Description
Yadea T5 Electric Bicycles (models manufactured in/after 2024) have a weak authentication mechanism in their keyless entry system. The system utilizes the EV1527 fixed-code RF protocol without implementing rolling codes or cryptographic challenge-response mechanisms. This is vulnerable to signal forgery after a local attacker intercepts any legitimate key fob transmission, allowing for complete unauthorized vehicle operation via a replay attack.
Published: 2026-04-23
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized vehicle operation via replay attack
Action: Apply Vendor Fix
AI Analysis

Impact

The Yadea T5 Electric Bicycle models manufactured in or after 2024 expose a weak authentication mechanism in their keyless entry system. The system relies on the EV1527 fixed-code RF protocol and lacks both rolling codes and cryptographic challenge-response. This design flaw allows a local attacker who intercepts a legitimate key fob transmission to forge the signal and replay it, resulting in complete unauthorized vehicle operation. The compromised security property is the integrity of the access control system, as highlighted by CWE‑1390.

Affected Systems

Yadea T5 Electric Bicycles (models manufactured in or after 2024).

Risk and Exploitability

The vulnerability carries a CVSS score of 7.3, indicating a high severity. The EPSS score of less than 1% suggests that the practical likelihood of exploitation is currently very low, and the flaw is not listed in the CISA KEV catalog. However, the attack vector requires a local presence to intercept the key fob signal, after which the attacker can replay the captured RF transmission to gain unauthorized control of the bicycle. If an adversary can be near the vehicle, they could potentially operate it without authorization, posing a threat to owner safety and property.

Generated by OpenCVE AI on April 28, 2026 at 15:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the bike’s firmware version against manufacturer release notes and apply any available patch that introduces rolling codes or cryptographic challenge‑response authentication.
  • If no firmware update is available, disable the keyless entry function by using a physical lock or covering the key fob receiver to prevent RF reception.
  • Limit exposure to RF signals by storing the bicycle in a Faraday‑shielded environment or a covered area to reduce the chance of signal interception.
  • Contact Yadea support for guidance on interim mitigations and to stay informed about forthcoming firmware fixes.

Generated by OpenCVE AI on April 28, 2026 at 15:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Title Vulnerable Keyless Entry RF Protocol Enables Replay Attack on Yadea T5 Electric Bicycles

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Yadea
Yadea t5 Electric Bicycles
Vendors & Products Yadea
Yadea t5 Electric Bicycles

Thu, 23 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1390
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Yadea T5 Electric Bicycles (models manufactured in/after 2024) have a weak authentication mechanism in their keyless entry system. The system utilizes the EV1527 fixed-code RF protocol without implementing rolling codes or cryptographic challenge-response mechanisms. This is vulnerable to signal forgery after a local attacker intercepts any legitimate key fob transmission, allowing for complete unauthorized vehicle operation via a replay attack.
References

Subscriptions

Yadea T5 Electric Bicycles
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-23T15:10:43.811Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-70994

cve-icon Vulnrichment

Updated: 2026-04-23T15:01:03.820Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-23T15:36:26.687

Modified: 2026-04-24T14:50:56.203

Link: CVE-2025-70994

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T15:15:34Z

Weaknesses