CVE-2025-65855

HelpFlash IoT OTA Update Multiple Vulnerabilities


Summary

Multiple vulnerabilities in the OTA firmware update mechanism of Netun Solutions HelpFlash IoT allow an attacker with brief physical access to execute arbitrary code.

CVE ID: CVE-2025-65855
Severity: HIGH
CVSS v3.1 Score: 7.6 (Researcher assessment - pending NVD analysis)
CVSS Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS Breakdown

Official CVSS score will be published by NVD following their analysis.


Affected Products

Vendor: Netun Solutions S.L.
Product: HelpFlash IoT
Product Page: https://netun.com/en/products/help-flash-iot
Versions: v18_178_221102_ASCII_PRO_1R5_50 and prior
Component: OTA firmware update system (ESP-IDF v4.3.2)

Device Context:
HelpFlash IoT is a safety-critical emergency road signaling device mandated by Spanish traffic authority (DGT) as a replacement for traditional warning triangles in vehicles.


Vulnerability Details

The device’s OTA update mechanism contains multiple security issues:

  1. Hard-coded WiFi Credentials (CWE-798)
    • Credentials identical across all devices
    • SSID: HF-UpdateAP-5JvqFV
    • Password: HF-UpdateAP-5JvqFV
  2. Unauthenticated Update Server (CWE-494)
    • No server authentication
    • No firmware signature verification
    • HTTP only (no HTTPS)
  3. Cleartext Transmission (CWE-319)
    • Firmware transmitted over unencrypted HTTP
    • Vulnerable to MITM attacks
  4. No OTA Activation Authentication
    • 8-second button press activates OTA mode
    • No PIN or additional authentication required

Impact

An attacker with brief physical access can:

Attack Scalability: Identical credentials across all devices enable mass exploitation.


Proof of Concept

Complete proof of concept developed and validated on multiple devices. Attack successfully demonstrated:

PoC code available to vendor and security researchers under appropriate arrangements.


Mitigation

Vendor should implement:


Timeline

Vendor was notified through INCIBE-CERT coordinated disclosure process. INCIBE-CERT confirmed no publication restrictions apply and authorized public disclosure.


Credits

Discovered by: Luis Miranda Acebedo
Contact: luis.miranda.acebedo@gmail.com


References