CVE-2025-50475
📋 TL;DR
An unauthenticated OS command injection vulnerability in Russound MBX-PRE-D67F firmware allows attackers to execute arbitrary commands as root by sending specially crafted network configuration requests. This enables complete system compromise of affected devices. Only devices running the vulnerable firmware version are affected.
💻 Affected Systems
- Russound MBX-PRE-D67F
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover with root privileges, allowing installation of persistent backdoors, data exfiltration, lateral movement to other network devices, and use as a botnet node.
Likely Case
Remote code execution leading to device compromise, credential theft, network reconnaissance, and potential pivot point for attacking other internal systems.
If Mitigated
Limited impact if device is behind strict network segmentation with no internet access and strong firewall rules blocking external access.
🎯 Exploit Status
Proof-of-concept code is publicly available in the provided references, making exploitation trivial for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Unknown
Restart Required: No
Instructions:
Check Russound's official website for security advisories and firmware updates. If available, download and apply the latest firmware following vendor instructions.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected devices from internet and restrict network access to trusted management interfaces only.
Firewall Rules
allBlock external access to the device's management interface and restrict internal access to authorized IP addresses only.
🧯 If You Can't Patch
- Immediately disconnect affected devices from internet-facing networks
- Implement strict network segmentation and access controls to limit device exposure
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via web interface or SSH. If version is 3.1.6, device is vulnerable.
Check Version:
Check via device web interface or SSH if available
Verify Fix Applied:
Verify firmware version has been updated to a version later than 3.1.6.
📡 Detection & Monitoring
Log Indicators:
- Unusual network configuration requests
- Suspicious command execution in system logs
- Multiple failed authentication attempts followed by configuration changes
Network Indicators:
- Unusual outbound connections from device
- Traffic to known malicious IPs
- Unexpected SSH or reverse shell connections
SIEM Query:
Search for network requests containing suspicious hostname parameters or command injection patterns to the device's management interface