CVE-2025-67399: n/a
CVE-2025-67399 is a medium-severity vulnerability in the AIRTH SMART HOME AQI MONITOR Bootloader v1. 005. It allows a physically proximate attacker to access sensitive information through the UART port of the BK7231N Wi-Fi and BLE controller. The vulnerability does not require authentication or user interaction but requires physical proximity to the device. Exploitation impacts confidentiality but not integrity or availability. No known exploits are currently in the wild. The vulnerability affects the bootloader firmware, which is critical for device startup and security. European organizations using these devices in smart home or IoT environments should be aware of potential data leakage risks. Mitigation involves restricting physical access and monitoring device interfaces. Countries with higher smart home adoption and IoT deployments are more likely to be affected.
AI Analysis
Technical Summary
CVE-2025-67399 identifies a vulnerability in the bootloader version 1.005 of the AIRTH SMART HOME AQI MONITOR device. The root cause is the exposure of the UART (Universal Asynchronous Receiver/Transmitter) port on the BK7231N controller, which integrates Wi-Fi and BLE functionalities. This UART port is accessible without authentication, allowing an attacker physically near the device to connect and extract sensitive information directly from the bootloader. The bootloader is a critical component responsible for initializing hardware and loading the main firmware, and it may contain sensitive data such as cryptographic keys, device configuration, or debug information. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 score is 4.6 (medium severity), reflecting that the attack vector requires physical proximity (AV:P), has low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to confidentiality (C:H), with no impact on integrity or availability. No patches or fixes are currently available, and no exploits have been reported in the wild. This vulnerability primarily threatens the confidentiality of sensitive data stored or accessible via the bootloader UART interface.
Potential Impact
For European organizations, the primary impact is the potential leakage of sensitive information from AIRTH SMART HOME AQI MONITOR devices deployed in smart home or IoT environments. This could include cryptographic keys, device identifiers, or configuration data that could facilitate further attacks or unauthorized access. While the vulnerability does not directly affect device integrity or availability, the exposure of sensitive data could undermine trust in IoT deployments and lead to privacy violations or targeted attacks. Organizations relying on these devices for environmental monitoring or automation may face risks of data compromise, especially in sectors like residential services, smart buildings, or critical infrastructure monitoring. The requirement for physical proximity limits the attack scope but does not eliminate risk in shared or publicly accessible spaces. The absence of known exploits reduces immediate threat but does not preclude future exploitation.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement strict physical security controls to prevent unauthorized access to the devices, especially in shared or public environments. Device placement should avoid easily accessible locations. Network segmentation and monitoring should be employed to detect anomalous device behavior that might indicate tampering. If possible, disable or restrict UART port access through hardware modifications or firmware updates once available. Organizations should engage with the vendor for patches or updated firmware addressing this issue. Additionally, auditing and inventorying all AIRTH SMART HOME AQI MONITOR devices in use can help assess exposure. Employing endpoint detection solutions that monitor device interfaces may provide early warnings of physical tampering attempts. Finally, consider alternative devices with stronger physical security if risk tolerance is low.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Denmark, Finland, Belgium
CVE-2025-67399: n/a
Description
CVE-2025-67399 is a medium-severity vulnerability in the AIRTH SMART HOME AQI MONITOR Bootloader v1. 005. It allows a physically proximate attacker to access sensitive information through the UART port of the BK7231N Wi-Fi and BLE controller. The vulnerability does not require authentication or user interaction but requires physical proximity to the device. Exploitation impacts confidentiality but not integrity or availability. No known exploits are currently in the wild. The vulnerability affects the bootloader firmware, which is critical for device startup and security. European organizations using these devices in smart home or IoT environments should be aware of potential data leakage risks. Mitigation involves restricting physical access and monitoring device interfaces. Countries with higher smart home adoption and IoT deployments are more likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-67399 identifies a vulnerability in the bootloader version 1.005 of the AIRTH SMART HOME AQI MONITOR device. The root cause is the exposure of the UART (Universal Asynchronous Receiver/Transmitter) port on the BK7231N controller, which integrates Wi-Fi and BLE functionalities. This UART port is accessible without authentication, allowing an attacker physically near the device to connect and extract sensitive information directly from the bootloader. The bootloader is a critical component responsible for initializing hardware and loading the main firmware, and it may contain sensitive data such as cryptographic keys, device configuration, or debug information. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 score is 4.6 (medium severity), reflecting that the attack vector requires physical proximity (AV:P), has low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to confidentiality (C:H), with no impact on integrity or availability. No patches or fixes are currently available, and no exploits have been reported in the wild. This vulnerability primarily threatens the confidentiality of sensitive data stored or accessible via the bootloader UART interface.
Potential Impact
For European organizations, the primary impact is the potential leakage of sensitive information from AIRTH SMART HOME AQI MONITOR devices deployed in smart home or IoT environments. This could include cryptographic keys, device identifiers, or configuration data that could facilitate further attacks or unauthorized access. While the vulnerability does not directly affect device integrity or availability, the exposure of sensitive data could undermine trust in IoT deployments and lead to privacy violations or targeted attacks. Organizations relying on these devices for environmental monitoring or automation may face risks of data compromise, especially in sectors like residential services, smart buildings, or critical infrastructure monitoring. The requirement for physical proximity limits the attack scope but does not eliminate risk in shared or publicly accessible spaces. The absence of known exploits reduces immediate threat but does not preclude future exploitation.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement strict physical security controls to prevent unauthorized access to the devices, especially in shared or public environments. Device placement should avoid easily accessible locations. Network segmentation and monitoring should be employed to detect anomalous device behavior that might indicate tampering. If possible, disable or restrict UART port access through hardware modifications or firmware updates once available. Organizations should engage with the vendor for patches or updated firmware addressing this issue. Additionally, auditing and inventorying all AIRTH SMART HOME AQI MONITOR devices in use can help assess exposure. Employing endpoint detection solutions that monitor device interfaces may provide early warnings of physical tampering attempts. Finally, consider alternative devices with stronger physical security if risk tolerance is low.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6967c1ebd0ff220b95a1807b
Added to database: 1/14/2026, 4:18:51 PM
Last enriched: 1/14/2026, 4:33:08 PM
Last updated: 1/14/2026, 6:48:03 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23497: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in frappe lms
LowCVE-2025-33206: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NVIDIA NSIGHT Graphics
HighCVE-2026-22819: CWE-366: Race Condition within a Thread in akinloluwami outray
MediumCVE-2026-23477: CWE-269: Improper Privilege Management in RocketChat Rocket.Chat
HighCVE-2025-70747: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.