CVE-2025-59447: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in YoSmart YoLink Smart Hub
The YoSmart YoLink Smart Hub device 0382 exposes a UART debug interface. An attacker with direct physical access can leverage this interface to read a boot log, which includes network access credentials.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-59447 affects the YoSmart YoLink Smart Hub device, specifically version 0382. The device exposes a UART (Universal Asynchronous Receiver/Transmitter) debug interface that is accessible without authentication. This interface allows an attacker with direct physical access to the device to read the boot log. The boot log contains sensitive information, including network access credentials, which could be leveraged to gain unauthorized network access. This vulnerability is classified under CWE-497, indicating exposure of sensitive system information to an unauthorized control sphere. The CVSS 3.1 base score is 2.2, reflecting low severity due to the requirement of physical access and high attack complexity. The vulnerability impacts confidentiality but does not affect integrity or availability of the device or network. No patches or firmware updates have been published at the time of disclosure, and there are no known exploits in the wild. The attack vector is physical (AV:P), with high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and the scope is changed (S:C) because the compromise of the device can lead to network-level access. This vulnerability primarily threatens environments where the device is deployed in physically accessible locations without adequate security controls.
Potential Impact
For European organizations, the primary impact is the potential compromise of network access credentials, which could lead to unauthorized network access and lateral movement within internal networks. This is particularly concerning for organizations deploying YoSmart YoLink Smart Hubs in sensitive or critical infrastructure environments such as smart buildings, industrial IoT setups, or corporate networks. The requirement for physical access limits the risk to scenarios where attackers can gain proximity to the device, such as insider threats, theft, or unauthorized physical entry. Confidentiality is compromised, but since the vulnerability does not affect device integrity or availability, the direct operational impact is limited. However, the exposure of network credentials can facilitate further attacks, including data exfiltration or network disruption. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop tools to exploit this interface. Organizations with poor physical security controls are at higher risk.
Mitigation Recommendations
1. Physically secure all YoSmart YoLink Smart Hub devices to prevent unauthorized access, including locked enclosures and restricted access areas. 2. If possible, disable or restrict access to the UART debug interface through device configuration or hardware modifications. 3. Monitor physical access logs and implement surveillance in areas where devices are deployed. 4. Change network credentials regularly and avoid using default or easily guessable credentials to limit the impact of credential exposure. 5. Segment networks to restrict access from IoT devices to critical systems, minimizing lateral movement opportunities. 6. Engage with the vendor for firmware updates or patches addressing this vulnerability and apply them promptly once available. 7. Conduct regular security audits and penetration tests focusing on physical security and IoT device vulnerabilities. 8. Educate staff about the risks of physical tampering and enforce strict access control policies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-59447: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in YoSmart YoLink Smart Hub
Description
The YoSmart YoLink Smart Hub device 0382 exposes a UART debug interface. An attacker with direct physical access can leverage this interface to read a boot log, which includes network access credentials.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-59447 affects the YoSmart YoLink Smart Hub device, specifically version 0382. The device exposes a UART (Universal Asynchronous Receiver/Transmitter) debug interface that is accessible without authentication. This interface allows an attacker with direct physical access to the device to read the boot log. The boot log contains sensitive information, including network access credentials, which could be leveraged to gain unauthorized network access. This vulnerability is classified under CWE-497, indicating exposure of sensitive system information to an unauthorized control sphere. The CVSS 3.1 base score is 2.2, reflecting low severity due to the requirement of physical access and high attack complexity. The vulnerability impacts confidentiality but does not affect integrity or availability of the device or network. No patches or firmware updates have been published at the time of disclosure, and there are no known exploits in the wild. The attack vector is physical (AV:P), with high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and the scope is changed (S:C) because the compromise of the device can lead to network-level access. This vulnerability primarily threatens environments where the device is deployed in physically accessible locations without adequate security controls.
Potential Impact
For European organizations, the primary impact is the potential compromise of network access credentials, which could lead to unauthorized network access and lateral movement within internal networks. This is particularly concerning for organizations deploying YoSmart YoLink Smart Hubs in sensitive or critical infrastructure environments such as smart buildings, industrial IoT setups, or corporate networks. The requirement for physical access limits the risk to scenarios where attackers can gain proximity to the device, such as insider threats, theft, or unauthorized physical entry. Confidentiality is compromised, but since the vulnerability does not affect device integrity or availability, the direct operational impact is limited. However, the exposure of network credentials can facilitate further attacks, including data exfiltration or network disruption. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop tools to exploit this interface. Organizations with poor physical security controls are at higher risk.
Mitigation Recommendations
1. Physically secure all YoSmart YoLink Smart Hub devices to prevent unauthorized access, including locked enclosures and restricted access areas. 2. If possible, disable or restrict access to the UART debug interface through device configuration or hardware modifications. 3. Monitor physical access logs and implement surveillance in areas where devices are deployed. 4. Change network credentials regularly and avoid using default or easily guessable credentials to limit the impact of credential exposure. 5. Segment networks to restrict access from IoT devices to critical systems, minimizing lateral movement opportunities. 6. Engage with the vendor for firmware updates or patches addressing this vulnerability and apply them promptly once available. 7. Conduct regular security audits and penetration tests focusing on physical security and IoT device vulnerabilities. 8. Educate staff about the risks of physical tampering and enforce strict access control policies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-16T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e41f4d315b94cd151daa7b
Added to database: 10/6/2025, 7:58:05 PM
Last enriched: 10/6/2025, 8:05:54 PM
Last updated: 10/7/2025, 12:31:27 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11390: Cross Site Scripting in PHPGurukul Cyber Cafe Management System
MediumCVE-2025-11389: Stack-based Buffer Overflow in Tenda AC15
HighCVE-2025-0603: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Callvision Healthcare Callvision Emergency Code
CriticalCVE-2025-11388: Stack-based Buffer Overflow in Tenda AC15
HighCVE-2025-11387: Stack-based Buffer Overflow in Tenda AC15
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.