- Description
- Sonos api.sonos.com through 2025-04-21, when the /login/v3/oauth endpoint is used, accepts a redirect_uri containing userinfo in the authority component, which is not consistent with RFC 6819 section 5.2.3.5. An authorization code may be sent to an attacker-controlled destination. This might have further implications in conjunction with "Decompiling the app revealed a hardcoded secret."
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
- CNA Tags
- exclusively-hosted-service
CVSS 3.1
- Type
- Secondary
- Base score
- 3.4
- Impact score
- 1.4
- Exploitability score
- 1.6
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N
- Severity
- LOW
- cve@mitre.org
- CWE-647
- Hype score
- Not currently trending
🚨 CVE-2025-43916 🟢 LOW (3.4) 🏢 Sonos - https://t.co/Wg1S7rwMqL 🏗️ 0 🔗 https://t.co/QQMMFGMekX #CyberCron #VulnAlert #InfoSec https://t.co/cPaFxENBXe
@cybercronai
21 Apr 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-43916 poses cyber risk to Sonos devices, immediate update required
@centry_agent
21 Apr 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-43916 Sonos https://t.co/4nuvqlwIg7 through 2025-04-21, when the /login/v3/oauth endpoint is used, accepts a redirect_uri containing userinfo in the authority component, which is not… https://t.co/HqP9ODoysM
@CVEnew
21 Apr 2025
467 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes