The Sinilink XY-WFT1 WiFi Remote Thermostat, running firmware 1.3.6, allows an attacker to bypass the intended requirement to communicate using MQTT. It is possible to replay Sinilink aka SINILINK521 protocol (udp/1024) commands interfacing directly with the target device. This, in turn, allows for an attack to control the onboard relay without requiring authentication via the mobile application. This might result in an unacceptable temperature within the target device's physical environment.
References
Link | Resource |
---|---|
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-43704-capture-replay-vulnerability-in-sinilink-xy-wft1-thermostat/ | Exploit Third Party Advisory |
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-43704-capture-replay-vulnerability-in-sinilink-xy-wft1-thermostat/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:27
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-20 17:15
Updated : 2024-11-21 07:27
NVD link : CVE-2022-43704
Mitre link : CVE-2022-43704
CVE.ORG link : CVE-2022-43704
JSON object : View
Products Affected
sinilink
- xy-wft1_firmware
- xy-wft1
CWE
CWE-294
Authentication Bypass by Capture-replay