An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device
References
Link | Resource |
---|---|
https://psirt.kunbus.com/.well-known/csaf/white/2025/kunbus-2025-0000003.json | Product |
https://www.kunbus.com/en/productsecurity/Kunbus-2025-0000003 | Vendor Advisory |
Configurations
History
10 Jun 2025, 19:29
Type | Values Removed | Values Added |
---|---|---|
First Time |
Kunbus revpi Status
Kunbus |
|
References | () https://psirt.kunbus.com/.well-known/csaf/white/2025/kunbus-2025-0000003.json - Product | |
References | () https://www.kunbus.com/en/productsecurity/Kunbus-2025-0000003 - Vendor Advisory | |
CPE | cpe:2.3:a:kunbus:revpi_status:*:*:*:*:*:*:*:* |
09 Jun 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Jun 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-06 15:15
Updated : 2025-06-10 19:29
NVD link : CVE-2025-41646
Mitre link : CVE-2025-41646
CVE.ORG link : CVE-2025-41646
JSON object : View
Products Affected
kunbus
- revpi_status
CWE
CWE-704
Incorrect Type Conversion or Cast