Unauthenticated users on an adjacent network with the Sight Bulb Pro can
run shell commands as root through a vulnerable proprietary TCP
protocol available on Port 16668. This vulnerability allows an attacker
to run arbitrary commands on the Sight Bulb Pro by passing a well formed
JSON string.
References
Configurations
No configuration.
History
30 Jun 2025, 18:38
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 Jun 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-27 18:15
Updated : 2025-06-30 18:38
NVD link : CVE-2025-6522
Mitre link : CVE-2025-6522
CVE.ORG link : CVE-2025-6522
JSON object : View
Products Affected
No product.
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')