Vulnerability identifier: #VU15694
Vulnerability risk: Medium
CVSSv3.1: 7.8 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-592
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Yi Home Camera
Hardware solutions /
Firmware
Vendor: YI Technology
Description
The vulnerability allows a remote attacker to bypass authentication on the target system.
The vulnerability exists due to a logic flaw in the firmware update functionality during insufficient sanitization of user-supplied data. A remote attacker can sniff network traffic and send a set of UDP packets to bypass authentication and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
Mitigation
Update to the latest version.
Vulnerable software versions
Yi Home Camera: 27US 1.8.7.0D
External links
http://talosintelligence.com/vulnerability_reports/TALOS-2018-0601
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.