Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59447: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in YoSmart YoLink Smart Hub

0
Low
VulnerabilityCVE-2025-59447cvecve-2025-59447cwe-497
Published: Mon Oct 06 2025 (10/06/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: YoSmart
Product: YoLink Smart Hub

Description

The YoSmart YoLink Smart Hub device 0382 exposes a UART debug interface. An attacker with direct physical access can leverage this interface to read a boot log, which includes network access credentials.

AI-Powered Analysis

AILast updated: 10/06/2025, 20:05:54 UTC

Technical Analysis

The vulnerability identified as CVE-2025-59447 affects the YoSmart YoLink Smart Hub device, specifically version 0382. The device exposes a UART (Universal Asynchronous Receiver/Transmitter) debug interface that is accessible without authentication. This interface allows an attacker with direct physical access to the device to read the boot log. The boot log contains sensitive information, including network access credentials, which could be leveraged to gain unauthorized network access. This vulnerability is classified under CWE-497, indicating exposure of sensitive system information to an unauthorized control sphere. The CVSS 3.1 base score is 2.2, reflecting low severity due to the requirement of physical access and high attack complexity. The vulnerability impacts confidentiality but does not affect integrity or availability of the device or network. No patches or firmware updates have been published at the time of disclosure, and there are no known exploits in the wild. The attack vector is physical (AV:P), with high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and the scope is changed (S:C) because the compromise of the device can lead to network-level access. This vulnerability primarily threatens environments where the device is deployed in physically accessible locations without adequate security controls.

Potential Impact

For European organizations, the primary impact is the potential compromise of network access credentials, which could lead to unauthorized network access and lateral movement within internal networks. This is particularly concerning for organizations deploying YoSmart YoLink Smart Hubs in sensitive or critical infrastructure environments such as smart buildings, industrial IoT setups, or corporate networks. The requirement for physical access limits the risk to scenarios where attackers can gain proximity to the device, such as insider threats, theft, or unauthorized physical entry. Confidentiality is compromised, but since the vulnerability does not affect device integrity or availability, the direct operational impact is limited. However, the exposure of network credentials can facilitate further attacks, including data exfiltration or network disruption. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop tools to exploit this interface. Organizations with poor physical security controls are at higher risk.

Mitigation Recommendations

1. Physically secure all YoSmart YoLink Smart Hub devices to prevent unauthorized access, including locked enclosures and restricted access areas. 2. If possible, disable or restrict access to the UART debug interface through device configuration or hardware modifications. 3. Monitor physical access logs and implement surveillance in areas where devices are deployed. 4. Change network credentials regularly and avoid using default or easily guessable credentials to limit the impact of credential exposure. 5. Segment networks to restrict access from IoT devices to critical systems, minimizing lateral movement opportunities. 6. Engage with the vendor for firmware updates or patches addressing this vulnerability and apply them promptly once available. 7. Conduct regular security audits and penetration tests focusing on physical security and IoT device vulnerabilities. 8. Educate staff about the risks of physical tampering and enforce strict access control policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e41f4d315b94cd151daa7b

Added to database: 10/6/2025, 7:58:05 PM

Last enriched: 10/6/2025, 8:05:54 PM

Last updated: 10/7/2025, 12:31:27 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats