An incorrect encryption implementation vulnerability exists in the system log dump feature of BYD's DiLink 3.0 OS (e.g. in the model ATTO3). An attacker with physical access to the vehicle can bypass the encryption of log dumps on the In-Vehicle Infotainment (IVI) unit's storage. This allows the attacker to access and read system logs containing sensitive data, including personally identifiable information (PII) and location data.
This vulnerability was introduced in a patch intended to fix CVE-2024-54728.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://asrg.io/security-advisories/cve-2025-7020/ |
![]() ![]() |
History
Sat, 09 Aug 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An incorrect encryption implementation vulnerability exists in the system log dump feature of BYD's DiLink 3.0 OS (e.g. in the model ATTO3). An attacker with physical access to the vehicle can bypass the encryption of log dumps on the In-Vehicle Infotainment (IVI) unit's storage. This allows the attacker to access and read system logs containing sensitive data, including personally identifiable information (PII) and location data. This vulnerability was introduced in a patch intended to fix CVE-2024-54728. | |
Title | BYD DiLink OS Incorrect encryption Implementation of system log dumps | |
Weaknesses | CWE-656 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: ASRG
Published: 2025-08-09T12:42:29.150Z
Updated: 2025-08-09T12:42:29.150Z
Reserved: 2025-07-02T12:24:26.302Z
Link: CVE-2025-7020

No data.

Status : Received
Published: 2025-08-09T13:15:25.180
Modified: 2025-08-09T13:15:25.180
Link: CVE-2025-7020

No data.