TrendMakers Sight Bulb Pro
The TrendMakers Sight Bulb Pro Firmware ZJ_CG32-2201 (versions 8.57.83 and earlier) contains two vulnerabilities: weak encryption (CWE-327) and command injection (CWE-77). During initial device setup, when the Sight Bulb Pro operates as a wireless access point, the encryption key is transmitted in cleartext over the network. An attacker with local network access during this setup phase could capture the key and execute arbitrary shell commands with root privileges on the device. TrendMakers has not responded to CISA coordination requests and has no planned fixes for this product line.
- Physical or network proximity to the local network segment during device initial setup
- Device must be in access point/setup mode
- Ability to perform network packet capture or monitoring
Patching may require device reboot — plan for process interruption
/api/v1/advisories/42466a92-8af3-4370-a73a-d4cee97d9925Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.