SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish.
References
| Link | Resource |
|---|---|
| https://www.akawlabs.com/blog/starlink-grpc-execution |
Configurations
No configuration.
History
12 Dec 2025, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish. |
11 Dec 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 23:15
Updated : 2025-12-12 15:17
NVD link : CVE-2025-67780
Mitre link : CVE-2025-67780
CVE.ORG link : CVE-2025-67780
JSON object : View
Products Affected
No product.
CWE
CWE-306
Missing Authentication for Critical Function
