Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59450: CWE-312 Cleartext Storage of Sensitive Information in YoSmart YoLink Smart Hub

0
Medium
VulnerabilityCVE-2025-59450cvecve-2025-59450cwe-312
Published: Mon Oct 06 2025 (10/06/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: YoSmart
Product: YoLink Smart Hub

Description

The YoSmart YoLink Smart Hub firmware 0382 is unencrypted, and data extracted from it can be used to determine network access credentials.

AI-Powered Analysis

AILast updated: 10/06/2025, 20:25:42 UTC

Technical Analysis

CVE-2025-59450 identifies a vulnerability in the YoSmart YoLink Smart Hub firmware version 0382, where the firmware is stored in an unencrypted form. This lack of encryption means that an attacker who can extract the firmware image can analyze it to recover sensitive information, specifically network access credentials. The vulnerability is classified under CWE-312, which pertains to the cleartext storage of sensitive information. The CVSS 3.1 base score is 4.3 (medium), with an attack vector of local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact is limited to confidentiality (C:L), with no impact on integrity (I:N) or availability (A:N). Since the firmware is unencrypted, an attacker with physical or local access to the device can extract the firmware and analyze it offline to retrieve network credentials, potentially allowing unauthorized network access. No patches or firmware updates are currently available, and no exploits have been reported in the wild. This vulnerability primarily threatens environments where the device is physically accessible or where attackers can gain local access to the device's firmware storage. The YoLink Smart Hub is used in IoT and smart home environments to manage connected devices, making it a potential target for attackers seeking to compromise home or small office networks.

Potential Impact

For European organizations, the primary impact of CVE-2025-59450 is the potential compromise of network access credentials stored within the YoLink Smart Hub firmware. Unauthorized extraction of these credentials could allow attackers to gain access to internal networks, potentially leading to further lateral movement or data exfiltration. Although the vulnerability does not affect integrity or availability, the loss of confidentiality can undermine trust in smart home or IoT deployments, especially in sensitive environments such as smart offices or critical infrastructure monitoring. Organizations relying on YoLink Smart Hubs for device management may face increased risk of unauthorized access if physical security controls are insufficient. The medium severity rating reflects that exploitation requires local access, limiting the attack surface but still posing a risk in environments where devices are accessible to untrusted individuals. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop tools to automate firmware extraction and credential harvesting.

Mitigation Recommendations

To mitigate CVE-2025-59450, European organizations should implement strict physical security controls to prevent unauthorized access to YoLink Smart Hub devices. This includes securing device locations, restricting access to trusted personnel, and monitoring for tampering. Network segmentation can limit the impact of compromised credentials by isolating IoT devices from critical network segments. Organizations should actively monitor vendor communications for firmware updates or patches addressing this vulnerability and apply them promptly once available. Additionally, consider deploying network access controls and anomaly detection systems to identify unauthorized access attempts stemming from compromised credentials. Where possible, replace affected devices with models that implement encrypted firmware storage and stronger credential protection mechanisms. Finally, educate staff on the risks of physical device access and the importance of securing IoT infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e422c3315b94cd15251799

Added to database: 10/6/2025, 8:12:51 PM

Last enriched: 10/6/2025, 8:25:42 PM

Last updated: 10/7/2025, 11:52:20 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats