Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. 
The specific flaw exists within the processing of ID3 data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25601.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-25-224/ | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    25 Aug 2025, 14:43
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Sonos s2 Sonos era 300 Sonos s1 Sonos | |
| References | () https://www.zerodayinitiative.com/advisories/ZDI-25-224/ - Third Party Advisory | |
| CPE | cpe:2.3:a:sonos:s2:*:*:*:*:*:*:*:* cpe:2.3:a:sonos:s1:*:*:*:*:*:*:*:* cpe:2.3:h:sonos:era_300:-:*:*:*:*:*:*:* | 
29 Apr 2025, 13:52
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
23 Apr 2025, 17:16
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-04-23 17:16
Updated : 2025-08-25 14:43
NVD link : CVE-2025-1049
Mitre link : CVE-2025-1049
CVE.ORG link : CVE-2025-1049
JSON object : View
Products Affected
                sonos
- s1
- s2
- era_300
CWE
                
                    
                        
                        CWE-122
                        
            Heap-based Buffer Overflow
