The Flock Safety Android Collins application (aka com.flocksafety.android.collins) 6.35.31 for Android lacks authentication. It is responsible for the camera feed on Falcon, Sparrow, and Bravo devices, but exposes administrative API endpoints on port 8080 without authentication. Endpoints include but are not limited to: /reboot, /logs, /crashpack, and /adb/enable. This results in multiple impacts including denial of service (DoS) via /reboot, information disclosure via /logs, and remote code execution (RCE) via /adb/enable. The latter specifically results in adb being started over TCP without debugging confirmation, providing an attacker in the LAN/WLAN with shell access.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Oct 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Flocksafety
Flocksafety bravo Edge Ai Compute Device Flocksafety collins Flocksafety falcon Flocksafety license Plate Reader Google android |
|
Vendors & Products |
Flocksafety
Flocksafety bravo Edge Ai Compute Device Flocksafety collins Flocksafety falcon Flocksafety license Plate Reader Google android |
Thu, 02 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-400 | |
Metrics |
cvssV3_1
|
Thu, 02 Oct 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Flock Safety Android Collins application (aka com.flocksafety.android.collins) 6.35.31 for Android lacks authentication. It is responsible for the camera feed on Falcon, Sparrow, and Bravo devices, but exposes administrative API endpoints on port 8080 without authentication. Endpoints include but are not limited to: /reboot, /logs, /crashpack, and /adb/enable. This results in multiple impacts including denial of service (DoS) via /reboot, information disclosure via /logs, and remote code execution (RCE) via /adb/enable. The latter specifically results in adb being started over TCP without debugging confirmation, providing an attacker in the LAN/WLAN with shell access. | |
References |
|
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-10-02T00:00:00.000Z
Updated: 2025-10-02T19:43:46.935Z
Reserved: 2025-09-15T00:00:00.000Z
Link: CVE-2025-59403

Updated: 2025-10-02T19:43:34.275Z

Status : Awaiting Analysis
Published: 2025-10-02T17:16:05.530
Modified: 2025-10-02T20:15:33.743
Link: CVE-2025-59403

No data.