CVE-2025-65553

6.5 MEDIUM

📋 TL;DR

The D3D Wi-Fi Home Security System ZX-G12 v2.1.17 is vulnerable to RF jamming attacks on its 433 MHz alarm sensor channel. Attackers within radio frequency range can transmit continuous interference to block sensor transmissions, causing missed alarms and loss of security monitoring. This affects all users of the specified security system version.

💻 Affected Systems

Products:
  • D3D Wi-Fi Home Security System ZX-G12
Versions: v2.1.17
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running this firmware version are vulnerable regardless of configuration. The vulnerability is inherent to the RF communication design.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete security system failure during an intrusion, allowing undetected break-ins, theft, or safety hazards without triggering any alarms or notifications.

🟠

Likely Case

Intermittent sensor communication failures leading to missed alarm events and reduced security effectiveness, particularly in areas with RF interference.

🟢

If Mitigated

Limited impact if alternative security layers exist, but primary sensor monitoring remains compromised during jamming attacks.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical proximity (RF range) and basic RF transmission equipment. The GitHub repository contains proof-of-concept details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://d3d.com

Restart Required: No

Instructions:

No official patch available. Monitor vendor website for firmware updates addressing RF jamming detection and mitigation.

🔧 Temporary Workarounds

Physical Security Enhancement

all

Supplement security system with wired sensors or alternative monitoring technologies not reliant on 433 MHz RF.

RF Environment Monitoring

all

Deploy RF spectrum analyzers to detect jamming attempts and trigger alternative alert mechanisms.

🧯 If You Can't Patch

  • Deploy layered physical security measures (cameras, motion detectors) that operate independently of the vulnerable RF sensors.
  • Implement regular manual security checks and consider professional monitoring services with multiple communication channels.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via manufacturer's mobile app or web interface. If version is v2.1.17, the device is vulnerable.

Check Version:

Check via D3D mobile app settings or web interface (no CLI command available)

Verify Fix Applied:

Verify firmware has been updated to a version beyond v2.1.17 that includes RF jamming detection features.

📡 Detection & Monitoring

Log Indicators:

  • Sensor communication failures
  • Missed heartbeat signals from sensors
  • Unusual gap in sensor activity logs

Network Indicators:

  • Normal Wi-Fi connectivity but sensor data cessation
  • Lack of expected sensor transmission patterns

SIEM Query:

Not applicable - this is primarily a physical/RF layer vulnerability

🔗 References

📤 Share & Export