CVE-2025-57808

ESPHome · ESPHome Multiple Products

A high-severity vulnerability has been identified in multiple ESPHome products, which are used to control microcontrollers in home and industrial automation systems.

Executive summary

A high-severity vulnerability has been identified in multiple ESPHome products, which are used to control microcontrollers in home and industrial automation systems. This flaw could allow a remote, unauthenticated attacker to take control of affected devices, potentially leading to physical security breaches, manipulation of environmental controls, or disruption of automated processes. Organizations are urged to apply vendor-supplied patches immediately to mitigate the significant risk of compromise.

Vulnerability

This vulnerability is a remote command injection flaw within the web server component used for remote administration of ESPHome devices. An unauthenticated attacker on the same network as a target device can send a specially crafted HTTP request to an exposed API endpoint. Due to improper input sanitization, the attacker's malicious payload is executed directly by the underlying operating system, granting them the ability to take full control of the microcontroller and its connected peripherals.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.1. Exploitation of this flaw could have significant business impact, as ESPHome devices are often integrated into critical physical and operational systems. Potential consequences include unauthorized access to facilities by manipulating smart locks, disabling of security cameras and alarms, disruption of HVAC or other environmental controls leading to equipment damage, and interference with automated processes in a commercial or industrial setting. Successful exploitation poses a direct risk to physical security, operational continuity, and data integrity from connected sensors.

Remediation

Immediate Action:

  • Immediately identify all vulnerable ESPHome devices within the environment.
  • Apply the security updates provided by the vendor to all affected devices without delay.
  • After patching, review device and network access logs for any signs of compromise or unusual activity preceding the update.

Proactive Monitoring:

  • Monitor network traffic for anomalous requests to the web interface of ESPHome devices, particularly from untrusted or unexpected network segments.
  • Implement alerting for unexpected device reboots or behavior changes (e.g., a smart lock cycling unexpectedly).
  • Review web server logs on the devices, if accessible, for malformed API calls or command injection payloads.

Compensating Controls:

  • If immediate patching is not feasible, implement network segmentation to isolate all ESPHome devices onto a restricted VLAN.
  • Use a firewall to create strict access control lists (ACLs), ensuring that only authorized management systems can communicate with the devices' control interfaces.
  • Disable the web server component on devices where it is not essential for operation.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.1 and the potential for an attacker to gain direct control over physical systems, we strongly recommend that organizations prioritize the immediate patching of all affected ESPHome devices. Although there is no evidence of active exploitation at this time, the risk of operational disruption and physical security compromise is significant. Organizations should treat this as a critical vulnerability and apply remediation or compensating controls within their established emergency patching window.