{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T07:55:51.461","vulnerabilities":[{"cve":{"id":"CVE-2025-8473","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2025-08-01T18:15:57.600","lastModified":"2025-08-12T18:10:36.193","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Alpine iLX-507 UPDM_wstpCBCUpdStart Command Injection Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the UPDM_wstpCBCUpdStart function. The issue results from the lack of proper validation of user-supplied data before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26317."},{"lang":"es","value":"Vulnerabilidad de inyección de comandos UPDM_wstpCBCUpdStart en Alpine iLX-507. Esta vulnerabilidad permite a atacantes con presencia física ejecutar código arbitrario en las instalaciones afectadas de los dispositivos Alpine iLX-507. No se requiere autenticación para explotar esta vulnerabilidad. La falla específica se encuentra en la función UPDM_wstpCBCUpdStart. El problema se debe a la falta de validación adecuada de los datos proporcionados por el usuario antes de usarlos para ejecutar una llamada al sistema. Un atacante puede aprovechar esta vulnerabilidad para ejecutar código en el contexto de root. Era ZDI-CAN-26317."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":6.6,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.7,"impactScore":5.9}],"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.5,"impactScore":5.9}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:alpsalpine:ilx-507_firmware:6.0.000:*:*:*:*:*:*:*","matchCriteriaId":"AF7ECB73-21CD-4AA6-83A2-58B218BB7443"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:alpsalpine:ilx-507:-:*:*:*:*:*:*:*","matchCriteriaId":"1E89A5FC-D1BE-4967-A581-BFC98FAA79E0"}]}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-25-762/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]}]}}]}