6.8
CVSSv3

CVE-2022-25213

Published: 10/03/2022 Updated: 08/08/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.8 | Impact Score: 5.9 | Exploitability Score: 0.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Improper physical access control and use of hard-coded credentials in /etc/passwd permits an attacker with physical access to obtain a root shell via an unprotected UART port on the device. The same port exposes an unauthenticated Das U-Boot BIOS shell.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

phicomm k2_firmware

phicomm k3_firmware

phicomm k3c_firmware

phicomm k2g_firmware

phicomm k2p_firmware