CVE-2026-2065
📋 TL;DR
CVE-2026-2065 is an authentication bypass vulnerability in Flycatcher Toys smART Pixelator 2.0's Bluetooth Low Energy interface. Attackers on the local network can exploit this to gain unauthorized access to device functionality. All users of smART Pixelator 2.0 with Bluetooth enabled are affected.
💻 Affected Systems
- Flycatcher Toys smART Pixelator
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the smART Pixelator device allowing unauthorized control, data exfiltration, or device manipulation.
Likely Case
Unauthorized access to device functions, potential data leakage, and disruption of normal operations.
If Mitigated
Limited impact if Bluetooth interface is disabled or network segmentation prevents local access.
🎯 Exploit Status
Proof-of-concept exploit code is publicly available on GitHub, making exploitation straightforward for attackers with local network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Vendor was contacted but did not respond. Consider workarounds or replacement.
🔧 Temporary Workarounds
Disable Bluetooth Interface
allTurn off Bluetooth Low Energy functionality to prevent exploitation
Device-specific - check manufacturer documentation for disabling Bluetooth
Network Segmentation
allIsolate smART Pixelator devices on separate VLAN or network segment
🧯 If You Can't Patch
- Physically disconnect from network when not in use
- Implement strict network access controls to limit which devices can communicate with the Pixelator
🔍 How to Verify
Check if Vulnerable:
Check device version in settings/configuration. If running smART Pixelator 2.0 with Bluetooth enabled, assume vulnerable.
Check Version:
Device-specific - typically through device interface or manufacturer app
Verify Fix Applied:
No official fix available. Verify workarounds by testing Bluetooth connectivity and network access.
📡 Detection & Monitoring
Log Indicators:
- Unusual Bluetooth connection attempts
- Unauthorized access patterns to device functions
Network Indicators:
- Unexpected BLE traffic to Pixelator devices
- Connection attempts from unauthorized MAC addresses
SIEM Query:
source_ip IN (local_network) AND dest_ip = (pixelator_ip) AND protocol = BLE AND auth_failure = true