An issue was discovered on XIAOMI AI speaker MDZ-25-DT 1.34.36, and 1.40.14. Attackers can get root shell by accessing the UART interface and then they can read Wi-Fi SSID or password, read the dialogue text files between users and XIAOMI AI speaker, use Text-To-Speech tools pretend XIAOMI speakers' voice achieve social engineering attacks, eavesdrop on users and record what XIAOMI AI speaker hears, delete the entire XIAOMI AI speaker system, modify system files, stop voice assistant service, start the XIAOMI AI speaker’s SSH service as a backdoor
Threat-Mapped Scoring
Score: 3.0
Priority: P2 - Serious (High)
S1 – Steal Customer Account Information
EPSS
Score: 0.0018Percentile:
0.40122
CVSS Scoring
CVSS v3.1 Score: 6.8
Severity: MEDIUM
Mapped CWE(s)
CWE-287
: Improper Authentication
All CAPEC(s)
CAPEC-114 : Authentication Abuse
CAPEC-115 : Authentication Bypass
CAPEC-151 : Identity Spoofing
CAPEC-194 : Fake the Source of Data
CAPEC-22 : Exploiting Trust in Client
CAPEC-57 : Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
CAPEC-593 : Session Hijacking
CAPEC-633 : Token Impersonation
CAPEC-650 : Upload a Web Shell to a Web Server
CAPEC-94 : Adversary in the Middle (AiTM)
CAPEC(s) with Mapped TTPs
CAPEC-114 : Authentication Abuse
Mapped TTPs:
T1548
: Abuse Elevation Control Mechanism
CAPEC-115 : Authentication Bypass
Mapped TTPs:
T1548
: Abuse Elevation Control Mechanism
CAPEC-57 : Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
Mapped TTPs:
CAPEC-593 : Session Hijacking
Mapped TTPs:
T1185
: Browser Session Hijacking
T1550.001
: Application Access Token
T1563
: Remote Service Session Hijacking
CAPEC-633 : Token Impersonation
Mapped TTPs:
T1134
: Access Token Manipulation
CAPEC-650 : Upload a Web Shell to a Web Server
Mapped TTPs:
CAPEC-94 : Adversary in the Middle (AiTM)
Mapped TTPs:
T1557
: Adversary-in-the-Middle
Mapped ATT&CK TTPs
T1548
: Abuse Elevation Control Mechanism
Kill Chain: privilege-escalation
T1548
: Abuse Elevation Control Mechanism
Kill Chain: privilege-escalation
T1040
: Network Sniffing
Kill Chain: credential-access
T1185
: Browser Session Hijacking
Kill Chain: collection
T1550.001
: Application Access Token
Kill Chain: defense-evasion
T1563
: Remote Service Session Hijacking
Kill Chain: lateral-movement
T1134
: Access Token Manipulation
Kill Chain: defense-evasion
T1505.003
: Web Shell
Kill Chain: persistence
T1557
: Adversary-in-the-Middle
Kill Chain: credential-access
Malware
APTs Threat Group Associations
Campaigns
Operation Wocao
APT41 DUST
ArcaneDoor
SolarWinds Compromise
Operation CuckooBees
2015 Ukraine Electric Power Attack
Versa Director Zero Day Exploitation
Leviathan Australian Intrusions
C0032
HomeLand Justice
C0017
Cutting Edge
2022 Ukraine Electric Power Attack
FrostyGoop Incident
Affected Products
cpe:2.3:o:mi:mdz-25-dt_firmware:1.34.36:*:*:*:*:*:*:*
cpe:2.3:o:mi:mdz-25-dt_firmware:1.40.14:*:*:*:*:*:*:*
← Back to Home
BrownCoat Threat Intelligence Platform | 2025 Steve Gray — You Can’t Take the Sky from Me