CVE-2026-4149

Sonos · Era 300

The Sonos Era 300 is vulnerable to remote code execution due to an out-of-bounds memory access issue within SMB response handling.

Executive summary

A critical remote code execution vulnerability in the Sonos Era 300 allows unauthenticated attackers to execute arbitrary code at the kernel level.

Vulnerability

This is an out-of-bounds memory access vulnerability in the handling of the DataOffset field within SMB responses. The flaw permits unauthenticated remote attackers to execute code in the kernel context.

Business impact

With a CVSS score of 10.0, this is a critical-severity issue. An attacker could achieve full control over the device, potentially using it as a beachhead for further network exploitation, data interception, or denial-of-service against the local environment.

Remediation

Immediate Action: Update the Sonos Era 300 firmware to the latest version provided by the manufacturer.

Proactive Monitoring: Monitor network traffic for unusual SMB protocol activity or unauthorized connection attempts targeting Sonos devices.

Compensating Controls: Isolate Sonos devices on a restricted, non-critical VLAN to limit the potential impact of a device-level compromise.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Given the kernel-level impact and the potential for device control, immediate firmware updates are essential. Network administrators should ensure these devices are appropriately segmented.