ZTE ZX297520V3 BootROM contains a vulnerability that allows arbitrary memory writes via USB
The ZTE ZX297520V3 BootROM has a vulnerability that allows attackers to write data to any location in the BootROM memory via USB, potentially leading to unauthorized code execution. This is due to the lack of target address validation in the USB download mode. An attacker with physical access to the device can exploit this vulnerability.
ZTE ZX297520V3 BootROM contains a vulnerability that allows arbitrary memory writes via USB. Attackers can exploit the lack of target address validation in the USB download mode to write data to any location in BootROM runtime memory, thereby overwriting the stack, hijacking the execution flow, bypassing the Secure Boot signature verification mechanism, and achieving unauthorized code execution.
Devices with the ZTE ZX297520V3 BootROM are at risk of unauthorized code execution, particularly in scenarios where physical access to the device is possible.
Monitor & Review
Low severity — keep this CVE on your radar and patch during routine maintenance.
What should I do?
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L
0
Affected Products
1
References
CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L
Exploitability
Impact