CVE-2025-69515
Published: 07 April 2026
Summary
CVE-2025-69515 is a critical-severity Incorrectly Specified Destination in a Communication Channel (CWE-941) vulnerability in Jxl (inferred from references). Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-42 (Sensor Capability and Data) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the improper validation of falsified GPS signals by requiring checks on information inputs to the infotainment system.
Protects GPS sensor capability and data against spoofing by restricting and validating sensor inputs and operations.
Ensures integrity of GPS data transmissions over the network, helping to detect and block falsified signals.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote network exploitation of public-facing infotainment system (T1190) directly enables falsified GPS data injection, resulting in runtime manipulation of location data reported by the device (T1565.003).
NVD Description
An issue in JXL 9 Inch Car Android Double Din Player Android v12.0 allows attackers to force the infotainment system into accepting falsified GPS signals as legitimate, resulting in the device reporting an incorrect or static location.
Deeper analysisAI
CVE-2025-69515 is a vulnerability affecting the JXL 9 Inch Car Android Double Din Player running Android v12.0. The issue enables attackers to force the infotainment system into accepting falsified GPS signals as legitimate, causing the device to report an incorrect or static location. Published on 2026-04-07, it carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) and maps to CWE-941.
Remote attackers can exploit this vulnerability over the network with low attack complexity, without requiring privileges or user interaction. Successful exploitation allows them to spoof GPS data, compromising the integrity and availability of location services on the infotainment system, while confidentiality remains unaffected.
Advisories and further details, including potential mitigations, are available at http://jxl.com and https://github.com/thorat-shubham/JXL_Infotainment_CVE-2025-69515/blob/main/README.md.
Details
- CWE(s)