified with a significant severity due to the potential for arbitrary code execution by physically present attackers.
To mitigate CVE-2025-2763, it is recommended to update the CarlinKit CPC200-CCPA device to the latest firmware version provided by the vendor.
CVE-2025-2763 affects the CarlinKit CPC200-CCPA devices that have not been updated to address this vulnerability.
CVE-2025-2763 is categorized as an improper verification of cryptographic signature, leading to possible code execution.
No, CVE-2025-2763 requires physical presence to exploit the vulnerability on affected devices.