CVE-2025-30198
05.09.2025, 18:15
ECOVACS robot vacuums and base stations communicate via an insecure Wi-Fi network with a deterministic WPA2-PSK, which can be easily derived.Enginsight
Vendor | Product | Version |
---|---|---|
ecovacs | deebot_x1s_pro_firmware | 𝑥 < 2.5.38 |
ecovacs | deebot_x1_pro_omni_firmware | 𝑥 < 2.5.38 |
ecovacs | deebot_x1_omni_firmware | 𝑥 < 2.4.45 |
ecovacs | deebot_x1s_pro_firmware | 𝑥 < 2.4.45 |
ecovacs | deebot_x1_turbo_firmware | 𝑥 < 2.5.38 |
ecovacs | deebot_x1s_pro_firmware | 𝑥 < 2.4.45 |
ecovacs | deebot_t10_firmware | 𝑥 < 1.11.0 |
ecovacs | deebot_t10_omni_firmware | 𝑥 < 1.11.0 |
ecovacs | deebot_t10_plus_firmware | 𝑥 < 1.11.0 |
ecovacs | deebot_t10_turbo_firmware | 𝑥 < 1.11.0 |
ecovacs | deebot_t20_omni_firmware | 𝑥 < 1.25.0 |
ecovacs | deebot_t20_pro_plus_firmware | 𝑥 < 1.25.0 |
ecovacs | deebot_t20_pro_firmware | 𝑥 < 1.25.0 |
ecovacs | deebot_t30_omni_firmware | 𝑥 < 1.100.0 |
ecovacs | deebot_t30s_firmware | 𝑥 < 1.100.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-321 - Use of Hard-coded Cryptographic KeyThe use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.
- CWE-798 - Use of Hard-coded CredentialsThe software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.