Unauthenticated users on an adjacent network with the Sight Bulb Pro can
run shell commands as root through a vulnerable proprietary TCP
protocol available on Port 16668. This vulnerability allows an attacker
to run arbitrary commands on the Sight Bulb Pro by passing a well formed
JSON string.
TrendMakers did not respond to CISA's request for coordination. Contact TrendMakers https://www.trendmakerscares.com/Customer-Service-Hours directly for more information.
Exploits
Credits
finder
Fahim Balouch reported these vulnerabilities to CISA.