Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yarbo lawn Mower
Yarbo lawn Mower Firmware Yarbo lawn Mower Pro Yarbo lawn Mower Pro Firmware |
|
| CPEs | cpe:2.3:h:yarbo:lawn_mower:-:*:*:*:*:*:*:* cpe:2.3:h:yarbo:lawn_mower_pro:-:*:*:*:*:*:*:* cpe:2.3:o:yarbo:lawn_mower_firmware:2.3.9:*:*:*:*:*:*:* cpe:2.3:o:yarbo:lawn_mower_pro_firmware:2.3.9:*:*:*:*:*:*:* |
|
| Vendors & Products |
Yarbo lawn Mower
Yarbo lawn Mower Firmware Yarbo lawn Mower Pro Yarbo lawn Mower Pro Firmware |
Thu, 07 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yarbo
Yarbo firmware |
|
| Vendors & Products |
Yarbo
Yarbo firmware |
Thu, 07 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
Thu, 07 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Yarbo firmware v2.3.9 contains hardcoded administrative credentials embedded in the firmware image. These credentials are identical across all devices running this firmware and cannot be changed or removed by end users, enabling trivial unauthorized access to device management interfaces by anyone who knows them. | |
| Title | Hardcoded credentials in Yarbo robot firmware | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AHA
Published:
Updated: 2026-05-07T17:01:37.949Z
Reserved: 2026-04-29T13:55:09.542Z
Link: CVE-2026-7414
Updated: 2026-05-07T17:01:01.487Z
Status : Analyzed
Published: 2026-05-07T17:15:59.460
Modified: 2026-05-14T17:53:31.260
Link: CVE-2026-7414
No data.
OpenCVE Enrichment
Updated: 2026-05-07T21:24:37Z