Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9rpc-xc7c-jhmw

Опубликовано: 20 янв. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 5.9

Описание

The Sinilink XY-WFT1 WiFi Remote Thermostat, running firmware 1.3.6, allows an attacker to bypass the intended requirement to communicate using MQTT. It is possible to replay Sinilink aka SINILINK521 protocol (udp/1024) commands interfacing directly with the target device. This, in turn, allows for an attack to control the onboard relay without requiring authentication via the mobile application. This might result in an unacceptable temperature within the target device's physical environment.

The Sinilink XY-WFT1 WiFi Remote Thermostat, running firmware 1.3.6, allows an attacker to bypass the intended requirement to communicate using MQTT. It is possible to replay Sinilink aka SINILINK521 protocol (udp/1024) commands interfacing directly with the target device. This, in turn, allows for an attack to control the onboard relay without requiring authentication via the mobile application. This might result in an unacceptable temperature within the target device's physical environment.

EPSS

Процентиль: 82%
0.01629
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-294

Связанные уязвимости

CVSS3: 5.9
nvd
около 3 лет назад

The Sinilink XY-WFT1 WiFi Remote Thermostat, running firmware 1.3.6, allows an attacker to bypass the intended requirement to communicate using MQTT. It is possible to replay Sinilink aka SINILINK521 protocol (udp/1024) commands interfacing directly with the target device. This, in turn, allows for an attack to control the onboard relay without requiring authentication via the mobile application. This might result in an unacceptable temperature within the target device's physical environment.

EPSS

Процентиль: 82%
0.01629
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-294