CVE-2025-8210: Improper Export of Android Application Components in Yeelink Yeelight App
A vulnerability was found in Yeelink Yeelight App up to 3.5.4 on Android. It has been classified as problematic. Affected is an unknown function of the file AndroidManifest.xml of the component com.yeelight.cherry. The manipulation leads to improper export of android application components. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-8210 is a medium-severity vulnerability identified in the Yeelink Yeelight Android application, specifically affecting versions 3.5.0 through 3.5.4. The root cause lies in the improper export of Android application components declared within the AndroidManifest.xml file, particularly involving the component com.yeelight.cherry. Improper export means that certain application components (such as activities, services, or broadcast receivers) are made accessible to other applications or processes without adequate access control. This can allow a local attacker—someone with physical or logical access to the device—to interact with these components in unintended ways. The vulnerability requires local access and does not need user interaction, but it does require the attacker to have at least limited privileges on the device (PR:L). The CVSS 4.0 vector indicates low complexity (AC:L), no authentication required (AT:N), and limited impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor has not responded to the disclosure, and no patches or mitigations have been published yet. Although no known exploits are currently in the wild, the public disclosure of the vulnerability means that exploitation techniques could be developed or shared. Improperly exported components can be abused to escalate privileges, leak sensitive information, or manipulate device behavior, depending on the component's functionality. Given the Yeelight app's role in managing smart lighting devices, exploitation could potentially lead to unauthorized control or information leakage related to smart home environments.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the prevalence of the Yeelight app within their user base or operational environments. Enterprises or individuals using Yeelight smart lighting solutions could face risks related to unauthorized local access to device controls or sensitive data managed by the app. While the vulnerability requires local access, in environments where devices are shared or where attackers can gain physical or limited logical access (e.g., through compromised employee devices), this could lead to privacy breaches or unauthorized manipulation of smart home or office lighting systems. This may indirectly affect operational security, especially in sensitive environments where lighting control is part of security or safety protocols. Additionally, the lack of vendor response and absence of patches increases the risk window. Although the vulnerability is medium severity and exploitation requires local access, the potential for lateral movement or escalation within a compromised device environment means organizations should consider this a relevant risk in their threat models, particularly in sectors with high smart device adoption such as technology firms, smart building management, and residential complexes.
Mitigation Recommendations
1. Limit physical and local access to devices running the Yeelight app, enforcing strict device usage policies and endpoint security controls. 2. Monitor devices for unusual inter-app communication or behavior that could indicate exploitation attempts targeting exported components. 3. Until a patch is available, consider uninstalling or disabling the Yeelight app on devices that do not require it, especially in sensitive environments. 4. Employ mobile device management (MDM) solutions to control app permissions and restrict installation of potentially vulnerable app versions. 5. Educate users about the risks of installing apps from untrusted sources and the importance of device security hygiene. 6. Network segmentation and limiting Bluetooth or local network access can reduce the risk of local attackers gaining foothold. 7. Regularly check for vendor updates or community patches addressing this vulnerability and apply them promptly once available. 8. Conduct security assessments on smart home or IoT devices integrated into organizational environments to identify similar risks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain
CVE-2025-8210: Improper Export of Android Application Components in Yeelink Yeelight App
Description
A vulnerability was found in Yeelink Yeelight App up to 3.5.4 on Android. It has been classified as problematic. Affected is an unknown function of the file AndroidManifest.xml of the component com.yeelight.cherry. The manipulation leads to improper export of android application components. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-8210 is a medium-severity vulnerability identified in the Yeelink Yeelight Android application, specifically affecting versions 3.5.0 through 3.5.4. The root cause lies in the improper export of Android application components declared within the AndroidManifest.xml file, particularly involving the component com.yeelight.cherry. Improper export means that certain application components (such as activities, services, or broadcast receivers) are made accessible to other applications or processes without adequate access control. This can allow a local attacker—someone with physical or logical access to the device—to interact with these components in unintended ways. The vulnerability requires local access and does not need user interaction, but it does require the attacker to have at least limited privileges on the device (PR:L). The CVSS 4.0 vector indicates low complexity (AC:L), no authentication required (AT:N), and limited impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor has not responded to the disclosure, and no patches or mitigations have been published yet. Although no known exploits are currently in the wild, the public disclosure of the vulnerability means that exploitation techniques could be developed or shared. Improperly exported components can be abused to escalate privileges, leak sensitive information, or manipulate device behavior, depending on the component's functionality. Given the Yeelight app's role in managing smart lighting devices, exploitation could potentially lead to unauthorized control or information leakage related to smart home environments.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the prevalence of the Yeelight app within their user base or operational environments. Enterprises or individuals using Yeelight smart lighting solutions could face risks related to unauthorized local access to device controls or sensitive data managed by the app. While the vulnerability requires local access, in environments where devices are shared or where attackers can gain physical or limited logical access (e.g., through compromised employee devices), this could lead to privacy breaches or unauthorized manipulation of smart home or office lighting systems. This may indirectly affect operational security, especially in sensitive environments where lighting control is part of security or safety protocols. Additionally, the lack of vendor response and absence of patches increases the risk window. Although the vulnerability is medium severity and exploitation requires local access, the potential for lateral movement or escalation within a compromised device environment means organizations should consider this a relevant risk in their threat models, particularly in sectors with high smart device adoption such as technology firms, smart building management, and residential complexes.
Mitigation Recommendations
1. Limit physical and local access to devices running the Yeelight app, enforcing strict device usage policies and endpoint security controls. 2. Monitor devices for unusual inter-app communication or behavior that could indicate exploitation attempts targeting exported components. 3. Until a patch is available, consider uninstalling or disabling the Yeelight app on devices that do not require it, especially in sensitive environments. 4. Employ mobile device management (MDM) solutions to control app permissions and restrict installation of potentially vulnerable app versions. 5. Educate users about the risks of installing apps from untrusted sources and the importance of device security hygiene. 6. Network segmentation and limiting Bluetooth or local network access can reduce the risk of local attackers gaining foothold. 7. Regularly check for vendor updates or community patches addressing this vulnerability and apply them promptly once available. 8. Conduct security assessments on smart home or IoT devices integrated into organizational environments to identify similar risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-25T18:55:55.045Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68853eeead5a09ad0066f439
Added to database: 7/26/2025, 8:47:42 PM
Last enriched: 8/3/2025, 1:04:56 AM
Last updated: 9/7/2025, 12:09:41 PM
Views: 32
Related Threats
CVE-2025-9943: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Shibboleth Service Provider
CriticalCVE-2025-41714: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Welotec SmartEMS Web Application
HighCVE-2025-9979: CWE-862 Missing Authorization in yonifre Maspik – Ultimate Spam Protection
MediumCVE-2025-9888: CWE-352 Cross-Site Request Forgery (CSRF) in yonifre Maspik – Ultimate Spam Protection
MediumCVE-2025-9857: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in heateor Heateor Login – Social Login Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.