CVE-2025-9576

A vulnerability was identified in seeedstudio ReSpeaker LinkIt7688. Impacted is an unknown function of the file /etc/shadow of the component Administrative Interface. The manipulation leads to use of default credentials. An attack has to be approached locally. A high degree of complexity is needed for the attack. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

No configuration.

History

28 Aug 2025, 19:15

Type Values Removed Values Added
References () https://github.com/XXRicardo/iot-cve/blob/main/seeedstudio/ramips-openwrt-LinkIt7688.md - () https://github.com/XXRicardo/iot-cve/blob/main/seeedstudio/ramips-openwrt-LinkIt7688.md -
References () https://github.com/XXRicardo/iot-cve/blob/main/seeedstudio/ramips-openwrt-LinkIt7688.md#steps-to-reproduce - () https://github.com/XXRicardo/iot-cve/blob/main/seeedstudio/ramips-openwrt-LinkIt7688.md#steps-to-reproduce -

28 Aug 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-28 18:15

Updated : 2025-08-29 16:24


NVD link : CVE-2025-9576

Mitre link : CVE-2025-9576

CVE.ORG link : CVE-2025-9576


JSON object : View

Products Affected

No product.

CWE
CWE-1392

Use of Default Credentials