Vulnerability Description
Alpine iLX-507 vCard Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device. The specific flaw exists within the parsing of vCard data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-26316.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Alpsalpine | Ilx-507 Firmware | 6.0.000 |
| Alpsalpine | Ilx-507 | - |
Related Weaknesses (CWE)
References
- https://www.zerodayinitiative.com/advisories/ZDI-25-761/Third Party Advisory
FAQ
What is CVE-2025-8472?
CVE-2025-8472 is a vulnerability with a CVSS score of 7.4 (HIGH). Alpine iLX-507 vCard Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations o...
How severe is CVE-2025-8472?
CVE-2025-8472 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-8472?
Check the references section above for vendor advisories and patch information. Affected products include: Alpsalpine Ilx-507 Firmware, Alpsalpine Ilx-507.