Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59452: CWE-340 Generation of Predictable Numbers or Identifiers in YoSmart YoLink API

0
Medium
VulnerabilityCVE-2025-59452cvecve-2025-59452cwe-340
Published: Mon Oct 06 2025 (10/06/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: YoSmart
Product: YoLink API

Description

The YoSmart YoLink API through 2025-10-02 uses an endpoint URL that is derived from a device's MAC address along with an MD5 hash of non-secret information, such as a key that begins with cf50.

AI-Powered Analysis

AILast updated: 11/26/2025, 16:30:08 UTC

Technical Analysis

CVE-2025-59452 identifies a vulnerability in the YoSmart YoLink API related to the generation of predictable endpoint URLs. The API constructs these URLs using a device's MAC address combined with an MD5 hash of a non-secret key starting with 'cf50'. Since the MAC address is a fixed hardware identifier and MD5 hashing of non-secret information is reversible or guessable, attackers can predict or enumerate valid API endpoints. This predictability violates secure design principles outlined in CWE-340, which warns against generating predictable numbers or identifiers. The vulnerability allows unauthenticated remote attackers to infer device endpoints, potentially facilitating unauthorized information gathering or targeted attacks. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N) indicates the attack can be performed remotely over the network with low complexity, no privileges, and no user interaction, affecting confidentiality with a scope change. No integrity or availability impacts are noted. No patches or known exploits are currently reported, but the vulnerability remains exploitable until fixed. The YoLink API is used in IoT devices managed by YoSmart, which may include smart home or industrial IoT products. The use of MD5 and predictable inputs for endpoint generation is a cryptographic weakness that should be remediated by adopting secure random or cryptographically strong identifiers and avoiding exposure of hardware identifiers in URLs.

Potential Impact

For European organizations, the primary impact is the potential exposure of device endpoint information, which can lead to reconnaissance by threat actors. This exposure could facilitate further targeted attacks, such as unauthorized access attempts, device fingerprinting, or privacy breaches. While the vulnerability does not directly allow device control or data modification, it lowers the barrier for attackers to identify and target specific IoT devices. Organizations relying on YoSmart's IoT infrastructure for smart building management, industrial automation, or consumer smart home devices may face increased risk of information leakage. This could result in reputational damage, regulatory scrutiny under GDPR if personal data is indirectly exposed, and increased operational risk. The medium severity reflects that while the vulnerability is exploitable remotely without authentication, the impact is limited to confidentiality and does not disrupt device functionality or integrity. However, given the growing reliance on IoT in European critical infrastructure and enterprises, even information disclosure vulnerabilities warrant prompt attention.

Mitigation Recommendations

1. Restrict network access to YoLink API endpoints using network segmentation and firewall rules to limit exposure to trusted IP ranges. 2. Monitor API traffic for unusual enumeration patterns or repeated requests that may indicate exploitation attempts. 3. Engage with YoSmart to obtain timelines for patches or updates that replace predictable endpoint generation with cryptographically secure random identifiers. 4. Where possible, avoid exposing device MAC addresses or other hardware identifiers in URLs or API parameters. 5. Implement strong authentication and authorization controls around IoT device management interfaces to reduce risk from endpoint enumeration. 6. Conduct regular security assessments of IoT deployments to identify similar weaknesses in identifier generation. 7. Educate operational teams on the risks of predictable identifiers and the importance of applying vendor updates promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e422c3315b94cd152517a3

Added to database: 10/6/2025, 8:12:51 PM

Last enriched: 11/26/2025, 4:30:08 PM

Last updated: 1/7/2026, 8:43:13 AM

Views: 124

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats