Skip to main content

CVE-2025-8653: CWE-121: Stack-based Buffer Overflow in Kenwood DMX958XR

High
VulnerabilityCVE-2025-8653cvecve-2025-8653cwe-121
Published: Wed Aug 06 2025 (08/06/2025, 01:18:52 UTC)
Source: CVE Database V5
Vendor/Project: Kenwood
Product: DMX958XR

Description

Kenwood DMX958XR JKRadioService Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Kenwood DMX958XR. Authentication is not required to exploit this vulnerability. The specific flaw exists within the JKRadioService. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26312.

AI-Powered Analysis

AILast updated: 08/06/2025, 02:18:00 UTC

Technical Analysis

CVE-2025-8653 is a high-severity stack-based buffer overflow vulnerability identified in the Kenwood DMX958XR, specifically within the JKRadioService component. This flaw arises due to improper validation of the length of user-supplied data before copying it into a fixed-length buffer on the stack. Because the buffer size is fixed and the input length is unchecked, an attacker can overflow the buffer, overwriting adjacent memory on the stack. This can lead to arbitrary code execution with root privileges. The vulnerability is exploitable by network-adjacent attackers without requiring any authentication or user interaction, making it particularly dangerous. The CVSS v3.0 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges or user interaction needed. The affected product version is 1.0.0509.3100 of the Kenwood DMX958XR. Although no public exploits are currently known in the wild, the nature of the vulnerability and its ease of exploitation make it a critical risk. The JKRadioService likely handles radio or network communication functions, which are exposed to network-adjacent attackers, increasing the attack surface. This vulnerability is categorized under CWE-121, a classic buffer overflow weakness that remains a common vector for remote code execution attacks.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those using Kenwood DMX958XR devices in their operational environments. These devices are typically used in automotive or communication contexts, potentially within fleet management, logistics, or emergency services. Exploitation could allow attackers to gain root-level control over the device, enabling them to manipulate device functions, intercept or alter communications, or pivot into broader network infrastructure. This could lead to data breaches, operational disruption, or compromise of safety-critical systems. Given the root-level access, attackers could install persistent malware or disrupt device availability, impacting business continuity. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks. Organizations relying on these devices for critical communications or vehicle telematics could face severe confidentiality, integrity, and availability consequences, including regulatory compliance risks under GDPR if personal data is involved.

Mitigation Recommendations

Immediate mitigation should focus on isolating affected Kenwood DMX958XR devices from untrusted networks to reduce exposure to network-adjacent attackers. Network segmentation and strict firewall rules should be applied to limit access to the JKRadioService ports or interfaces. Monitoring network traffic for anomalous activity targeting these devices is recommended. Since no official patch is currently available, organizations should engage with Kenwood for firmware updates or security advisories. If possible, disable or restrict the JKRadioService functionality until a patch is released. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for buffer overflow attempts targeting this service can help detect exploitation attempts. Additionally, organizations should conduct an inventory of all affected devices and prioritize remediation based on criticality. For long-term mitigation, implementing secure coding practices and input validation in device firmware is essential. Finally, organizations should prepare incident response plans specific to this vulnerability to quickly contain and remediate any exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-08-06T01:05:04.082Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6892b7cbad5a09ad00ed7e6f

Added to database: 8/6/2025, 2:02:51 AM

Last enriched: 8/6/2025, 2:18:00 AM

Last updated: 8/6/2025, 3:11:15 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats