Overview
This report details a critical vulnerability, identified as CVE-2025-48705, found within COROS PACE 3 versions through 3.0808.0. The vulnerability, a NULL pointer dereference, can be exploited to force the device to reboot, potentially compromising the system and leading to data leakage. Given the severity of this vulnerability, it is essential that affected systems are patched as soon as possible.
Vulnerability Summary
CVE ID: CVE-2025-48705
Severity: High (CVSS: 7.5)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Forced reboot of the device which could lead to system compromise or data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
COROS PACE 3 | Up to 3.0808.0
How the Exploit Works
The vulnerability stems from a NULL pointer dereference within the COROS PACE 3 device. By sending a specifically crafted BLE (Bluetooth Low Energy) message to the device, an attacker can exploit this vulnerability to force the device into a reboot. This can potentially compromise the system, and in worst-case scenarios, lead to data leakage.
Conceptual Example Code
The following is a conceptual example of a malicious BLE payload that could potentially exploit this vulnerability:
BLE /connect/device
Host: target.coros.com
{ "malicious_payload": "NULL_POINTER_DEREFERENCE_TRIGGER" }
A crafted payload that triggers the NULL pointer dereference is sent to the device via a BLE connection. This forces the device to reboot, potentially compromising the system and leading to data leakage.
Mitigation Guidance
Users are advised to apply the vendor patch as soon as it is available to mitigate the risk associated with this vulnerability. In the meantime, using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation. By monitoring network traffic for suspicious BLE messages, these systems can potentially prevent the exploitation of this vulnerability. However, these are merely temporary solutions and cannot replace the necessity of a proper patch from the vendor.

