CVE-2026-4475
Published: 20 March 2026
Summary
CVE-2026-4475 is a high-severity Use of Hard-coded Password (CWE-259) vulnerability. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Local Accounts (T1078.003); ranked at the 7.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SC-7 (Boundary Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Monitors and controls communications at external and key internal boundaries, preventing local network attackers from exploiting the hard-coded credentials in the ipc function.
Restricts the camera to essential capabilities by prohibiting or restricting unnecessary ports, protocols, or services like the vulnerable home/web/ipc endpoint.
Requires secure management of authenticators, which prohibits reliance on hard-coded credentials and supports selection of devices without such flaws.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hard-coded credentials embedded in device file directly provide valid local accounts for adjacent-network authentication (T1078.003) and constitute unsecured credentials stored in files (T1552.001), enabling initial device compromise.
NVD Description
A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required for this attack…
more
to succeed. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2026-4475 is a vulnerability involving hard-coded credentials in an unknown function of the file home/web/ipc in Yi Technology YI Home Camera 2 version 2.1.1_20171024151200. It is classified under CWE-259 and CWE-798, with a CVSS v3.1 base score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue was published on 2026-03-20.
Attackers with access to the local network can exploit this vulnerability without requiring privileges or user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, potentially allowing full compromise of the affected camera device.
VulDB advisories indicate that the exploit has been publicly disclosed and may be used. The vendor was contacted early regarding the disclosure but provided no response, with no patches or official mitigations mentioned.
Details
- CWE(s)