CVE-2026-7415

Yarbo · Firmware

The embedded MQTT broker in Yarbo firmware v2.3.9 allows anonymous connections and lacks ACLs, enabling unauthorized control of the device.

Executive summary

An insecure MQTT configuration in Yarbo firmware allows unauthenticated attackers to control the device and access telemetry data, posing a critical security risk.

Vulnerability

The embedded MQTT broker permits anonymous connections without any topic-level access control, allowing any network-adjacent attacker to subscribe to or publish to sensitive topics.

Business impact

With a CVSS score of 9.8, this is a critical vulnerability for IoT devices. An attacker can intercept control messages, spoof telemetry, or issue unauthorized commands to the robot, potentially leading to physical damage or unauthorized surveillance.

Remediation

Immediate Action: Apply the latest firmware update provided by Yarbo.

Proactive Monitoring: Isolate the device on a restricted network segment and monitor MQTT traffic for unauthorized access attempts.

Compensating Controls: If a patch is unavailable, place the device behind a network firewall that blocks access to the MQTT broker port from unauthorized subnets.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Update the firmware immediately. If an update is not yet available, segment the device from the primary network to prevent unauthorized access to the MQTT broker.