Unauthenticated users on an adjacent network with the Sight Bulb Pro can
 run shell commands as root through a vulnerable proprietary TCP 
protocol available on Port 16668. This vulnerability allows an attacker 
to run arbitrary commands on the Sight Bulb Pro by passing a well formed
 JSON string.
                
            Metrics
Affected Vendors & Products
References
        History
                    Fri, 27 Jun 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Fri, 27 Jun 2025 17:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Unauthenticated users on an adjacent network with the Sight Bulb Pro can run shell commands as root through a vulnerable proprietary TCP protocol available on Port 16668. This vulnerability allows an attacker to run arbitrary commands on the Sight Bulb Pro by passing a well formed JSON string. | |
| Title | TrendMakers Sight Bulb Pro Command Injection | |
| Weaknesses | CWE-77 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
 
  | 
Status: PUBLISHED
Assigner: icscert
Published: 2025-06-27T17:09:33.801Z
Updated: 2025-06-27T18:33:29.421Z
Reserved: 2025-06-23T13:38:00.806Z
Link: CVE-2025-6522
Updated: 2025-06-27T18:12:11.606Z
Status : Awaiting Analysis
Published: 2025-06-27T18:15:52.580
Modified: 2025-06-30T18:38:23.493
Link: CVE-2025-6522
No data.