1. EXECUTIVE SUMMARY
- CVSS v4 5.3
- ATTENTION: Low attack complexity
- Vendor: TrendMakers
- Equipment: Sight Bulb Pro
- Vulnerabilities: Use of a Broken or Risky Cryptographic Algorithm, Improper Neutralization of Special Elements used in a Command (‘Command Injection’)
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to capture sensitive information and execute arbitrary shell commands on the target device as root if connected to the local network segment.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following versions of the Sight Bulb Pro Firmware are affected:
- Sight Bulb Pro Firmware ZJ_CG32-2201: Version 8.57.83 and prior
3.2 VULNERABILITY OVERVIEW
3.2.1 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327
During the initial setup of the device the user connects to an access point broadcast by the Sight Bulb Pro. During the negotiation, AES Encryption keys are passed in cleartext. If captured, an attacker may be able to decrypt communications between the management app and the Sight Bulb Pro which may include sensitive information such as network credentials.
CVE-2025-6521 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N).
A CVSS v4 score has also been calculated for CVE-2025-6521. A base score of 5.3 has been calculated; the CVSS vector string is (AV:A/AC:L/AT:P/PR:H/UI:P/
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: