Products
| Product | |
| 1 | Meari IoT SDK (com.meari.sdk) (firmID=8) |
CVE
CVE-2026-33362Executive summary #
In Meari IoT SDK builds embedded in CloudEdge 5.5.0 (build 220), Arenti 1.8.1 (build 220), and white-label Android apps <= 1.8.x (latest observed), multiple security-critical secrets are hardcoded and shared, including API signing material, password-transport keying, and service access keys.
Because these static keys are recoverable from client binaries, trust decisions that depend on them are weak by design and can be replayed across brands and tenants that use the same SDK/backend model.
This is an instance of CWE-321: Use of Hard-coded Cryptographic Key, and has an estimated CVSS vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N (8.6, High).
Technical details #
Further technical details can be found at the original disclosure, Nobody Puts Baby In A Corner.
Attacker value #
Hardcoded secrets provide durable attacker capability with low maintenance cost. They can support request forgery, unauthorized data access, and broad replay of trusted operations across the ecosystem. This CVE materially strengthens exploitation of other findings in this disclosure set, notably CVE-2026-33357, by supplying reusable signing context and reducing barriers to automated, large-scale abuse.
Credit #
These issues were discovered, documented, and disclosed by Sammy Azdoufal. CVE coordination was performed by Tod Beardsley of runZero, Inc.
Timeline #
2026-03-11: Issues identified by the researcher, reviewed by runZero, and disclosed to vendor
2026-04-03: Opened VINCE Case VU#579666 with CISA for tracking
2026-April/May: Email comms between the vendor and the researcher, throughout April and May
2026-04-28: Researcher and runZero refined findings
2026-05-06: Confirmed findings and disclosure process with The Verge
2026-05-11: Public disclosure of CVE-2026-33356