{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T00:16:30.015","vulnerabilities":[{"cve":{"id":"CVE-2025-5833","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2025-06-25T18:15:24.203","lastModified":"2025-07-08T14:52:15.600","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Pioneer DMH-WT7600NEX Root Filesystem Insufficient Verification of Data Authenticity Vulnerability. This vulnerability allows physically present attackers to bypass authentication on affected installations of Pioneer DMH-WT7600NEX devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the configuration of the operating system. The issue results from the lack of properly configured protection for the root file system. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26077."},{"lang":"es","value":"Vulnerabilidad de verificación insuficiente de la autenticidad de datos en el sistema de archivos raíz del Pioneer DMH-WT7600NEX. Esta vulnerabilidad permite a atacantes presentes físicamente eludir la autenticación en las instalaciones afectadas de los dispositivos Pioneer DMH-WT7600NEX. No se requiere autenticación para explotar esta vulnerabilidad. La falla específica se encuentra en la configuración del sistema operativo. El problema se debe a la falta de una protección configurada correctamente para el sistema de archivos raíz. Un atacante puede aprovechar esta vulnerabilidad para eludir la autenticación en el sistema. Anteriormente, se denominaba ZDI-CAN-26077."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9}],"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":3.6}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-345"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pioneer:dmh-wt7600nex_firmware:3.05:*:*:*:*:*:*:*","matchCriteriaId":"AE9170F1-CDF6-49D5-9501-A3DA09D419CB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pioneer:dmh-wt7600nex:-:*:*:*:*:*:*:*","matchCriteriaId":"E9082E28-D451-488C-A621-4A174B887EB3"}]}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-25-350/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]}]}}]}