Description
A vulnerability was determined in Tuya App and SDK 24.07.11 on Android. Affected by this vulnerability is an unknown functionality of the component JSON Data Point Handler. This manipulation of the argument cruise_time causes denial of service. Remote exploitation of the attack is possible. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been publicly disclosed and may be utilized. There is ongoing doubt regarding the real existence of this vulnerability. The vendor disagrees with the conclusion of the finding: "The described vulnerability fails to prove its feasibility or exploitability by attackers. The issue essentially does not constitute a security vulnerability, aligning more closely with abnormal product functionality." These considerations are properly reflected within the CVSS vector.
Published: 2026-03-03
Score: 2.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Assess Impact
AI Analysis

Impact

A flaw was identified in the JSON Data Point Handler of Tuya App and SDK version 24.07.11 on Android. The manipulation of the argument cruise_time leads to a crash, which results in a denial of service for the affected application. The design of the component fails to validate the existence of the resource before use, a weakness categorized under CWE‑404.

Affected Systems

The vulnerability touches Tuya’s Android App and its SDK inclusively. All installations running version 24.07.11 or earlier of the app or SDK are potentially affected; later releases have not been confirmed to contain the flaw.

Risk and Exploitability

The CVSS score is 2.3, indicating low severity, and the EPSS score is below 1%, showing a very low chance of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Remote exploitation is theoretically possible by sending crafted data to the cruise_time parameter, though the vendor disputes the feasibility, labeling it abnormal product behavior rather than a genuine security flaw. The exploitation complexity is high and likely difficult, making it an unlikely target for attackers at present.

Generated by OpenCVE AI on April 16, 2026 at 14:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify that the installed Tuya App and SDK are updated beyond version 24.07.11 if a newer release is available; apply the update as soon as it includes a fix for the JSON Data Point Handler.
  • If no patch is released yet, restrict the exposure of the JSON Data Point Handler by limiting network traffic to the device or disabling remote management features that can inject the cruise_time argument.
  • Monitor application logs for unexpected crashes and report any incidents to Tuya. Consider flushing stale watchdog timers or restarting the application automatically to mitigate the denial of service effect until a formal patch is distributed.

Generated by OpenCVE AI on April 16, 2026 at 14:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Tuya
Tuya app
Tuya sdk
Vendors & Products Tuya
Tuya app
Tuya sdk

Tue, 03 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tuya App and SDK 24.07.11 on Android. Affected by this vulnerability is an unknown functionality of the component JSON Data Point Handler. This manipulation of the argument cruise_time causes denial of service. Remote exploitation of the attack is possible. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been publicly disclosed and may be utilized. There is ongoing doubt regarding the real existence of this vulnerability. The vendor disagrees with the conclusion of the finding: "The described vulnerability fails to prove its feasibility or exploitability by attackers. The issue essentially does not constitute a security vulnerability, aligning more closely with abnormal product functionality." These considerations are properly reflected within the CVSS vector.
Title Tuya App/SDK JSON Data Point denial of service
Weaknesses CWE-404
References
Metrics cvssV2_0

{'score': 2.6, 'vector': 'AV:N/AC:H/Au:N/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.1, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-03T15:38:44.283Z

Reserved: 2026-03-03T08:31:04.298Z

Link: CVE-2026-3465

cve-icon Vulnrichment

Updated: 2026-03-03T15:38:32.832Z

cve-icon NVD

Status : Deferred

Published: 2026-03-03T15:16:21.733

Modified: 2026-04-22T21:26:58.303

Link: CVE-2026-3465

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T14:15:28Z

Weaknesses