Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59448: CWE-319 Cleartext Transmission of Sensitive Information in YoSmart YoLink ecosystem

0
Medium
VulnerabilityCVE-2025-59448cvecve-2025-59448cwe-319
Published: Mon Oct 06 2025 (10/06/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: YoSmart
Product: YoLink ecosystem

Description

Components of the YoSmart YoLink ecosystem through 2025-10-02 leverage unencrypted MQTT to communicate over the internet. An attacker with the ability to monitor network traffic could therefore obtain sensitive information or tamper with the traffic to control affected devices. This affects YoLink Hub 0382, YoLink Mobile Application 1.40.41, and YoLink MQTT Broker.

AI-Powered Analysis

AILast updated: 10/06/2025, 20:05:20 UTC

Technical Analysis

CVE-2025-59448 identifies a vulnerability in the YoSmart YoLink ecosystem where MQTT communication between devices, the mobile application, and the MQTT broker is transmitted without encryption. MQTT is a lightweight messaging protocol commonly used in IoT environments for device communication. In this case, the YoLink Hub 0382, YoLink Mobile Application version 1.40.41, and the YoLink MQTT Broker send data over the internet using unencrypted MQTT, violating secure communication best practices. This cleartext transmission (classified under CWE-319) enables an attacker with network monitoring capabilities—such as those on the same local network or with access to internet traffic paths—to intercept sensitive information including device commands, status updates, and potentially authentication tokens. Furthermore, the attacker could tamper with MQTT messages to manipulate device behavior, effectively gaining unauthorized control over affected IoT devices. The vulnerability does not require any privileges or user interaction but has a high attack complexity, likely due to the need for network access and the challenge of positioning oneself to intercept traffic. The CVSS 3.1 score of 4.7 (medium) reflects limited impact on availability but low to moderate impact on confidentiality and integrity. No patches or mitigations are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability affects all versions up to the disclosed date, indicating a systemic design flaw in the YoLink ecosystem’s communication architecture.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of IoT device communications within the YoLink ecosystem. Intercepted data could reveal sensitive operational information or user behaviors, which may be leveraged for further attacks or privacy violations. Tampering with MQTT messages could allow attackers to manipulate device states, potentially disrupting smart home automation, security systems, or other IoT-dependent processes. While the vulnerability does not directly affect availability, unauthorized control over devices could indirectly cause service disruptions or safety concerns. Organizations relying on YoLink devices in critical environments or with sensitive data should consider the risk of espionage, sabotage, or privacy breaches. The requirement for network access limits the attack surface but does not eliminate risk, especially in environments with insufficient network segmentation or exposure to untrusted networks. Given the growing adoption of IoT devices in Europe, especially in smart homes and small business environments, this vulnerability could have widespread implications if not addressed.

Mitigation Recommendations

To mitigate CVE-2025-59448, European organizations should immediately assess their deployment of YoLink ecosystem devices and isolate them on segmented networks with strict access controls to limit exposure to untrusted users and networks. Network monitoring should be enhanced to detect unusual MQTT traffic patterns or unauthorized device commands. Where possible, organizations should disable internet-facing MQTT communication or restrict it via VPNs or secure tunnels that provide encryption and authentication. Since no patches are currently available, users should contact YoSmart for updates or firmware upgrades that implement encrypted MQTT (e.g., MQTT over TLS). Additionally, organizations can deploy network-level encryption solutions or MQTT proxies that enforce TLS encryption between clients and brokers. Regularly auditing device firmware versions and applying updates promptly when released is critical. Finally, educating users about the risks of connecting IoT devices to insecure networks and encouraging strong network security hygiene will reduce the likelihood of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e420ef315b94cd1520a156

Added to database: 10/6/2025, 8:05:03 PM

Last enriched: 10/6/2025, 8:05:20 PM

Last updated: 10/7/2025, 10:16:52 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats