D3D Wi-Fi Home Security System ZX-G12 v2.1.1 is vulnerable to RF replay attacks on the 433 MHz sensor communication channel. The system does not implement rolling codes, message authentication, or anti-replay protection, allowing an attacker within RF range to record valid alarm/control frames and replay them to trigger false alarms.
References
| Link | Resource |
|---|---|
| http://d3d.com | Not Applicable |
| https://github.com/EmbdCDACHyd/CVE/tree/main/CVE-2025-65552 | Third Party Advisory |
| https://d3dsecurity.com/products/wifi-home-security-system-model-g12 | Product |
| https://github.com/EmbdCDACHyd/CVE/tree/main/CVE-2025-65552 | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
03 Feb 2026, 19:39
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:d3dsecurity:xz-g12_firmware:2.1.17:*:*:*:*:*:*:* |
cpe:2.3:o:d3dsecurity:zx-g12_firmware:2.1.17:*:*:*:*:*:*:* cpe:2.3:h:d3dsecurity:zx-g12:-:*:*:*:*:*:*:* |
| First Time |
D3dsecurity zx-g12 Firmware
D3dsecurity zx-g12 |
Information
Published : 2026-01-12 15:16
Updated : 2026-02-03 19:39
NVD link : CVE-2025-65552
Mitre link : CVE-2025-65552
CVE.ORG link : CVE-2025-65552
JSON object : View
Products Affected
d3dsecurity
- zx-g12
- zx-g12_firmware
CWE
CWE-294
Authentication Bypass by Capture-replay
