{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T04:09:11.440","vulnerabilities":[{"cve":{"id":"CVE-2025-2763","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2025-04-23T17:16:54.290","lastModified":"2025-07-11T14:02:08.887","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"CarlinKit CPC200-CCPA Improper Verification of Cryptographic Signature Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of update packages on USB drives. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24356."},{"lang":"es","value":"Vulnerabilidad de ejecución de código de verificación incorrecta de firma criptográfica en CarlinKit CPC200-CCPA. Esta vulnerabilidad permite a atacantes con presencia física ejecutar código arbitrario en instalaciones afectadas de dispositivos CarlinKit CPC200-CCPA. No se requiere autenticación para explotar esta vulnerabilidad. La falla específica se encuentra en la gestión de paquetes de actualización en unidades USB. El problema se debe a la falta de verificación adecuada de una firma criptográfica. Un atacante puede aprovechar esta vulnerabilidad para ejecutar código en el contexto de root. Anteriormente, se denominó ZDI-CAN-24356."}],"metrics":{"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0\/AV:P\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-347"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:carlinkit:autokit:2024.01.19.1541:*:*:*:*:*:*:*","matchCriteriaId":"9073FE92-A75A-4996-A425-9B2529CE7A8E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:carlinkit:cpc200-ccpa:-:*:*:*:*:*:*:*","matchCriteriaId":"3F019F16-DC9F-450D-804F-C0E3FFD61DC1"}]}]}],"references":[{"url":"https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-25-179\/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]}]}}]}