Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Freebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Freebox多款产品 安全漏洞
Vulnerability Description
Freebox v5等都是法国Free公司的一个电视盒子。 Freebox多款产品存在安全漏洞,该漏洞源于IMSI标识符明文传输,可能导致设备跟踪和用户监控。以下产品及版本受到影响:Freebox v5 HD 1.7.20版本、Freebox v5 Crystal 1.7.20版本、Freebox v6 Révolution r1至r3 4.7.x版本、Freebox Mini 4K 4.7.x版本和Freebox One 4.7.x版本。
CVSS Information
N/A
Vulnerability Type
N/A