CVE-2025-8646
📋 TL;DR
This vulnerability allows physically present attackers to execute arbitrary code with root privileges on Kenwood DMX958XR car multimedia receivers during firmware updates. Attackers can exploit this without authentication by injecting malicious commands into the update process. Only users with physical access to the device are affected.
💻 Affected Systems
- Kenwood DMX958XR
📦 What is this software?
Dmx958xr Firmware by Jvckenwood
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains full root control of the device, potentially compromising connected systems (phones via Bluetooth, USB devices), stealing data, or using the device as an attack vector against connected networks.
Likely Case
Local attacker executes arbitrary code to modify device functionality, install malware, or access stored media and connection data.
If Mitigated
With physical security controls preventing unauthorized access to the device, impact is limited to authorized users who would need to intentionally exploit the vulnerability.
🎯 Exploit Status
Exploitation requires physical access and knowledge of command injection techniques. No authentication is needed once physical access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Kenwood support for latest firmware
Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-794/
Restart Required: Yes
Instructions:
1. Visit Kenwood support website. 2. Download latest firmware for DMX958XR. 3. Transfer firmware to USB drive. 4. Insert USB into device and follow on-screen update instructions. 5. Device will restart automatically after update.
🔧 Temporary Workarounds
Disable physical access
allPrevent unauthorized physical access to the device to block exploitation.
Disable firmware updates
allAvoid performing firmware updates unless absolutely necessary and only from trusted sources.
🧯 If You Can't Patch
- Ensure strict physical security controls around the device (e.g., locked compartments, surveillance).
- Monitor for unusual device behavior or unauthorized firmware update attempts.
🔍 How to Verify
Check if Vulnerable:
Check firmware version in device settings. If version is older than the patched release, device is vulnerable.
Check Version:
Navigate to Settings > System Information > Firmware Version on the device interface.
Verify Fix Applied:
After updating, verify firmware version matches latest patched version from Kenwood.
📡 Detection & Monitoring
Log Indicators:
- Unusual firmware update activity
- Unexpected system command execution
Network Indicators:
- None - this is a local physical attack
SIEM Query:
Not applicable for typical SIEM monitoring as this requires physical access.