CVE-2018-20007

Yeelight Smart AI Speaker 3.3.10_0074 devices have improper access control over the UART interface, allowing physical attackers to obtain a root shell. The attacker can then exfiltrate the audio data, read cleartext Wi-Fi credentials in a log file, or access other sensitive device and user information.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:yeelight:smart_ai_speaker_firmware:3.3.10_0074:*:*:*:*:*:*:*
cpe:2.3:h:yeelight:smart_ai_speaker:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:00

Type Values Removed Values Added
References () https://forum.yeelight.com/ - Vendor Advisory () https://forum.yeelight.com/ - Vendor Advisory
References () https://payatu.com/yeelight-smart-ai-speaker-responsible-disclosure/ - Exploit, Third Party Advisory () https://payatu.com/yeelight-smart-ai-speaker-responsible-disclosure/ - Exploit, Third Party Advisory

Information

Published : 2019-05-16 19:29

Updated : 2024-11-21 04:00


NVD link : CVE-2018-20007

Mitre link : CVE-2018-20007

CVE.ORG link : CVE-2018-20007


JSON object : View

Products Affected

yeelight

  • smart_ai_speaker_firmware
  • smart_ai_speaker
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource