Yeelight Smart AI Speaker 3.3.10_0074 devices have improper access control over the UART interface, allowing physical attackers to obtain a root shell. The attacker can then exfiltrate the audio data, read cleartext Wi-Fi credentials in a log file, or access other sensitive device and user information.
References
Link | Resource |
---|---|
https://forum.yeelight.com/ | Vendor Advisory |
https://payatu.com/yeelight-smart-ai-speaker-responsible-disclosure/ | Exploit Third Party Advisory |
https://forum.yeelight.com/ | Vendor Advisory |
https://payatu.com/yeelight-smart-ai-speaker-responsible-disclosure/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://forum.yeelight.com/ - Vendor Advisory | |
References | () https://payatu.com/yeelight-smart-ai-speaker-responsible-disclosure/ - Exploit, Third Party Advisory |
Information
Published : 2019-05-16 19:29
Updated : 2024-11-21 04:00
NVD link : CVE-2018-20007
Mitre link : CVE-2018-20007
CVE.ORG link : CVE-2018-20007
JSON object : View
Products Affected
yeelight
- smart_ai_speaker_firmware
- smart_ai_speaker
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource