CVE-2025-8646

6.8 MEDIUM

📋 TL;DR

This vulnerability allows physically present attackers to execute arbitrary code with root privileges on Kenwood DMX958XR car multimedia receivers during firmware updates. Attackers can exploit this without authentication by injecting malicious commands into the update process. Only users with physical access to the device are affected.

💻 Affected Systems

Products:
  • Kenwood DMX958XR
Versions: All versions prior to patched firmware
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The device must be physically accessible to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full root control of the device, potentially compromising connected systems (phones via Bluetooth, USB devices), stealing data, or using the device as an attack vector against connected networks.

🟠

Likely Case

Local attacker executes arbitrary code to modify device functionality, install malware, or access stored media and connection data.

🟢

If Mitigated

With physical security controls preventing unauthorized access to the device, impact is limited to authorized users who would need to intentionally exploit the vulnerability.

🌐 Internet-Facing: LOW - This requires physical access to the device; it is not remotely exploitable over networks.
🏢 Internal Only: MEDIUM - Physical access is required, making it relevant in environments where devices could be accessed by unauthorized personnel (e.g., rental cars, shared vehicles, public installations).

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires physical access and knowledge of command injection techniques. No authentication is needed once physical access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Kenwood support for latest firmware

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-794/

Restart Required: Yes

Instructions:

1. Visit Kenwood support website. 2. Download latest firmware for DMX958XR. 3. Transfer firmware to USB drive. 4. Insert USB into device and follow on-screen update instructions. 5. Device will restart automatically after update.

🔧 Temporary Workarounds

Disable physical access

all

Prevent unauthorized physical access to the device to block exploitation.

Disable firmware updates

all

Avoid performing firmware updates unless absolutely necessary and only from trusted sources.

🧯 If You Can't Patch

  • Ensure strict physical security controls around the device (e.g., locked compartments, surveillance).
  • Monitor for unusual device behavior or unauthorized firmware update attempts.

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device settings. If version is older than the patched release, device is vulnerable.

Check Version:

Navigate to Settings > System Information > Firmware Version on the device interface.

Verify Fix Applied:

After updating, verify firmware version matches latest patched version from Kenwood.

📡 Detection & Monitoring

Log Indicators:

  • Unusual firmware update activity
  • Unexpected system command execution

Network Indicators:

  • None - this is a local physical attack

SIEM Query:

Not applicable for typical SIEM monitoring as this requires physical access.

🔗 References

📤 Share & Export