CVE-2025-65552
📋 TL;DR
The D3D Wi-Fi Home Security System ZX-G12 v2.1.1 is vulnerable to RF replay attacks on its 433 MHz sensor communication channel. Attackers within RF range can record legitimate alarm/control frames and replay them to trigger false alarms or potentially disable security functions. This affects all users of the vulnerable system version.
💻 Affected Systems
- D3D Wi-Fi Home Security System ZX-G12
📦 What is this software?
Zx G12 Firmware by D3dsecurity
⚠️ Risk & Real-World Impact
Worst Case
Attacker triggers false alarms repeatedly, causing emergency service fatigue, or replays disarm commands to bypass security during a break-in.
Likely Case
False alarm triggers causing nuisance, potential fines from authorities, and reduced trust in the security system.
If Mitigated
Limited impact with proper physical security controls and monitoring, but system remains vulnerable to RF replay.
🎯 Exploit Status
Attack requires only an SDR (Software Defined Radio) or 433 MHz transmitter within range. GitHub repository contains proof-of-concept code.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Contact vendor D3D Security for firmware update information.
🔧 Temporary Workarounds
Physical RF Shielding
allAdd RF shielding around sensors and control unit to reduce attack surface
Alternative Monitoring
allSupplement with secondary security system using different technology
🧯 If You Can't Patch
- Replace vulnerable system with a model that implements rolling codes and message authentication
- Implement physical security measures to detect and deter RF-based attacks in the vicinity
🔍 How to Verify
Check if Vulnerable:
Check firmware version in system settings. If version is v2.1.1, system is vulnerable.
Check Version:
Check system admin interface or device label for firmware version
Verify Fix Applied:
No fix available to verify. Monitor vendor announcements for firmware updates.
📡 Detection & Monitoring
Log Indicators:
- Multiple identical alarm triggers in rapid succession
- Alarms triggered without corresponding sensor events
Network Indicators:
- Unusual 433 MHz signal patterns detected by RF monitoring
SIEM Query:
Not applicable - this is an RF-based attack, not network-based