A vulnerability in a SuperNote tablet produced by Ratta Software allows a backdoor to be installed without any user interaction, according to findings from security firm PRIZM Labs. The issue affects the SuperNote A6 X2 Nomad, for which the manufacturer is said to have released an update.
Through their research, PRIZM Labs discovered that by exploiting a combination of path traversal and an exposed TCP port, an attacker on the same local network could deliver a malicious update to the device. While the SuperNote system relies on signed updates, the researchers were able to locate development keys—simply by searching online—that allowed them to sign their rogue update. Once placed in the correct directory on the tablet, the update would install automatically without any input from the user.
The vulnerability, tracked as CVE-2025-32409, was reported to Ratta Software on July 26 of last year. The company attributed the delay in releasing a fix to staff changes, later promising an update would arrive in December. PRIZM Labs agreed to postpone public disclosure until then, but the patch never materialized. Moreover, the changelogs of subsequent updates made no mention of the vulnerability being addressed, and technical details were only disclosed this week.