CVE-2025-6522

Unauthenticated users on an adjacent network with the Sight Bulb Pro can run shell commands as root through a vulnerable proprietary TCP protocol available on Port 16668. This vulnerability allows an attacker to run arbitrary commands on the Sight Bulb Pro by passing a well formed JSON string.
Configurations

No configuration.

History

30 Jun 2025, 18:38

Type Values Removed Values Added
Summary
  • (es) Los usuarios no autenticados en una red adyacente con Sight Bulb Pro pueden ejecutar comandos de shell como root a través de un protocolo TCP propietario vulnerable disponible en el puerto 16668. Esta vulnerabilidad permite a un atacante ejecutar comandos arbitrarios en Sight Bulb Pro pasando una cadena JSON bien formada.

27 Jun 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-27 18:15

Updated : 2025-06-30 18:38


NVD link : CVE-2025-6522

Mitre link : CVE-2025-6522

CVE.ORG link : CVE-2025-6522


JSON object : View

Products Affected

No product.

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')