A vulnerability was identified in seeedstudio ReSpeaker LinkIt7688. Impacted is an unknown function of the file /etc/shadow of the component Administrative Interface. The manipulation leads to use of default credentials. An attack has to be approached locally. A high degree of complexity is needed for the attack. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Configurations
No configuration.
History
28 Aug 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/XXRicardo/iot-cve/blob/main/seeedstudio/ramips-openwrt-LinkIt7688.md - | |
References | () https://github.com/XXRicardo/iot-cve/blob/main/seeedstudio/ramips-openwrt-LinkIt7688.md#steps-to-reproduce - |
28 Aug 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-28 18:15
Updated : 2025-08-29 16:24
NVD link : CVE-2025-9576
Mitre link : CVE-2025-9576
CVE.ORG link : CVE-2025-9576
JSON object : View
Products Affected
No product.
CWE
CWE-1392
Use of Default Credentials