CVE-2025-59447
BaseFortify
Publication date: 2025-10-06
Last updated on: 2025-10-08
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-497 | The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The YoSmart YoLink Smart Hub device 0382 has a UART debug interface that is exposed. An attacker who has direct physical access to the device can use this interface to read the boot log, which contains network access credentials.
How can this vulnerability impact me? :
If an attacker gains physical access to the device, they can extract network access credentials from the boot log via the UART debug interface. This could allow unauthorized access to the network, potentially compromising network security.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, restrict physical access to the YoSmart YoLink Smart Hub device to prevent attackers from accessing the UART debug interface. Consider disabling or securing the UART interface if possible, and monitor for any unauthorized physical access.