CVE-2025-65552

D3D Wi-Fi Home Security System ZX-G12 v2.1.1 is vulnerable to RF replay attacks on the 433 MHz sensor communication channel. The system does not implement rolling codes, message authentication, or anti-replay protection, allowing an attacker within RF range to record valid alarm/control frames and replay them to trigger false alarms.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:d3dsecurity:zx-g12_firmware:2.1.17:*:*:*:*:*:*:*
cpe:2.3:h:d3dsecurity:zx-g12:-:*:*:*:*:*:*:*

History

03 Feb 2026, 19:39

Type Values Removed Values Added
CPE cpe:2.3:h:d3dsecurity:xz-g12:-:*:*:*:*:*:*:*
cpe:2.3:o:d3dsecurity:xz-g12_firmware:2.1.17:*:*:*:*:*:*:*
cpe:2.3:o:d3dsecurity:zx-g12_firmware:2.1.17:*:*:*:*:*:*:*
cpe:2.3:h:d3dsecurity:zx-g12:-:*:*:*:*:*:*:*
First Time D3dsecurity zx-g12 Firmware
D3dsecurity zx-g12

Information

Published : 2026-01-12 15:16

Updated : 2026-02-03 19:39


NVD link : CVE-2025-65552

Mitre link : CVE-2025-65552

CVE.ORG link : CVE-2025-65552


JSON object : View

Products Affected

d3dsecurity

  • zx-g12
  • zx-g12_firmware
CWE
CWE-294

Authentication Bypass by Capture-replay