With physical access to the device and enough time an attacker is able to solder test leads to the debug footprint (or use the 6-Pin tag-connect cable). Thus, the attacker gains access to the bootloader, where the kernel command line can be changed. An attacker is able to gain a root shell through this vulnerability.
CVSS
No CVSS.
References
Configurations
No configuration.
History
No history.
Information
Published : 2026-01-26 10:16
Updated : 2026-01-26 15:03
NVD link : CVE-2025-59104
Mitre link : CVE-2025-59104
CVE.ORG link : CVE-2025-59104
JSON object : View
Products Affected
No product.
CWE
CWE-1234
Hardware Internal or Debug Modes Allow Override of Locks
