The YoSmart YoLink Smart Hub device 0382 exposes a UART debug interface. An attacker with direct physical access can leverage this interface to read a boot log, which includes network access credentials.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-32585 | The YoSmart YoLink Smart Hub device 0382 exposes a UART debug interface. An attacker with direct physical access can leverage this interface to read a boot log, which includes network access credentials. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 06 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 06 Oct 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The YoSmart YoLink Smart Hub device 0382 exposes a UART debug interface. An attacker with direct physical access can leverage this interface to read a boot log, which includes network access credentials. | |
Weaknesses | CWE-497 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-06T20:10:34.726Z
Reserved: 2025-09-16T00:00:00.000Z
Link: CVE-2025-59447

Updated: 2025-10-06T20:10:22.466Z

Status : Received
Published: 2025-10-06T20:15:36.030
Modified: 2025-10-06T20:15:36.030
Link: CVE-2025-59447

No data.

No data.