| |
Vulnerability CVE-2018-20007
Published: 2019-05-16
Description: |
Yeelight Smart AI Speaker 3.3.10_0074 devices have improper access control over the UART interface, allowing physical attackers to obtain a root shell. The attacker can then exfiltrate the audio data, read cleartext Wi-Fi credentials in a log file, or access other sensitive device and user information. |
Type:
CWE-732
CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
7.2/10 |
10/10 |
3.9/10 |
Exploit range |
Attack complexity |
Authentication |
Local |
Low |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Complete |
Complete |
Complete |
References: |
https://forum.yeelight.com/
https://payatu.com/yeelight-smart-ai-speaker-responsible-disclosure/
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|