The following table lists the changes that have been made to the
CVE-2025-25736 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Aug. 26, 2025
Action Type Old Value New Value Added Description Kapsch TrafficCom RIS-9260 RSU LEO v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to contain Android Debug Bridge (ADB) pre-installed (/mnt/c3platpersistent/opt/platform-tools/adb) and enabled by default, allowing unauthenticated root shell access to the cellular modem via the default ‘kapsch’ user. Added Reference https://cwe.mitre.org/data/definitions/306.html Added Reference https://phrack.org/issues/72/16_md Added Reference https://www.kapsch.net/_Resources/Persistent/3d251a8445e0bf50093903ad70b3dbed34dec7e7/KTC-CVS_RIS-9260_DataSheet.pdf Added Reference https://www.kapsch.net/en Added Reference https://www.kapsch.net/en/press/releases/ktc-20200813-pr-en