Skip to main content

CVE-2025-8210: Improper Export of Android Application Components in Yeelink Yeelight App

Medium
VulnerabilityCVE-2025-8210cvecve-2025-8210
Published: Sat Jul 26 2025 (07/26/2025, 20:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Yeelink
Product: Yeelight App

Description

A vulnerability was found in Yeelink Yeelight App up to 3.5.4 on Android. It has been classified as problematic. Affected is an unknown function of the file AndroidManifest.xml of the component com.yeelight.cherry. The manipulation leads to improper export of android application components. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/03/2025, 01:04:56 UTC

Technical Analysis

CVE-2025-8210 is a medium-severity vulnerability identified in the Yeelink Yeelight Android application, specifically affecting versions 3.5.0 through 3.5.4. The root cause lies in the improper export of Android application components declared within the AndroidManifest.xml file, particularly involving the component com.yeelight.cherry. Improper export means that certain application components (such as activities, services, or broadcast receivers) are made accessible to other applications or processes without adequate access control. This can allow a local attacker—someone with physical or logical access to the device—to interact with these components in unintended ways. The vulnerability requires local access and does not need user interaction, but it does require the attacker to have at least limited privileges on the device (PR:L). The CVSS 4.0 vector indicates low complexity (AC:L), no authentication required (AT:N), and limited impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor has not responded to the disclosure, and no patches or mitigations have been published yet. Although no known exploits are currently in the wild, the public disclosure of the vulnerability means that exploitation techniques could be developed or shared. Improperly exported components can be abused to escalate privileges, leak sensitive information, or manipulate device behavior, depending on the component's functionality. Given the Yeelight app's role in managing smart lighting devices, exploitation could potentially lead to unauthorized control or information leakage related to smart home environments.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the prevalence of the Yeelight app within their user base or operational environments. Enterprises or individuals using Yeelight smart lighting solutions could face risks related to unauthorized local access to device controls or sensitive data managed by the app. While the vulnerability requires local access, in environments where devices are shared or where attackers can gain physical or limited logical access (e.g., through compromised employee devices), this could lead to privacy breaches or unauthorized manipulation of smart home or office lighting systems. This may indirectly affect operational security, especially in sensitive environments where lighting control is part of security or safety protocols. Additionally, the lack of vendor response and absence of patches increases the risk window. Although the vulnerability is medium severity and exploitation requires local access, the potential for lateral movement or escalation within a compromised device environment means organizations should consider this a relevant risk in their threat models, particularly in sectors with high smart device adoption such as technology firms, smart building management, and residential complexes.

Mitigation Recommendations

1. Limit physical and local access to devices running the Yeelight app, enforcing strict device usage policies and endpoint security controls. 2. Monitor devices for unusual inter-app communication or behavior that could indicate exploitation attempts targeting exported components. 3. Until a patch is available, consider uninstalling or disabling the Yeelight app on devices that do not require it, especially in sensitive environments. 4. Employ mobile device management (MDM) solutions to control app permissions and restrict installation of potentially vulnerable app versions. 5. Educate users about the risks of installing apps from untrusted sources and the importance of device security hygiene. 6. Network segmentation and limiting Bluetooth or local network access can reduce the risk of local attackers gaining foothold. 7. Regularly check for vendor updates or community patches addressing this vulnerability and apply them promptly once available. 8. Conduct security assessments on smart home or IoT devices integrated into organizational environments to identify similar risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-25T18:55:55.045Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68853eeead5a09ad0066f439

Added to database: 7/26/2025, 8:47:42 PM

Last enriched: 8/3/2025, 1:04:56 AM

Last updated: 9/7/2025, 12:09:41 PM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats