Description
A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-20
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Device Access
Action: Immediate Patch
AI Analysis

Impact

A vulnerability in Yi Technology YI Home Camera 2 allows an attacker with local network access to exploit an unknown function within the home/web/ipc file, resulting in the use of hard‑coded credentials. Because the credentials are embedded in the firmware, an attacker can log in without needing to guess or brute force passwords, giving them full control over the camera’s functions and potentially enabling remote viewing, recording, and configuration changes. This constitutes a loss of confidentiality, integrity, and availability of the device’s security posture.

Affected Systems

Only the Yi Technology YI Home Camera 2 running firmware version 2.1.1_20171024151200 is known to be affected. No other versions or models are listed in the CVE data.

Risk and Exploitability

The vulnerability is rated high with a CVSS score of 8.7, indicating significant impact and exploitability. The EPSS score is not available, and the issue is not listed in the CISA KEV catalog. The likely attack vector is local network access; an attacker must be connected to the same LAN segment as the camera to exploit the hard‑coded credentials. Since the exploit has been publicly disclosed and the vendor has not provided a response, the risk remains significant until a patch or mitigation is applied.

Generated by OpenCVE AI on March 20, 2026 at 07:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware patch from Yi Technology that removes the hard‑coded credentials
  • If no patch is available, isolate the camera on a separate network segment or VLAN and restrict access from other devices
  • Disable or remove the IPC functionality if not needed
  • Employ network firewall rules to block unauthorized access to the camera’s ports
  • Regularly monitor the device for any unauthorized login attempts

Generated by OpenCVE AI on March 20, 2026 at 07:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Yitechnology
Yitechnology yi Home Camera
Vendors & Products Yitechnology
Yitechnology yi Home Camera

Fri, 20 Mar 2026 06:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Yi Technology YI Home Camera ipc hard-coded credentials
Weaknesses CWE-259
CWE-798
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:A/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Yitechnology Yi Home Camera
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-20T13:51:39.023Z

Reserved: 2026-03-19T20:46:18.780Z

Link: CVE-2026-4475

cve-icon Vulnrichment

Updated: 2026-03-20T13:51:25.391Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T07:16:14.043

Modified: 2026-03-20T14:16:16.523

Link: CVE-2026-4475

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T10:37:00Z

Weaknesses