Advisory Details

April 9th, 2025

(Pwn2Own) Sonos Era 300 Out-of-Bounds Write Remote Code Execution Vulnerability

ZDI-25-225
ZDI-CAN-25606

CVE ID CVE-2025-1050
CVSS SCORE 8.8, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Sonos
AFFECTED PRODUCTS Era 300
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the processing of HLS playlist data. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the anacapa user.

ADDITIONAL DETAILS

Sonos users should ensure their system is running the appropriate software version. For the Sonos app this is version 16.6 or later: go to Settings > General Settings > About My System to check the version. For the Sonos S1 app this is version 11.15.1 or later: go to More > Settings > System Updates > System Info to check the version.

Sonos Security Advisory: https://www.sonos.com/en-us/security-advisory-2024-0002
Update instructions: https://support.sonos.com/en-us/article/update-your-sonos-speakers


DISCLOSURE TIMELINE
  • 2024-12-02 - Vulnerability reported to vendor
  • 2025-04-09 - Coordinated public release of advisory
  • 2025-04-09 - Advisory Updated
CREDIT Jack Dates of RET2 Systems
BACK TO ADVISORIES