{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4475","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-19T20:46:18.780Z","datePublished":"2026-03-20T06:02:14.715Z","dateUpdated":"2026-03-20T13:51:39.023Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-20T06:02:14.715Z"},"title":"Yi Technology YI Home Camera ipc hard-coded credentials","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-798","lang":"en","description":"Hard-coded Credentials"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-259","lang":"en","description":"Use of Hard-coded Password"}]}],"affected":[{"vendor":"Yi Technology","product":"YI Home Camera","versions":[{"version":"2 2.1.1_20171024151200","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":8.3,"vectorString":"AV:A/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-19T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-19T21:51:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"0rbitingZer0 (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB","type":"coordinator"}],"references":[{"url":"https://vuldb.com/?id.351765","name":"VDB-351765 | Yi Technology YI Home Camera ipc hard-coded credentials","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.351765","name":"VDB-351765 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.772996","name":"Submit #772996 | yitechnology YI Home Camera 2 2.1.1_20171024151200 Hard-coded Credentials","tags":["third-party-advisory"]}]},"adp":[{"references":[{"url":"https://vuldb.com/?submit.772996","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-20T13:51:35.894323Z","id":"CVE-2026-4475","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-20T13:51:39.023Z"}}]}}