Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4478: Improper Verification of Cryptographic Signature in Yi Technology YI Home Camera

0
Critical
VulnerabilityCVE-2026-4478cvecve-2026-4478
Published: Fri Mar 20 2026 (03/20/2026, 07:02:12 UTC)
Source: CVE Database V5
Vendor/Project: Yi Technology
Product: YI Home Camera

Description

CVE-2026-4478 is a critical vulnerability in the Yi Technology YI Home Camera 2 version 2. 1. 1_20171024151200, involving improper verification of cryptographic signatures in the HTTP Firmware Update Handler. This flaw allows a remote attacker to potentially bypass signature checks during firmware updates, risking unauthorized firmware installation. Exploitation complexity is high and difficult, with no user interaction or privileges required. Although an exploit is publicly available, no known active exploitation has been reported. The vendor has not responded to disclosure attempts, and no patches are currently available. This vulnerability threatens the confidentiality, integrity, and availability of affected devices, potentially enabling device takeover or persistent compromise. Organizations using these cameras should consider immediate mitigations to reduce exposure. Countries with significant deployment of Yi Technology products and high IoT adoption are at greater risk.

AI-Powered Analysis

AILast updated: 03/20/2026, 07:38:38 UTC

Technical Analysis

CVE-2026-4478 identifies a critical security vulnerability in the Yi Technology YI Home Camera 2 firmware version 2.1.1_20171024151200. The flaw resides in an unspecified function within the HTTP Firmware Update Handler component, specifically in the file home/web/ipc. The vulnerability stems from improper verification of cryptographic signatures during the firmware update process. This cryptographic signature verification is intended to ensure that only authentic and authorized firmware updates are installed on the device. However, due to this flaw, an attacker can remotely exploit the vulnerability by delivering a malicious firmware update that bypasses signature validation. The attack vector is network-based, requiring no authentication or user interaction, but the complexity is rated high, indicating that exploitation requires advanced skills or specific conditions. Despite the difficulty, a public exploit exists, increasing the risk of exploitation. The vulnerability impacts the confidentiality, integrity, and availability of the device, as a successful attack could allow an adversary to install arbitrary firmware, potentially leading to device takeover, data interception, or denial of service. The vendor was notified early but has not issued any response or patch, leaving devices exposed. No known active exploitation in the wild has been reported yet, but the availability of an exploit elevates the threat level. The CVSS v4.0 score of 9.2 (critical) reflects the severe impact and remote exploitability without privileges or user interaction.

Potential Impact

The vulnerability poses a critical risk to organizations and individuals using the affected Yi Home Camera 2 devices. Successful exploitation can lead to unauthorized firmware installation, resulting in full device compromise. This can enable attackers to intercept video streams, manipulate device behavior, exfiltrate sensitive data, or use the compromised device as a foothold within a network. For organizations, this threatens privacy, security monitoring capabilities, and network integrity. The lack of vendor response and patches increases the window of exposure, potentially allowing attackers to develop and deploy exploits widely. Given the device's role in home and small business security, the impact extends to physical security risks and loss of trust in IoT device security. The high complexity of exploitation may limit widespread attacks but does not eliminate targeted attacks against high-value targets. The absence of known active exploitation suggests limited current impact but the public exploit availability necessitates urgent mitigation.

Mitigation Recommendations

Since no official patch or update is available from the vendor, organizations should implement compensating controls to mitigate risk. These include isolating the affected cameras on segmented networks with strict firewall rules to limit inbound and outbound traffic. Disable remote firmware update capabilities if possible or restrict them to trusted networks. Monitor network traffic for unusual firmware update attempts or communications with untrusted hosts. Employ network intrusion detection systems (NIDS) with signatures for known exploits targeting this vulnerability. Consider replacing affected devices with models from vendors with active security support. Regularly audit IoT devices for firmware version and integrity. Educate users about the risks of using unsupported or unpatched IoT devices. Maintain strict access controls and network segmentation to minimize lateral movement if compromise occurs. Finally, maintain vigilance for vendor updates or community patches addressing this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-19T20:46:31.734Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcf624e32a4fbe5f3a7116

Added to database: 3/20/2026, 7:24:20 AM

Last enriched: 3/20/2026, 7:38:38 AM

Last updated: 3/20/2026, 8:46:28 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses