CVE-2025-50475

9.8 CRITICAL

📋 TL;DR

An unauthenticated OS command injection vulnerability in Russound MBX-PRE-D67F firmware allows attackers to execute arbitrary commands as root by sending specially crafted network configuration requests. This enables complete system compromise of affected devices. Only devices running the vulnerable firmware version are affected.

💻 Affected Systems

Products:
  • Russound MBX-PRE-D67F
Versions: Firmware version 3.1.6
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with root privileges, allowing installation of persistent backdoors, data exfiltration, lateral movement to other network devices, and use as a botnet node.

🟠

Likely Case

Remote code execution leading to device compromise, credential theft, network reconnaissance, and potential pivot point for attacking other internal systems.

🟢

If Mitigated

Limited impact if device is behind strict network segmentation with no internet access and strong firewall rules blocking external access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept code is publicly available in the provided references, making exploitation trivial for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check Russound's official website for security advisories and firmware updates. If available, download and apply the latest firmware following vendor instructions.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from internet and restrict network access to trusted management interfaces only.

Firewall Rules

all

Block external access to the device's management interface and restrict internal access to authorized IP addresses only.

🧯 If You Can't Patch

  • Immediately disconnect affected devices from internet-facing networks
  • Implement strict network segmentation and access controls to limit device exposure

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or SSH. If version is 3.1.6, device is vulnerable.

Check Version:

Check via device web interface or SSH if available

Verify Fix Applied:

Verify firmware version has been updated to a version later than 3.1.6.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network configuration requests
  • Suspicious command execution in system logs
  • Multiple failed authentication attempts followed by configuration changes

Network Indicators:

  • Unusual outbound connections from device
  • Traffic to known malicious IPs
  • Unexpected SSH or reverse shell connections

SIEM Query:

Search for network requests containing suspicious hostname parameters or command injection patterns to the device's management interface

🔗 References

📤 Share & Export