Yeelight Smart AI Speaker 3.3.10_0074 devices have improper access control over the UART interface, allowing physical attackers to obtain a root shell. The attacker can then exfiltrate the audio data, read cleartext Wi-Fi credentials in a log file, or access other sensitive device and user information.
2019-05-16T19:29:00.270
2024-11-21T04:00:44.347
Modified
CVSSv3.0: 6.8 (MEDIUM)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | yeelight | smart_ai_speaker_firmware | 3.3.10_0074 | Yes |
Hardware | yeelight | smart_ai_speaker | - | No |