First published: Wed Apr 08 2020(Updated: )
An issue was discovered on XIAOMI XIAOAI speaker Pro LX06 1.52.4. Attackers can get root shell by accessing the UART interface and then they can (i) read Wi-Fi SSID or password, (ii) read the dialogue text files between users and XIAOMI XIAOAI speaker Pro LX06, (iii) use Text-To-Speech tools pretend XIAOMI speakers' voice achieve social engineering attacks, (iv) eavesdrop on users and record what XIAOMI XIAOAI speaker Pro LX06 hears, (v) modify system files, (vi) use commands to send any IR code through IR emitter on XIAOMI XIAOAI Speaker Pro LX06, (vii) stop voice assistant service, (viii) enable the XIAOMI XIAOAI Speaker Pro’ SSH or TELNET service as a backdoor, (IX) tamper with the router configuration of the router in the local area networks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mi Xiaomi Xiaoai Speaker Pro Lx06 Firmware | =1.52.4 | |
Mi Xiaomi Xiaoai Speaker Pro Lx06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10263 is a vulnerability found on XIAOMI XIAOAI speaker Pro LX06 firmware version 1.52.4 that allows attackers to get root shell access by accessing the UART interface.
Attackers can use CVE-2020-10263 to (i) read Wi-Fi SSID or password, (ii) read the dialogue text files between users and XIAOMI XIAOAI speaker Pro LX06, and (iii) use Text-To-Speech tools.
CVE-2020-10263 has a severity rating of 6.8, which is considered high.
To fix CVE-2020-10263, update the XIAOMI XIAOAI speaker Pro LX06 firmware to a version that is not vulnerable.
More information about CVE-2020-10263 can be found on the official Xiaomi website, the GitHub page with the proof-of-concept, and a YouTube video demonstrating the vulnerability.