Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65552: n/a

0
Unknown
VulnerabilityCVE-2025-65552cvecve-2025-65552
Published: Mon Jan 12 2026 (01/12/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

D3D Wi-Fi Home Security System ZX-G12 v2.1.1 is vulnerable to RF replay attacks on the 433 MHz sensor communication channel. The system does not implement rolling codes, message authentication, or anti-replay protection, allowing an attacker within RF range to record valid alarm/control frames and replay them to trigger false alarms.

AI-Powered Analysis

AILast updated: 01/12/2026, 15:24:16 UTC

Technical Analysis

The CVE-2025-65552 vulnerability affects the D3D Wi-Fi Home Security System ZX-G12 version 2.1.1, specifically targeting the communication channel operating at 433 MHz used by its sensors. The system lacks fundamental security mechanisms such as rolling codes, message authentication codes (MAC), and anti-replay protections. Rolling codes are typically used in RF systems to ensure that each transmitted command is unique and cannot be reused, while message authentication ensures the integrity and authenticity of the transmitted data. Without these protections, an attacker within RF range can passively capture valid alarm or control frames transmitted by the sensors or remote controls. The attacker can then replay these recorded frames to the security system, causing it to falsely trigger alarms or potentially disable or manipulate the system. This type of RF replay attack undermines the integrity and availability of the security system, potentially causing denial of service through false alarms or enabling unauthorized control. The vulnerability does not require authentication or user interaction, making it easier to exploit for anyone physically nearby. Although no public exploits have been reported yet, the simplicity of the attack vector and the lack of cryptographic protections make exploitation straightforward. The absence of a CVSS score indicates that the vulnerability has not yet been fully assessed, but the technical details suggest a significant security risk. The system's reliance on unprotected RF communication channels is a critical design flaw that must be addressed to prevent exploitation.

Potential Impact

For European organizations and consumers using the D3D Wi-Fi Home Security System ZX-G12 v2.1.1, this vulnerability can lead to multiple adverse impacts. False alarms triggered by replayed signals can cause operational disruptions, unnecessary emergency responses, and reduced confidence in security systems. In critical environments such as small businesses, residential complexes, or sensitive facilities, repeated false alarms may lead to alarm fatigue, causing genuine alerts to be ignored. Additionally, attackers could potentially disable or manipulate the system by replaying control commands, compromising the availability and integrity of physical security. This could facilitate unauthorized physical access or delay response times to actual security incidents. The vulnerability also raises privacy concerns, as attackers can monitor sensor communications to gather intelligence about occupancy or security status. The lack of rolling codes and authentication means that the system cannot reliably distinguish legitimate commands from replayed ones, severely undermining trust in the system’s security. European organizations relying on such systems for perimeter or home security should consider this a significant risk, especially in urban areas where attackers can easily be within RF range. The impact is primarily on availability and integrity, with confidentiality less directly affected but still relevant due to potential information leakage through RF monitoring.

Mitigation Recommendations

To mitigate this vulnerability, affected users should first verify whether a firmware update from the vendor is available that implements rolling codes, message authentication, and anti-replay protections. If no update is available, replacing the vulnerable system with a more secure alternative that uses cryptographically protected RF communications is strongly recommended. Physical security measures should be enhanced to reduce the risk of attackers gaining proximity to the RF signals, such as installing the system in RF-shielded environments or increasing the distance between sensors and potential attackers. Network segmentation and monitoring of the Wi-Fi components of the system can help detect anomalous behavior or repeated false alarms indicative of replay attacks. Additionally, integrating multi-factor physical security controls (e.g., biometric access or wired sensors) can reduce reliance on vulnerable RF signals. Security awareness training for users to recognize and respond appropriately to false alarms can mitigate operational impacts. Finally, organizations should conduct regular security assessments of their physical security infrastructure to identify and remediate similar RF communication vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69650e81da2266e838bdb80f

Added to database: 1/12/2026, 3:08:49 PM

Last enriched: 1/12/2026, 3:24:16 PM

Last updated: 1/13/2026, 7:43:29 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats