- Description
- Sonos Era 300 Speaker libsmb2 Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of SMB data. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25535.
- Source
- zdi-disclosures@trendmicro.com
- NVD status
- Awaiting Analysis
CVSS 3.0
- Type
- Secondary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- zdi-disclosures@trendmicro.com
- CWE-416
- Hype score
- Not currently trending
🚨 CVE-2025-1048 🔴 HIGH (8.8) 🏢 Sonos - Era 300 🏗️ 81.1-58074 🔗 https://t.co/vHlDRsl7FG #CyberCron #VulnAlert #InfoSec https://t.co/ZI6BIS68hp
@cybercronai
25 Apr 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-1048 Sonos Era 300 Speaker libsmb2 Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affe… https://t.co/NPh3PlHlsw
@CVEnew
23 Apr 2025
300 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-1048: HIGH] Critical: Sonos Era 300 Speaker vulnerable to Remote Code Execution due to insecure SMB data processing. Attackers can exploit without authentication. Patch recommended!#cve,CVE-2025-1048,#cybersecurity https://t.co/NgYG5sFffJ https://t.co/ps0jyPYedB
@CveFindCom
23 Apr 2025
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes