CVE-2025-5832
- EPSS 0.01%
- Veröffentlicht 25.06.2025 18:15:24
- Zuletzt bearbeitet 08.07.2025 14:52:30
Pioneer DMH-WT7600NEX Software Update Signing Insufficient Verification of Data Authenticity Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Pioneer DMH-WT7600NEX devices. A...
CVE-2025-5833
- EPSS 0.01%
- Veröffentlicht 25.06.2025 18:15:24
- Zuletzt bearbeitet 08.07.2025 14:52:15
Pioneer DMH-WT7600NEX Root Filesystem Insufficient Verification of Data Authenticity Vulnerability. This vulnerability allows physically present attackers to bypass authentication on affected installations of Pioneer DMH-WT7600NEX devices. Authentica...
CVE-2025-5834
- EPSS 0.01%
- Veröffentlicht 25.06.2025 18:15:24
- Zuletzt bearbeitet 08.07.2025 14:51:29
Pioneer DMH-WT7600NEX Missing Immutable Root of Trust in Hardware Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to bypass authentication on affected installations of Pioneer DMH-WT7600NEX devices. Although authen...
CVE-2024-23929
- EPSS 0.04%
- Veröffentlicht 31.01.2025 01:15:09
- Zuletzt bearbeitet 01.07.2025 14:15:32
This vulnerability allows network-adjacent attackers to create arbitrary files on affected installations of Pioneer DMH-WT7600NEX devices. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be...
CVE-2024-23928
- EPSS 0.13%
- Veröffentlicht 31.01.2025 00:15:09
- Zuletzt bearbeitet 09.07.2025 15:22:13
This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of Pioneer DMH-WT7600NEX devices. Authentication is not required to exploit this vulnerability. The specific flaw ex...
CVE-2024-23930
- EPSS 0.17%
- Veröffentlicht 31.01.2025 00:15:09
- Zuletzt bearbeitet 26.08.2025 21:15:45
This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Pioneer DMH-WT7600NEX devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within th...