Unauthenticated users on an adjacent network with the Sight Bulb Pro can
run shell commands as root through a vulnerable proprietary TCP
protocol available on Port 16668. This vulnerability allows an attacker
to run arbitrary commands on the Sight Bulb Pro by passing a well formed
JSON string.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Jun 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Jun 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unauthenticated users on an adjacent network with the Sight Bulb Pro can run shell commands as root through a vulnerable proprietary TCP protocol available on Port 16668. This vulnerability allows an attacker to run arbitrary commands on the Sight Bulb Pro by passing a well formed JSON string. | |
| Title | TrendMakers Sight Bulb Pro Command Injection | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published: 2025-06-27T17:09:33.801Z
Updated: 2025-06-27T18:33:29.421Z
Reserved: 2025-06-23T13:38:00.806Z
Link: CVE-2025-6522
Updated: 2025-06-27T18:12:11.606Z
Status : Awaiting Analysis
Published: 2025-06-27T18:15:52.580
Modified: 2025-06-30T18:38:23.493
Link: CVE-2025-6522
No data.