Description
The locally served web site on the Garmin WDU (v1 1.4.6 and v2 5.0) allows a cross-site origin WebSocket hijacking attack. Among other uses, the WDU utilizes WebSockets to control settings, including administrative settings. This allows a network attacker to take full control of a WDU. To initiate an exploit of this vulnerability, the victim must (1) be utilizing a web browser on a multihomed host that has local interfaces on the Garmin Marine Network as well as another network, and (2) access a malicious third party website created by the attacker.
Published: 2026-05-13
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 21:00:00 +0000

Type Values Removed Values Added
Title Cross‑Site WebSocket Hijacking in Garmin WDU Firmware

Thu, 14 May 2026 19:00:00 +0000

Type Values Removed Values Added
Title WebSocket Hijacking Exploit Enables Full Control of Garmin WDU
Weaknesses CWE-1030
CWE-307

Thu, 14 May 2026 16:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-352
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Garmin
Garmin wdu
Vendors & Products Garmin
Garmin wdu

Wed, 13 May 2026 21:45:00 +0000

Type Values Removed Values Added
Title WebSocket Hijacking Exploit Enables Full Control of Garmin WDU
Weaknesses CWE-1030
CWE-307

Wed, 13 May 2026 20:30:00 +0000

Type Values Removed Values Added
Description The locally served web site on the Garmin WDU (v1 1.4.6 and v2 5.0) allows a cross-site origin WebSocket hijacking attack. Among other uses, the WDU utilizes WebSockets to control settings, including administrative settings. This allows a network attacker to take full control of a WDU. To initiate an exploit of this vulnerability, the victim must (1) be utilizing a web browser on a multihomed host that has local interfaces on the Garmin Marine Network as well as another network, and (2) access a malicious third party website created by the attacker.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-14T15:35:05.024Z

Reserved: 2025-03-09T00:00:00.000Z

Link: CVE-2025-27851

cve-icon Vulnrichment

Updated: 2026-05-14T15:34:08.882Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-13T21:16:41.233

Modified: 2026-05-14T17:06:08.693

Link: CVE-2025-27851

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T20:45:28Z

Weaknesses