SIMCom’s Silent Treatment: The Modem with a Root Shell Surprise!

The SIMCom SIM7600G modem is more open than a 24-hour diner. It supports an undocumented AT command, allowing attackers to execute system commands with root permission. SIMCom’s response? A year-long game of hide and seek. Customers, demand a patch faster than you can say “backdoor command!”

Pro Dashboard

Hot Take:

Who needs James Bond villains when you have SIMCom modems? Apparently, they come with their very own secret backdoor for root access! For a company that leads in wireless module shipments, they sure are ghosting their emails like a teenage breakup. Maybe they’ll patch it by the time we have flying cars. But until then, looks like hackers will have a field day with their own undocumented feature party!

Key Points:

  • SEC Consult discovered a critical vulnerability in the SIMCom SIM7600G modem that allows for root access via an undocumented AT command.
  • The vulnerability is classified as medium impact and has been assigned CVE-2025-26412.
  • SIMCom has been unresponsive for over a year despite numerous attempts at responsible disclosure.
  • Customers are urged to demand a patch and perform thorough security reviews of devices using the modem.
  • The modem’s firmware affected is LE20B03SIM7600M21-A, but other versions may also be vulnerable.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?