SIMCom’s Silent Treatment: The Modem with a Root Shell Surprise!
The SIMCom SIM7600G modem is more open than a 24-hour diner. It supports an undocumented AT command, allowing attackers to execute system commands with root permission. SIMCom’s response? A year-long game of hide and seek. Customers, demand a patch faster than you can say “backdoor command!”

Hot Take:
Who needs James Bond villains when you have SIMCom modems? Apparently, they come with their very own secret backdoor for root access! For a company that leads in wireless module shipments, they sure are ghosting their emails like a teenage breakup. Maybe they’ll patch it by the time we have flying cars. But until then, looks like hackers will have a field day with their own undocumented feature party!
Key Points:
- SEC Consult discovered a critical vulnerability in the SIMCom SIM7600G modem that allows for root access via an undocumented AT command.
- The vulnerability is classified as medium impact and has been assigned CVE-2025-26412.
- SIMCom has been unresponsive for over a year despite numerous attempts at responsible disclosure.
- Customers are urged to demand a patch and perform thorough security reviews of devices using the modem.
- The modem’s firmware affected is LE20B03SIM7600M21-A, but other versions may also be vulnerable.
Already a member? Log in here