CVE-2025-59449: CWE-863 Incorrect Authorization in YoSmart YoLink MQTT broker
The YoSmart YoLink MQTT broker through 2025-10-02 does not enforce sufficient authorization controls to prevent cross-account attacks, allowing an attacker to remotely operate affected devices if the attacker obtains the associated device IDs. Because YoLink device IDs are predictable, an attacker can exploit this to gain full control over any other YoLink user's devices.
AI Analysis
Technical Summary
CVE-2025-59449 is an authorization vulnerability classified under CWE-863 affecting the YoSmart YoLink MQTT broker. The broker fails to enforce sufficient authorization controls, enabling cross-account attacks where an attacker can remotely control devices belonging to other users. The root cause is the predictability of YoLink device IDs, which allows an attacker to guess or enumerate device identifiers and send MQTT commands to those devices without proper authorization checks. The vulnerability affects all versions up to 2025-10-02, with no patches currently available. The CVSS 3.1 base score is 4.9 (medium), reflecting network attack vector, high attack complexity, low privileges required, no user interaction, and partial confidentiality and integrity impact without affecting availability. Exploitation requires the attacker to have network access to the MQTT broker and knowledge or ability to predict device IDs. Once exploited, the attacker can issue commands to devices, potentially manipulating smart home or industrial IoT equipment remotely. This undermines device confidentiality and integrity, potentially leading to unauthorized control, privacy breaches, and operational disruptions. No known exploits have been reported in the wild, but the vulnerability poses a significant risk due to the widespread use of YoLink devices in IoT environments.
Potential Impact
For European organizations, the vulnerability could lead to unauthorized remote control of IoT devices, impacting privacy, operational integrity, and potentially safety depending on device function. Confidentiality is compromised as attackers can access device states and control commands. Integrity is affected since attackers can manipulate device behavior, potentially causing incorrect operations or disruptions. Although availability is not directly impacted, indirect effects such as operational disruptions or safety incidents could occur. Organizations relying on YoLink devices for smart building management, industrial automation, or home automation are particularly at risk. The cross-account nature of the attack means that even users with properly secured accounts could have their devices compromised if device IDs are predictable. This could lead to data leakage, unauthorized surveillance, or sabotage of critical IoT infrastructure. The medium CVSS score reflects moderate ease of exploitation but significant potential impact on confidentiality and integrity.
Mitigation Recommendations
1. Network Segmentation: Isolate the YoLink MQTT broker and associated IoT devices on dedicated network segments with strict access controls to limit exposure to untrusted networks. 2. Access Control: Implement firewall rules to restrict inbound and outbound MQTT traffic to known, authorized IP addresses and devices. 3. Device ID Management: Where possible, randomize or obfuscate device IDs to reduce predictability and enumeration risk. 4. Monitoring and Logging: Deploy anomaly detection systems to monitor MQTT traffic for unusual commands or access patterns indicative of cross-account attacks. 5. Vendor Engagement: Urge YoSmart to release patches that enforce robust authorization checks and improve device ID generation mechanisms. 6. Incident Response: Prepare response plans for potential device compromise, including device reset and credential rotation. 7. User Awareness: Educate users on the risks of sharing device IDs and the importance of securing network access to IoT devices. 8. Firmware Updates: Regularly check for and apply vendor updates once available to remediate the vulnerability. 9. Alternative Solutions: Evaluate alternative IoT platforms with stronger built-in security controls if patching is delayed.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands
CVE-2025-59449: CWE-863 Incorrect Authorization in YoSmart YoLink MQTT broker
Description
The YoSmart YoLink MQTT broker through 2025-10-02 does not enforce sufficient authorization controls to prevent cross-account attacks, allowing an attacker to remotely operate affected devices if the attacker obtains the associated device IDs. Because YoLink device IDs are predictable, an attacker can exploit this to gain full control over any other YoLink user's devices.
AI-Powered Analysis
Technical Analysis
CVE-2025-59449 is an authorization vulnerability classified under CWE-863 affecting the YoSmart YoLink MQTT broker. The broker fails to enforce sufficient authorization controls, enabling cross-account attacks where an attacker can remotely control devices belonging to other users. The root cause is the predictability of YoLink device IDs, which allows an attacker to guess or enumerate device identifiers and send MQTT commands to those devices without proper authorization checks. The vulnerability affects all versions up to 2025-10-02, with no patches currently available. The CVSS 3.1 base score is 4.9 (medium), reflecting network attack vector, high attack complexity, low privileges required, no user interaction, and partial confidentiality and integrity impact without affecting availability. Exploitation requires the attacker to have network access to the MQTT broker and knowledge or ability to predict device IDs. Once exploited, the attacker can issue commands to devices, potentially manipulating smart home or industrial IoT equipment remotely. This undermines device confidentiality and integrity, potentially leading to unauthorized control, privacy breaches, and operational disruptions. No known exploits have been reported in the wild, but the vulnerability poses a significant risk due to the widespread use of YoLink devices in IoT environments.
Potential Impact
For European organizations, the vulnerability could lead to unauthorized remote control of IoT devices, impacting privacy, operational integrity, and potentially safety depending on device function. Confidentiality is compromised as attackers can access device states and control commands. Integrity is affected since attackers can manipulate device behavior, potentially causing incorrect operations or disruptions. Although availability is not directly impacted, indirect effects such as operational disruptions or safety incidents could occur. Organizations relying on YoLink devices for smart building management, industrial automation, or home automation are particularly at risk. The cross-account nature of the attack means that even users with properly secured accounts could have their devices compromised if device IDs are predictable. This could lead to data leakage, unauthorized surveillance, or sabotage of critical IoT infrastructure. The medium CVSS score reflects moderate ease of exploitation but significant potential impact on confidentiality and integrity.
Mitigation Recommendations
1. Network Segmentation: Isolate the YoLink MQTT broker and associated IoT devices on dedicated network segments with strict access controls to limit exposure to untrusted networks. 2. Access Control: Implement firewall rules to restrict inbound and outbound MQTT traffic to known, authorized IP addresses and devices. 3. Device ID Management: Where possible, randomize or obfuscate device IDs to reduce predictability and enumeration risk. 4. Monitoring and Logging: Deploy anomaly detection systems to monitor MQTT traffic for unusual commands or access patterns indicative of cross-account attacks. 5. Vendor Engagement: Urge YoSmart to release patches that enforce robust authorization checks and improve device ID generation mechanisms. 6. Incident Response: Prepare response plans for potential device compromise, including device reset and credential rotation. 7. User Awareness: Educate users on the risks of sharing device IDs and the importance of securing network access to IoT devices. 8. Firmware Updates: Regularly check for and apply vendor updates once available to remediate the vulnerability. 9. Alternative Solutions: Evaluate alternative IoT platforms with stronger built-in security controls if patching is delayed.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-16T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e420ef315b94cd1520a15b
Added to database: 10/6/2025, 8:05:03 PM
Last enriched: 11/26/2025, 4:29:29 PM
Last updated: 1/7/2026, 8:45:47 AM
Views: 513
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.