Home

Description

Yarbo firmware v2.3.9 contains hardcoded administrative credentials embedded in the firmware image. These credentials are identical across all devices running this firmware and cannot be changed or removed by end users, enabling trivial unauthorized access to device management interfaces by anyone who knows them.

PUBLISHED Reserved 2026-04-29 | Published 2026-05-07 | Updated 2026-05-07 | Assigner AHA




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-798 Use of Hard-coded Credentials

Product status

Default status
unaffected

Any version
affected

Credits

Andreas Makris (aka Bin4ry) finder

todb of AHA! coordinator

References

github.com/Bin4ry/yarbo-nat-in-my-back-yard exploit

github.com/Bin4ry/yarbo-nat-in-my-back-yard third-party-advisory

takeonme.org/...00000000000000000000000000000000000000001000 third-party-advisory

cve.org (CVE-2026-7414)

nvd.nist.gov (CVE-2026-7414)

Download JSON