CVE-2025-8653

8.8 HIGH

📋 TL;DR

This is a critical stack-based buffer overflow vulnerability in Kenwood DMX958XR's JKRadioService that allows network-adjacent attackers to execute arbitrary code as root without authentication. The vulnerability affects Kenwood DMX958XR multimedia receivers when the JKRadioService is running. Attackers on the same network can exploit this to gain complete control of affected devices.

💻 Affected Systems

Products:
  • Kenwood DMX958XR
Versions: All versions prior to patch
Operating Systems: Embedded automotive OS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in JKRadioService component which is typically enabled by default. Requires network access to the device.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the device with root privileges, allowing attackers to install persistent malware, intercept communications, or pivot to other network devices.

🟠

Likely Case

Remote code execution leading to device takeover, data theft, or use as a foothold for lateral movement within the network.

🟢

If Mitigated

Limited impact if device is isolated from untrusted networks and has network segmentation in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

No authentication required, network-adjacent access needed. Buffer overflow exploitation is well-understood and likely to be weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Kenwood official firmware updates

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-801/

Restart Required: Yes

Instructions:

1. Check Kenwood support site for firmware updates. 2. Download latest firmware for DMX958XR. 3. Install update via USB or official update method. 4. Restart device to apply changes.

🔧 Temporary Workarounds

Network Isolation

all

Isolate the device from untrusted networks and implement strict network segmentation

Service Disablement

all

Disable JKRadioService if not required for functionality

🧯 If You Can't Patch

  • Segment the device on a dedicated VLAN with strict firewall rules
  • Implement network monitoring for unusual traffic to/from the device

🔍 How to Verify

Check if Vulnerable:

Check firmware version against latest patched version from Kenwood. If JKRadioService is running on unpatched DMX958XR, device is vulnerable.

Check Version:

Check device settings menu for firmware version information

Verify Fix Applied:

Verify firmware version matches or exceeds patched version from vendor advisory. Confirm JKRadioService is updated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections to JKRadioService
  • Multiple failed connection attempts
  • Unexpected process execution

Network Indicators:

  • Unusual traffic patterns to device port 8080 or JKRadioService ports
  • Buffer overflow patterns in network traffic

SIEM Query:

source_ip IN (internal_range) AND dest_ip = (device_ip) AND dest_port = 8080 AND payload_size > threshold

🔗 References

📤 Share & Export