Advisory Details

April 9th, 2025

(Pwn2Own) Sonos Era 300 Speaker libsmb2 Use-After-Free Remote Code Execution Vulnerability

ZDI-25-223
ZDI-CAN-25535

CVE ID CVE-2025-1048
CVSS SCORE 8.8, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Sonos
AFFECTED PRODUCTS Era 300
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the processing of SMB data. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the anacapa user.

ADDITIONAL DETAILS

Sonos users should ensure their system is running the appropriate software version. For the Sonos app this is version 16.6 or later: go to Settings > General Settings > About My System to check the version. For the Sonos S1 app this is version 11.15.1 or later: go to More > Settings > System Updates > System Info to check the version.

Sonos Security Advisory: https://www.sonos.com/en-us/security-advisory-2024-0002
Update instructions: https://support.sonos.com/en-us/article/update-your-sonos-speakers


DISCLOSURE TIMELINE
  • 2024-12-02 - Vulnerability reported to vendor
  • 2025-04-09 - Coordinated public release of advisory
  • 2025-04-09 - Advisory Updated
CREDIT dungdm (@_piers2) with Viettel Cyber Security
BACK TO ADVISORIES