D3D Wi-Fi Home Security System ZX-G12 v2.1.1 is vulnerable to RF replay attacks on the 433 MHz sensor communication channel. The system does not implement rolling codes, message authentication, or anti-replay protection, allowing an attacker within RF range to record valid alarm/control frames and replay them to trigger false alarms.
References
| Link | Resource |
|---|---|
| http://d3d.com | Not Applicable |
| https://github.com/EmbdCDACHyd/CVE/tree/main/CVE-2025-65552 | Third Party Advisory |
| https://d3dsecurity.com/products/wifi-home-security-system-model-g12 | Product |
| https://github.com/EmbdCDACHyd/CVE/tree/main/CVE-2025-65552 | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-12 15:16
Updated : 2026-02-03 19:39
NVD link : CVE-2025-65552
Mitre link : CVE-2025-65552
CVE.ORG link : CVE-2025-65552
JSON object : View
Products Affected
d3dsecurity
- zx-g12
- zx-g12_firmware
CWE
CWE-294
Authentication Bypass by Capture-replay
