The Sound4 IMPACT web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware.
References
| Link | Resource |
|---|---|
| https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63215%20_%20Sound4%20IMPACT%20%20RCE | Exploit Third Party Advisory |
| https://www.sound4helpdesk.com/ | Product |
| https://www.sound4helpdesk.com/impact-downloads/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-18 22:15
Updated : 2026-01-15 21:52
NVD link : CVE-2025-63215
Mitre link : CVE-2025-63215
CVE.ORG link : CVE-2025-63215
JSON object : View
Products Affected
sound4
- impact
- impact_firmware
CWE
CWE-494
Download of Code Without Integrity Check
