CVE-2025-64983

8.0 HIGH

📋 TL;DR

Smart Video Doorbell devices with firmware versions before 2.01.078 contain active debug code that enables Telnet access. Attackers can connect via Telnet to gain unauthorized access to the device. This affects all users of vulnerable SwitchBot Video Doorbell devices.

💻 Affected Systems

Products:
  • SwitchBot Video Doorbell
Versions: All versions prior to 2.01.078
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with default configurations are vulnerable. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to disable security features, access video feeds, manipulate device behavior, or pivot to internal networks.

🟠

Likely Case

Unauthorized access to device allowing surveillance, disabling of doorbell functions, or installation of persistent malware.

🟢

If Mitigated

Limited impact if device is isolated from internet and internal networks, though local network access could still be exploited.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only Telnet client and network access to device. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.01.078

Vendor Advisory: https://jvn.jp/en/jp/JVN67185535

Restart Required: Yes

Instructions:

1. Open SwitchBot app. 2. Navigate to device settings. 3. Check for firmware updates. 4. Install firmware version 2.01.078 or later. 5. Device will restart automatically.

🔧 Temporary Workarounds

Block Telnet Port

linux

Block Telnet port 23 at network perimeter to prevent external exploitation

iptables -A INPUT -p tcp --dport 23 -j DROP

Network Segmentation

all

Isolate doorbell devices on separate VLAN with restricted access

🧯 If You Can't Patch

  • Disconnect device from internet and place on isolated network segment
  • Implement strict firewall rules blocking all inbound connections to device

🔍 How to Verify

Check if Vulnerable:

Attempt Telnet connection to device IP on port 23. If connection succeeds, device is vulnerable.

Check Version:

Check firmware version in SwitchBot app device settings

Verify Fix Applied:

Attempt Telnet connection after update. Connection should be refused or timeout.

📡 Detection & Monitoring

Log Indicators:

  • Telnet connection attempts to device IP
  • Unexpected device reboots or configuration changes

Network Indicators:

  • Telnet traffic (port 23) to doorbell devices
  • Unusual outbound connections from doorbell

SIEM Query:

source_ip="doorbell_ip" AND dest_port=23 AND protocol="TCP"

🔗 References

📤 Share & Export