A vulnerability exists in the daemon process of the Yi IOT XY-3820 v6.0.24.10, which exposes a TCP service on port 6789. This service lacks proper input validation, allowing attackers to execute arbitrary scripts present on the device by sending specially crafted TCP requests using directory traversal techniques.
Metrics
Affected Vendors & Products
References
History
Mon, 21 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-22 | |
Metrics |
cvssV3_1
|
Mon, 21 Apr 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability exists in the daemon process of the Yi IOT XY-3820 v6.0.24.10, which exposes a TCP service on port 6789. This service lacks proper input validation, allowing attackers to execute arbitrary scripts present on the device by sending specially crafted TCP requests using directory traversal techniques. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-04-21T00:00:00.000Z
Updated: 2025-04-21T15:09:08.174Z
Reserved: 2025-03-11T00:00:00.000Z
Link: CVE-2025-29660

Updated: 2025-04-21T15:08:59.006Z

Status : Awaiting Analysis
Published: 2025-04-21T15:16:00.297
Modified: 2025-04-23T14:08:13.383
Link: CVE-2025-29660

No data.