{"uuid": "5b863295-b219-4e1e-857e-3c4c3f0140d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2763", "type": "seen", "source": "https://t.me/cvedetector/23606", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2763 - CarlinKit CPC200-CCPA Cryptographic Signature Verification Bypass Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2763 \nPublished : April 23, 2025, 5:16 p.m. | 59\u00a0minutes ago \nDescription : CarlinKit CPC200-CCPA Improper Verification of Cryptographic Signature Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability.  \n  \nThe specific flaw exists within the handling of update packages on USB drives. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24356. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T21:10:27.000000Z"}