{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-1051","assignerOrgId":"99f1926a-a320-47d8-bbb5-42feb611262e","state":"PUBLISHED","assignerShortName":"zdi","dateReserved":"2025-02-04T21:26:40.849Z","datePublished":"2025-06-02T19:05:27.126Z","dateUpdated":"2025-06-03T02:02:08.294Z"},"containers":{"cna":{"providerMetadata":{"orgId":"99f1926a-a320-47d8-bbb5-42feb611262e","shortName":"zdi","dateUpdated":"2025-06-02T19:05:27.126Z"},"title":"Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability","descriptions":[{"lang":"en","value":"Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the processing of ALAC data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25865."}],"affected":[{"vendor":"Sonos","product":"Era 300","versions":[{"version":"81.1-58074","status":"affected"}],"defaultStatus":"unknown"}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-122","description":"CWE-122: Heap-based Buffer Overflow","type":"CWE"}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-25-311/","name":"ZDI-25-311","tags":["x_research-advisory"]}],"dateAssigned":"2025-02-04T21:26:40.886Z","datePublic":"2025-05-29T21:24:43.990Z","source":{"lang":"en","value":"Cody Gallagher and Charlie Waters"},"metrics":[{"format":"CVSS","cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH"}}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-03T02:01:51.544492Z","id":"CVE-2025-1051","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-03T02:02:08.294Z"}}]}}