Description

The communication protocol implemented in Ghost Robotics Vision 60 v0.27.2 could allow an attacker to send commands to the robot from an external attack station, impersonating the control station (tablet) and gaining unauthorised full control of the robot. The absence of encryption and authentication mechanisms in the communication protocol allows an attacker to capture legitimate traffic between the robot and the controller, replicate it, and send any valid command to the robot from any attacking computer or device. The communication protocol used in this interface is based on MAVLink, a widely documented protocol, which increases the likelihood of attack. There are two methods for connecting to the robot remotely: Wi-Fi and 4G/LTE.

INFO

Published Date :

2025-10-22T08:14:54.009Z

Last Modified :

2025-10-22T15:49:22.811Z

Source :

INCIBE
AFFECTED PRODUCTS

The following products are affected by CVE-2025-41108 vulnerability.

Vendors Products
Ghost Robotics
  • Vision 60
Ghostrobotics
  • Vision 60
  • Vision 60 Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-41108.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact