CVE-2025-30200
LOWCVSS Vector
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Lifecycle Timeline
2Description
ECOVACS robot vacuums and base stations communicate via an insecure Wi-Fi network with a deterministic AES encryption key, which can be easily derived.
Analysis
ECOVACS robot vacuums and base stations communicate via an insecure Wi-Fi network with a deterministic AES encryption key, which can be easily derived. Rated low severity (CVSS 2.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Technical Context
This vulnerability is classified under CWE-321. ECOVACS robot vacuums and base stations communicate via an insecure Wi-Fi network with a deterministic AES encryption key, which can be easily derived. Affected products include: Ecovacs Deebot X1S Pro Firmware, Ecovacs Deebot X1 Pro Omni Firmware, Ecovacs Deebot X1 Omni Firmware, Ecovacs Deebot X1 Turbo Firmware, Ecovacs Deebot T10 Firmware.
Affected Products
Ecovacs Deebot X1S Pro Firmware, Ecovacs Deebot X1 Pro Omni Firmware, Ecovacs Deebot X1 Omni Firmware, Ecovacs Deebot X1 Turbo Firmware, Ecovacs Deebot T10 Firmware.
Remediation
No vendor patch is available at time of analysis. Monitor vendor advisories for updates. Apply vendor patches when available. Implement network segmentation and monitoring as interim mitigations.
Share
External POC / Exploit Code
Leaving vuln.today