Freebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025.
References
| Link | Resource |
|---|---|
| https://7h30th3r0n3.fr/the-vulnerability-that-killed-freewifi_secure/ | Broken Link |
| https://gist.github.com/7h30th3r0n3/1a0fadb19f1528e3d3f6bad9f680c3b0#file-cve-2025-63292-frebox-imsi-md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-17 19:16
Updated : 2026-02-04 20:50
NVD link : CVE-2025-63292
Mitre link : CVE-2025-63292
CVE.ORG link : CVE-2025-63292
JSON object : View
Products Affected
freebox
- v5_crystal
- v5_hd
- v5_hd_firmware
- mini_4k
- one_firmware
- v6_revolution_firmware
- mini_4k_firmware
- one
- v5_crystal_firmware
- v6_revolution
CWE
CWE-319
Cleartext Transmission of Sensitive Information
