CVE-2026-26478
Published: 04 March 2026
Description
A shell command injection vulnerability in Mobvoi Tichome Mini smart speaker 012-18853 and 027-58389 allows remote attackers to send a specially crafted UDP datagram and execute arbitrary shell code as the root account.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents shell command injection by validating and sanitizing UDP datagram inputs before processing.
Requires identification, reporting, and correction of the specific shell injection flaw in the smart speaker firmware.
Enforces boundary protection to monitor and control incoming UDP traffic, blocking crafted datagrams from reaching the vulnerable service.
Security SummaryAI
CVE-2026-26478 is a shell command injection vulnerability (CWE-78) affecting the Mobvoi Tichome Mini smart speaker models 012-18853 and 027-58389. It enables remote attackers to send a specially crafted UDP datagram, leading to the execution of arbitrary shell code with root privileges. The vulnerability received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-03-04.
Remote attackers can exploit this vulnerability over the network without authentication, privileges, or user interaction, requiring only low complexity. Successful exploitation grants full root-level code execution on the device, potentially allowing complete compromise including data exfiltration, persistent access, or further network pivoting from the smart speaker.
References include a proof-of-concept at https://github.com/pastcompute/tichome-poc-1, demonstrating practical exploitability via UDP datagram crafting. No specific mitigation or patch details are detailed in available sources.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables unauthenticated remote exploitation of a public-facing UDP service (T1190) resulting in arbitrary root Unix shell execution (T1059.004).