Description
A vulnerability was found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The impacted element is an unknown function of the file home/web/ipc of the component CGI Endpoint. Performing a manipulation results in missing authentication. Access to the local network is required for this attack. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-20
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Restrict Access
AI Analysis

Impact

A missing authentication flaw exists in the home/web/ipc CGI endpoint of the Yi Technology YI Home Camera. The flaw allows an attacker who has local network access to manipulate the endpoint without authenticating, thereby bypassing security controls. This leads to unauthorized access and potential compromise of the device, exposing confidential content or allowing further exploitation. The weakness is identified by CWE‑287 (Improper Authentication) and CWE‑306 (Missing Authentication at Restricted Function).

Affected Systems

The vulnerability affects the Yi Technology YI Home Camera running firmware version 2 2.1.1_20171024151200. The specific affected file is home/web/ipc within the CGI component; no other versions are listed.

Risk and Exploitability

The CVSS score is 5.3 indicating moderate severity. EPSS data is unavailable, and the issue is not listed in CISA’s KEV catalog. The attack vector requires access to the local network, but an exploit is publicly available, raising the likelihood of compromise for networks that expose the camera. The overall risk remains moderate to high for environments where the device is not properly isolated or protected.

Generated by OpenCVE AI on March 20, 2026 at 08:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for an official firmware patch or update from Yi Technology.
  • Restrict local network access to the camera using firewall rules or VLAN isolation.
  • Disable or block the home/web/ipc CGI endpoint if the camera firmware allows configuration of accessible endpoints.
  • Monitor network traffic for abnormal activity targeting the camera’s IP address.
  • Apply general IoT security best practices such as regular firmware updates and device segmentation.

Generated by OpenCVE AI on March 20, 2026 at 08:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Yitechnology
Yitechnology yi Home Camera
Vendors & Products Yitechnology
Yitechnology yi Home Camera

Fri, 20 Mar 2026 07:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The impacted element is an unknown function of the file home/web/ipc of the component CGI Endpoint. Performing a manipulation results in missing authentication. Access to the local network is required for this attack. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Yi Technology YI Home Camera CGI Endpoint ipc missing authentication
Weaknesses CWE-287
CWE-306
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:A/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Yitechnology Yi Home Camera
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-20T18:07:48.438Z

Reserved: 2026-03-19T20:46:23.654Z

Link: CVE-2026-4476

cve-icon Vulnrichment

Updated: 2026-03-20T17:38:05.561Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T07:16:14.260

Modified: 2026-03-20T13:37:50.737

Link: CVE-2026-4476

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T16:28:00Z

Weaknesses