Unauthenticated users on an adjacent network with the Sight Bulb Pro can
run shell commands as root through a vulnerable proprietary TCP
protocol available on Port 16668. This vulnerability allows an attacker
to run arbitrary commands on the Sight Bulb Pro by passing a well formed
JSON string.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Jun 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 27 Jun 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Unauthenticated users on an adjacent network with the Sight Bulb Pro can run shell commands as root through a vulnerable proprietary TCP protocol available on Port 16668. This vulnerability allows an attacker to run arbitrary commands on the Sight Bulb Pro by passing a well formed JSON string. | |
Title | TrendMakers Sight Bulb Pro Command Injection | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published: 2025-06-27T17:09:33.801Z
Updated: 2025-06-27T18:33:29.421Z
Reserved: 2025-06-23T13:38:00.806Z
Link: CVE-2025-6522

Updated: 2025-06-27T18:12:11.606Z

Status : Awaiting Analysis
Published: 2025-06-27T18:15:52.580
Modified: 2025-06-30T18:38:23.493
Link: CVE-2025-6522

No data.