Impact
A flaw was identified in the JSON Data Point Handler of Tuya App and SDK version 24.07.11 on Android. The manipulation of the argument cruise_time leads to a crash, which results in a denial of service for the affected application. The design of the component fails to validate the existence of the resource before use, a weakness categorized under CWE‑404.
Affected Systems
The vulnerability touches Tuya’s Android App and its SDK inclusively. All installations running version 24.07.11 or earlier of the app or SDK are potentially affected; later releases have not been confirmed to contain the flaw.
Risk and Exploitability
The CVSS score is 2.3, indicating low severity, and the EPSS score is below 1%, showing a very low chance of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Remote exploitation is theoretically possible by sending crafted data to the cruise_time parameter, though the vendor disputes the feasibility, labeling it abnormal product behavior rather than a genuine security flaw. The exploitation complexity is high and likely difficult, making it an unlikely target for attackers at present.
OpenCVE Enrichment