Unauthenticated users on an adjacent network with the Sight Bulb Pro can run shell commands as root through a vulnerable proprietary TCP protocol available on Port 16668. This vulnerability allows an attacker to run arbitrary commands on the Sight Bulb Pro by passing a well formed JSON string.
https://www.cisa.gov/news-events/ics-advisories/icsa-25-177-02
Published: 2025-06-27
Updated: 2025-06-27
Base Score: 6.2
Vector: CVSS2#AV:A/AC:L/Au:M/C:P/I:C/A:P
Severity: Medium
Base Score: 5.4
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:L
Severity: Medium
Base Score: 5.2
Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:P/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
Severity: Medium
EPSS: 0.00034