ECOVACS robot lawnmowers and vacuums are vulnerable to command injection via SetNetPin() over an unauthenticated BLE connection.
References
| Link | Resource |
|---|---|
| https://dontvacuum.me/talks/DEFCON32/DEFCON32_reveng_hacking_ecovacs_robots.pdf | Exploit Third Party Advisory |
| https://www.ecovacs.com/global/userhelp/dsa20241119 | Vendor Advisory |
| https://www.ecovacs.com/global/userhelp/dsa20241130001 | Vendor Advisory |
| https://youtu.be/_wUsM0Mlenc?t=2041 | Exploit |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
| AND |
|
Configuration 8 (hide)
| AND |
|
Configuration 9 (hide)
| AND |
|
Configuration 10 (hide)
| AND |
|
Configuration 11 (hide)
| AND |
|
Configuration 12 (hide)
| AND |
|
History
23 Sep 2025, 17:35
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:ecovacs:deebot_t30s:-:*:*:*:*:*:*:* cpe:2.3:h:ecovacs:goat_g1-2000:-:*:*:*:*:*:*:* cpe:2.3:h:ecovacs:deebot_x2s:-:*:*:*:*:*:*:* cpe:2.3:o:ecovacs:deebot_x2_combo_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:ecovacs:deebot_x5_pro_ultra:-:*:*:*:*:*:*:* cpe:2.3:o:ecovacs:gx-600_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:ecovacs:deebot_x5_pro_plus_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:ecovacs:gx-600:-:*:*:*:*:*:*:* cpe:2.3:o:ecovacs:deebot_t30_omni_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:ecovacs:deebot_x5_pro:-:*:*:*:*:*:*:* cpe:2.3:o:ecovacs:goat_g1_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:ecovacs:deebot_x2_omni:-:*:*:*:*:*:*:* cpe:2.3:h:ecovacs:deebot_x2_combo:-:*:*:*:*:*:*:* cpe:2.3:h:ecovacs:deebot_x5_pro_plus:-:*:*:*:*:*:*:* cpe:2.3:o:ecovacs:deebot_t30s_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:ecovacs:deebot_x2s_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:ecovacs:deebot_x5_pro_ultra_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:ecovacs:deebot_t30_omni:-:*:*:*:*:*:*:* cpe:2.3:o:ecovacs:deebot_x2_omni_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:ecovacs:goat_g1-800:-:*:*:*:*:*:*:* cpe:2.3:o:ecovacs:deebot_x5_pro_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:ecovacs:goat_g1-800_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:ecovacs:goat_g1-2000_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:ecovacs:goat_g1:-:*:*:*:*:*:*:* |
|
| First Time |
Ecovacs deebot X5 Pro Plus Firmware
Ecovacs gx-600 Ecovacs deebot T30 Omni Firmware Ecovacs deebot X5 Pro Ultra Firmware Ecovacs deebot T30s Ecovacs goat G1 Ecovacs goat G1-800 Firmware Ecovacs deebot X5 Pro Ecovacs gx-600 Firmware Ecovacs deebot X5 Pro Firmware Ecovacs goat G1 Firmware Ecovacs deebot X5 Pro Ultra Ecovacs goat G1-2000 Ecovacs Ecovacs goat G1-2000 Firmware Ecovacs deebot T30 Omni Ecovacs deebot X2 Combo Firmware Ecovacs deebot T30s Firmware Ecovacs deebot X2 Combo Ecovacs deebot X2 Omni Firmware Ecovacs deebot X2s Ecovacs deebot X2s Firmware Ecovacs deebot X2 Omni Ecovacs goat G1-800 Ecovacs deebot X5 Pro Plus |
|
| References | () https://dontvacuum.me/talks/DEFCON32/DEFCON32_reveng_hacking_ecovacs_robots.pdf - Exploit, Third Party Advisory | |
| References | () https://www.ecovacs.com/global/userhelp/dsa20241119 - Vendor Advisory | |
| References | () https://www.ecovacs.com/global/userhelp/dsa20241130001 - Vendor Advisory | |
| References | () https://youtu.be/_wUsM0Mlenc?t=2041 - Exploit | |
| Summary |
|
23 Jan 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-01-23 16:15
Updated : 2025-09-23 17:35
NVD link : CVE-2024-52325
Mitre link : CVE-2024-52325
CVE.ORG link : CVE-2024-52325
JSON object : View
Products Affected
ecovacs
- deebot_t30_omni
- deebot_x2_omni_firmware
- deebot_x5_pro_ultra
- deebot_x2_combo
- deebot_x2s_firmware
- deebot_x5_pro
- deebot_x2s
- goat_g1-2000
- deebot_t30s
- gx-600_firmware
- deebot_x2_omni
- goat_g1-800
- deebot_t30s_firmware
- goat_g1-800_firmware
- gx-600
- goat_g1
- deebot_x5_pro_plus
- deebot_x5_pro_plus_firmware
- deebot_x2_combo_firmware
- deebot_x5_pro_firmware
- goat_g1_firmware
- deebot_t30_omni_firmware
- deebot_x5_pro_ultra_firmware
- goat_g1-2000_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
