Логотип exploitDog
bind:CVE-2025-29660
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-29660

Количество 2

Количество 2

nvd логотип

CVE-2025-29660

10 месяцев назад

A vulnerability exists in the daemon process of the Yi IOT XY-3820 v6.0.24.10, which exposes a TCP service on port 6789. This service lacks proper input validation, allowing attackers to execute arbitrary scripts present on the device by sending specially crafted TCP requests using directory traversal techniques.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-chrr-x92m-658x

10 месяцев назад

A vulnerability exists in the daemon process of the Yi IOT XY-3820 v6.0.24.10, which exposes a TCP service on port 6789. This service lacks proper input validation, allowing attackers to execute arbitrary scripts present on the device by sending specially crafted TCP requests using directory traversal techniques.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-29660

A vulnerability exists in the daemon process of the Yi IOT XY-3820 v6.0.24.10, which exposes a TCP service on port 6789. This service lacks proper input validation, allowing attackers to execute arbitrary scripts present on the device by sending specially crafted TCP requests using directory traversal techniques.

CVSS3: 9.8
0%
Низкий
10 месяцев назад
github логотип
GHSA-chrr-x92m-658x

A vulnerability exists in the daemon process of the Yi IOT XY-3820 v6.0.24.10, which exposes a TCP service on port 6789. This service lacks proper input validation, allowing attackers to execute arbitrary scripts present on the device by sending specially crafted TCP requests using directory traversal techniques.

CVSS3: 9.8
0%
Низкий
10 месяцев назад

Уязвимостей на страницу