关联漏洞
描述
CVE-2025-29628, CVE-2025-29629, CVE-2025-29630, CVE-2025-29631
介绍
## Summary
In February 2025 I conducted security research on a Gardyn Home 4.0 device. During my research, I discovered multiple vulnerabilities and poor security practices. By leveraging these vulnerabilities an attacker may be able to gain system level access to a Gardyn device and use it to stage further attacks against the local area network it is connected to. An attacker may also use this access to affect the normal operation of the device, including damaging the plants being grown in the device and the device itself.
This repository contains the technical details and status for a collection of vulnerabilities in the Gardyn hydroponics garden. This information is being released with the purpose if informing consumers with unresolved issues in the security of the Gardyn product.
## Disclosure Timeline
2025-02-21 - Initial contact with vendor attempted.
2025-02-26 - Contact made with vendor sales team.
2025-04-07 - Contact made with vendor technical representative. Technical details of all vulnerabilities disclosed.
2025-06-14 - Follow up attempted with vendor regarding existing vulnerabilties.
*as of 2025-07-04*
| **CVE** | **Issue** | **Status** |
| -------------- | ------------------------ | -------------------------------------------------------------------------------------------------------------------- |
| CVE-2025-29629 | Weak Default Credentials | The credentials are still the same, but password authentication has been disabled for SSH |
| CVE-2025-29630 | SSH Key Backdoor | An SSH authorized key still exists but has been scrubbed of personally identifying information of a Gardyn Employee. |
| CVE-2025-29628 | Full device takeover | Unpatched |
| CVE-2025-29631 | Command Injection | Unpatched |
文件快照
[4.0K] /data/pocs/4fa345ae088aa8c29be7c044da1c85535df31087
├── [5.1K] CVE-2025-29628_CVE-2025-29631.md
├── [ 681] CVE-2025-29629.md
├── [ 694] CVE-2025-29630.md
├── [1.0K] LICENSE
├── [2.1K] README.md
└── [ 35K] run_cli.png
0 directories, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。