Gardyn Home Kit firmware before master.619, Home Kit Mobile Application before 2.11.0, and Home Kit Cloud API before 2.12.2026 uses weak default credentials for secure shell access. This may result in attackers gaining access to exposed Gardyn Home Kits.
History

Wed, 25 Feb 2026 16:45:00 +0000

Type Values Removed Values Added
Description An issue in Gardyn 4 allows a remote attacker to obtain sensitive information and execute arbitrary code via the Gardyn Home component Gardyn Home Kit firmware before master.619, Home Kit Mobile Application before 2.11.0, and Home Kit Cloud API before 2.12.2026 uses weak default credentials for secure shell access. This may result in attackers gaining access to exposed Gardyn Home Kits.
References

Fri, 25 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-94
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 25 Jul 2025 16:45:00 +0000

Type Values Removed Values Added
Description An issue in Gardyn 4 allows a remote attacker to obtain sensitive information and execute arbitrary code via the Gardyn Home component
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-02-25T15:54:24.508Z

Reserved: 2025-03-11T00:00:00.000Z

Link: CVE-2025-29629

cve-icon Vulnrichment

Updated: 2025-07-25T18:38:19.916Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-25T17:15:31.180

Modified: 2026-02-25T17:25:19.277

Link: CVE-2025-29629

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.