Impact
The vulnerability resides in the UART debug interface of the AZIOT 1 Node Smart Switch (16amp) running software version 1.1.9. Improper access control allows anyone with physical access to connect directly to the UART port and capture data from the serial console, exposing sensitive information. This weakness corresponds to a classic data‑exposure flaw (CWE‑200).
Affected Systems
AZIOT 1 Node Smart Switch (16amp) WiFi/Bluetooth Enabled, firmware 1.1.9.
Risk and Exploitability
The CVSS score of 4.6 indicates a moderate security risk, but the EPSS score of less than 1% and absence from the KEV catalog suggest low exploitation probability. The flaw is exploitable only when an attacker can physically reach the UART port, meaning the threat surface is limited to environments where physical access is possible. No remote exploitation path is described, and no additional authentication bypass is required beyond the physical connection to the debug interface.
OpenCVE Enrichment