D3D Wi-Fi Home Security System ZX-G12 v2.1.1 is vulnerable to RF replay attacks on the 433 MHz sensor communication channel. The system does not implement rolling codes, message authentication, or anti-replay protection, allowing an attacker within RF range to record valid alarm/control frames and replay them to trigger false alarms.
Metrics
Affected Vendors & Products
References
History
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D3dsecurity
D3dsecurity xz-g12 D3dsecurity xz-g12 Firmware |
|
| CPEs | cpe:2.3:h:d3dsecurity:xz-g12:-:*:*:*:*:*:*:* cpe:2.3:o:d3dsecurity:xz-g12_firmware:2.1.17:*:*:*:*:*:*:* |
|
| Vendors & Products |
D3dsecurity
D3dsecurity xz-g12 D3dsecurity xz-g12 Firmware |
Tue, 13 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-294 | |
| References |
| |
| Metrics |
cvssV3_1
|
Mon, 12 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | D3D Wi-Fi Home Security System ZX-G12 v2.1.1 is vulnerable to RF replay attacks on the 433 MHz sensor communication channel. The system does not implement rolling codes, message authentication, or anti-replay protection, allowing an attacker within RF range to record valid alarm/control frames and replay them to trigger false alarms. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-01-12T00:00:00.000Z
Updated: 2026-01-13T19:08:45.203Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65552
Updated: 2026-01-13T14:20:05.495Z
Status : Analyzed
Published: 2026-01-12T15:16:03.607
Modified: 2026-01-22T22:01:09.587
Link: CVE-2025-65552
No data.
ReportizFlow