The Sound4 IMPACT web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware.
References
| Link | Resource |
|---|---|
| https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63215%20_%20Sound4%20IMPACT%20%20RCE | Exploit Third Party Advisory |
| https://www.sound4helpdesk.com/ | Product |
| https://www.sound4helpdesk.com/impact-downloads/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
15 Jan 2026, 21:52
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Sound4 impact Firmware
Sound4 Sound4 impact |
|
| CPE | cpe:2.3:o:sound4:impact_firmware:2.33:*:*:*:*:*:*:* cpe:2.3:h:sound4:impact:-:*:*:*:*:*:*:* |
|
| References | () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63215%20_%20Sound4%20IMPACT%20%20RCE - Exploit, Third Party Advisory | |
| References | () https://www.sound4helpdesk.com/ - Product | |
| References | () https://www.sound4helpdesk.com/impact-downloads/ - Product |
19 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
| CWE | CWE-494 |
18 Nov 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 22:15
Updated : 2026-01-15 21:52
NVD link : CVE-2025-63215
Mitre link : CVE-2025-63215
CVE.ORG link : CVE-2025-63215
JSON object : View
Products Affected
sound4
- impact
- impact_firmware
CWE
CWE-494
Download of Code Without Integrity Check
