Sengled Dimmer Switch V0.0.9 contains a denial of service (DOS) vulnerability, which allows a remote attacker to send malicious Zigbee messages to a vulnerable device and cause crashes. After receiving the malicious command, the device will keep reporting its status and finally drain its battery after receiving the 'Set_short_poll_interval' command.
References
Link | Resource |
---|---|
https://github.com/iot-sec23/IoT-CVE/blob/main/Sengled%20Dimmer%20Switch%20Vulnerability%20Report.pdf | Exploit Third Party Advisory |
https://us.sengled.com/ | Vendor Advisory |
https://github.com/iot-sec23/IoT-CVE/blob/main/Sengled%20Dimmer%20Switch%20Vulnerability%20Report.pdf | Exploit Third Party Advisory |
https://us.sengled.com/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
03 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-770 |
21 Nov 2024, 07:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/iot-sec23/IoT-CVE/blob/main/Sengled%20Dimmer%20Switch%20Vulnerability%20Report.pdf - Exploit, Third Party Advisory | |
References | () https://us.sengled.com/ - Vendor Advisory |
04 May 2023, 17:36
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:h:sengled:e1e-g7f:-:*:*:*:*:*:*:* cpe:2.3:o:sengled:e1e-g7f_firmware:0.0.9:*:*:*:*:*:*:* |
|
References | (MISC) https://github.com/iot-sec23/IoT-CVE/blob/main/Sengled%20Dimmer%20Switch%20Vulnerability%20Report.pdf - Exploit, Third Party Advisory | |
References | (MISC) https://us.sengled.com/ - Vendor Advisory |
25 Apr 2023, 15:57
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-25 14:15
Updated : 2025-02-03 18:15
NVD link : CVE-2023-29779
Mitre link : CVE-2023-29779
CVE.ORG link : CVE-2023-29779
JSON object : View
Products Affected
sengled
- e1e-g7f
- e1e-g7f_firmware
CWE