Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Meari
Meari com.meari.sdk |
|
| Vendors & Products |
Meari
Meari com.meari.sdk |
Mon, 11 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.0 build 220, Arenti 1.8.1 build 220, and related white-label <= 1.8.x), the integrated call path to openapi-euce.mearicloud.com can be abused to retrieve WAN IP data for arbitrary devices. The root cause is a server-side authorization failure in "GET /openapi/device/status". | |
| Title | Meari OpenAPI device status IDOR | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: runZero
Published:
Updated: 2026-05-11T18:18:25.334Z
Reserved: 2026-03-19T00:27:05.986Z
Link: CVE-2026-33357
Updated: 2026-05-11T18:18:22.365Z
Status : Deferred
Published: 2026-05-11T17:16:30.730
Modified: 2026-05-13T15:36:30.533
Link: CVE-2026-33357
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:23:00Z