The following table lists the changes that have been made to the
CVE-2025-9576 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
CVE Modified
by 134c704f-9b21-4f2e-91b3-4a467353bcc0Aug. 28, 2025
Action Type Old Value New Value Added Reference https://github.com/XXRicardo/iot-cve/blob/main/seeedstudio/ramips-openwrt-LinkIt7688.md Added Reference https://github.com/XXRicardo/iot-cve/blob/main/seeedstudio/ramips-openwrt-LinkIt7688.md#steps-to-reproduce -
New CVE Received
by [email protected]Aug. 28, 2025
Action Type Old Value New Value Added Description A vulnerability was identified in seeedstudio ReSpeaker LinkIt7688. Impacted is an unknown function of the file /etc/shadow of the component Administrative Interface. The manipulation leads to use of default credentials. An attack has to be approached locally. A high degree of complexity is needed for the attack. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. Added CVSS V4.0 AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Added CVSS V3.1 AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N Added CVSS V2 (AV:L/AC:H/Au:S/C:P/I:N/A:N) Added CWE CWE-1392 Added Reference https://github.com/XXRicardo/iot-cve/blob/main/seeedstudio/ramips-openwrt-LinkIt7688.md Added Reference https://github.com/XXRicardo/iot-cve/blob/main/seeedstudio/ramips-openwrt-LinkIt7688.md#steps-to-reproduce Added Reference https://vuldb.com/?ctiid.321690 Added Reference https://vuldb.com/?id.321690 Added Reference https://vuldb.com/?submit.636068