Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Meari
Meari com.meari.sdk |
|
| Vendors & Products |
Meari
Meari com.meari.sdk |
Mon, 11 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Meari IoT SDK image handling (libmrplayer.so) as observed in CloudEdge 5.5.0 (build 220), Arenti 1.8.1 (build 220), and related white-label apps (<= 1.8.x), baby monitor ".jpgx3" files use reversible XOR over only the first 1024 bytes with a predictable key derivation model. | |
| Title | Meari weak XOR obfuscation | |
| Weaknesses | CWE-326 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: runZero
Published:
Updated: 2026-05-11T18:17:43.933Z
Reserved: 2026-03-19T00:27:05.987Z
Link: CVE-2026-33361
Updated: 2026-05-11T18:17:40.833Z
Status : Deferred
Published: 2026-05-11T17:16:30.970
Modified: 2026-05-13T15:36:30.533
Link: CVE-2026-33361
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:22:57Z