Deck Mate 1 executes firmware directly from an external...
High severity
Unreviewed
Published
Oct 25, 2025
to the GitHub Advisory Database
•
Updated Oct 25, 2025
Description
Published by the National Vulnerability Database
Oct 24, 2025
Published to the GitHub Advisory Database
Oct 25, 2025
Last updated
Oct 25, 2025
Deck Mate 1 executes firmware directly from an external EEPROM without verifying authenticity or integrity. An attacker with physical access can replace or reflash the EEPROM to run arbitrary code that persists across reboots. Because this design predates modern secure-boot or signed-update mechanisms, affected systems should be physically protected or retired from service. The vendor has not indicated that firmware updates are available for this legacy model.
References