Yi IOT XY-3820, Directory Traversal to RCE, CVE-2025-29660 (Critical)

Listen to this Post

How the CVE Works

The vulnerability in Yi IOT XY-3820 v6.0.24.10 stems from improper input validation in its daemon process, which listens on TCP port 6789. Attackers can exploit this flaw by sending crafted TCP requests containing directory traversal sequences (e.g., ../../). This allows unauthorized access to arbitrary scripts stored on the device, leading to remote code execution (RCE). The daemon fails to sanitize user-supplied paths, enabling attackers to traverse directories and execute malicious payloads with the same privileges as the service.

DailyCVE Form

Platform: Yi IOT XY-3820
Version: v6.0.24.10
Vulnerability: Directory Traversal → RCE
Severity: Critical
Date: 06/23/2025

Prediction: Patch by 08/2025

What Undercode Say

Analytics

nmap -p 6789 <target_IP>
curl -X POST "http://<target_IP>:6789/../../malicious_script.sh"

How Exploit

1. Craft TCP request with traversal payload.

2. Trigger script execution via port 6789.

3. Gain shell access.

Protection from this CVE

  • Disable port 6789 if unused.
  • Apply vendor patches.
  • Implement input sanitization.

Impact

  • Full device compromise.
  • Unauthorized data access.
  • Botnet enlistment.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top