CVE-2025-8653
Kenwood · Kenwood Multiple Products
A critical remote code execution vulnerability has been identified in multiple Kenwood products, carrying a CVSS score of 8.8.
Executive summary
A critical remote code execution vulnerability has been identified in multiple Kenwood products, carrying a CVSS score of 8.8. An unauthenticated remote attacker can exploit this flaw to gain complete control over an affected device by sending a malicious network packet. Successful exploitation could lead to data theft, device manipulation, or using the compromised system to launch further attacks on the network.
Vulnerability
The vulnerability is a stack-based buffer overflow within the JKRadioService component. A remote, unauthenticated attacker can send a specially crafted network request to this service. The service fails to properly validate the size of the incoming data, allowing it to write past the intended buffer on the stack. This overwrite can corrupt adjacent memory, including the function's return address, allowing the attacker to redirect the program's execution flow to malicious code (shellcode) they supplied in the request, resulting in remote code execution with the privileges of the JKRadioService.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would grant an attacker full control over the affected Kenwood device. This could lead to severe consequences, including the theft of sensitive data (e.g., paired phone information, location history, credentials), manipulation of the device's functionality, or using the compromised system as a pivot point to attack other devices on the same network. The potential for reputational damage, data breaches, and operational disruption makes this a significant risk to the organization.
Remediation
Immediate Action: Apply the security patches provided by Kenwood immediately. Prioritization should be given to any internet-facing or otherwise remotely accessible systems. After patching, system administrators should verify that the update was installed successfully and the vulnerability is mitigated.
Proactive Monitoring: Monitor network traffic for unusual or malformed packets directed at the JKRadioService port. Review system and application logs for any unexpected crashes or restarts of the service, which could indicate exploitation attempts. Implement Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) signatures designed to detect generic or specific buffer overflow attacks.
Compensating Controls: If patching cannot be performed immediately, implement network segmentation and firewall rules to restrict access to the vulnerable JKRadioService. Allow connections only from trusted, necessary IP addresses and block all access from the internet or other untrusted networks. If the service is not essential for operations, consider disabling it entirely as a temporary measure.
Exploitation status
Public Exploit Available: False
Analyst recommendation
Given the High severity rating (CVSS 8.8) and the risk of complete system compromise, this vulnerability requires immediate attention. We strongly recommend organizations identify all affected Kenwood products and apply the vendor-provided patches as a top priority. Although not yet known to be exploited in the wild, the public disclosure of this RCE vulnerability makes it an attractive target for attackers. Proactive patching is the most effective way to prevent potential system compromise and its associated business impacts.