{
  "affected": [
    {
      "database_specific": {
        "unresolved_ranges": [
          {
            "events": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "18_178_221102_ascii_pro_1r5_50"
              }
            ]
          }
        ]
      }
    }
  ],
  "details": "The OTA firmware update mechanism in Netun Solutions HelpFlash IoT (firmware v18_178_221102_ASCII_PRO_1R5_50) uses hard-coded WiFi credentials identical across all devices and does not authenticate update servers or validate firmware signatures. An attacker with brief physical access can activate OTA mode (8-second button press), create a malicious WiFi AP using the known credentials, and serve malicious firmware via unauthenticated HTTP to achieve arbitrary code execution on this safety-critical emergency signaling device.",
  "id": "CVE-2025-65855",
  "modified": "2026-03-10T21:53:31.718518508Z",
  "published": "2025-12-17T17:15:50.657Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://docs.espressif.com/projects/esp-idf/en/v4.3.2/"
    },
    {
      "type": "ADVISORY",
      "url": "https://luismirandaacebedo.github.io/CVE-2025-65855/"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}