From a484fc28b18070fdadcef253c5dd239cbee4855d Mon Sep 17 00:00:00 2001 From: plan5 <30434574+plan5@users.noreply.github.com> Date: Wed, 24 Sep 2025 20:31:54 +0200 Subject: [PATCH] Fix incorrect CVE link The link to CVE-2025-32409 was wrong. The incorrect link pointed to CVE-2023-30257 and was likely copied from the disclosure timeline from the disclosure blog entry. --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index a774a70..7e933f0 100644 --- a/README.md +++ b/README.md @@ -289,7 +289,7 @@ Download the SN device manual at https://support.supernote.com/en_US/getting-sta ### 0-click Exploit ⚠ Some cybersecurity concerns that Ratta has not fixed/patched yet.
I wouldn't put any sensitive information on this tablet. Quick and easy temporary fix would be, don't connect to their servers, WiFi off until patched or if you are tech savvy then install NetGard firewall app that blocks all connections to Ratta servers etc.
-[CVE-2025-32409](https://nvd.nist.gov/vuln/detail/CVE-2023-30257). A good blog post by PRIZM Labs which details everything [here](https://www.prizmlabs.io/post/remote-rootkits-uncovering-a-0-click-rce-in-the-supernote-nomad-e-ink-tablet). +[CVE-2025-32409](https://nvd.nist.gov/vuln/detail/CVE-2025-32409). A good blog post by PRIZM Labs which details everything [here](https://www.prizmlabs.io/post/remote-rootkits-uncovering-a-0-click-rce-in-the-supernote-nomad-e-ink-tablet). ### Automations - [Automatically uploading the daily NYT crossword to a Supernote](https://nathanbuchar.com/automatically-uploading-the-nyt-crossword-supernote/) ([GitHub Actions version](https://github.com/arichiv/supernote-crossword))