Cyber Posture

CVE-2025-57431

HighPublic PoC

Published: 22 September 2025

Published
22 September 2025
Modified
14 October 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0014 33.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-57431 is a high-severity Download of Code Without Integrity Check (CWE-494) vulnerability in Sound4 Pulse-Eco Aes67 Firmware. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 33.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-14 (Signed Components) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-7 mandates integrity verification of firmware prior to installation or update, directly countering the lack of validation for the manual.sh script in malicious firmware packages.

prevent

CM-14 requires signed components for firmware, ensuring authenticity and integrity checks that prevent deployment of attacker-modified and repackaged updates.

prevent

SI-2 requires timely flaw remediation, directly addressing the firmware update mechanism vulnerability through patching to block RCE exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Web-based management interface vulnerable to RCE via unvalidated malicious firmware update package containing arbitrary commands in manual.sh, enabling exploitation of a public-facing application.

NVD Description

The Sound4 PULSE-ECO AES67 1.22 web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying…

more

this script and repackaging the firmware.

Deeper analysisAI

CVE-2025-57431 is a Remote Code Execution (RCE) vulnerability in the Sound4 PULSE-ECO AES67 version 1.22 web-based management interface, published on 2025-09-22. The flaw arises from the firmware update mechanism's failure to validate the integrity of the manual.sh script within update packages, enabling attackers to modify this script with arbitrary commands and repackage the firmware for deployment. It is associated with CWE-494 (Download of Code Without Integrity Check) and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

A remote, unauthenticated attacker can exploit this vulnerability by crafting a malicious firmware package and tricking an administrator or user with access to the web interface into performing a manual firmware update. The required user interaction involves uploading the tampered package, after which the injected commands in manual.sh execute with elevated privileges on the device, potentially granting full system compromise including high impacts to confidentiality, integrity, and availability.

Mitigation guidance and further details are available in the referenced advisories, including the vendor site at https://www.sound4.com and the vulnerability research repository at https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57431.

Details

CWE(s)

Affected Products

sound4
pulse-eco aes67 firmware
1.22

CVEs Like This One

CVE-2023-53960Same vendor: Sound4
CVE-2023-53955Same vendor: Sound4
CVE-2023-53964Same vendor: Sound4
CVE-2022-50796Same vendor: Sound4
CVE-2023-53963Same vendor: Sound4
CVE-2023-53966Same vendor: Sound4
CVE-2026-2999Shared CWE-494
CVE-2026-3000Shared CWE-494
CVE-2026-27180Shared CWE-494
CVE-2026-40066Shared CWE-494

References