{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T20:15:17.751219800Z","vulnerabilities":[{"cve":{"id":"CVE-2023-4617","sourceIdentifier":"cvd@cert.pl","published":"2024-12-19T10:15:13.147","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Incorrect authorization vulnerability in HTTP POST method in Govee Home application on Android and iOS allows remote attacker to control devices owned by other users via changing \"device\", \"sku\" and \"type\" fields' values. \nThis issue affects Govee Home applications on Android and iOS in versions before 5.9."},{"lang":"es","value":"Una vulnerabilidad de autorización incorrecta en el método HTTP POST de la aplicación Govee Home en Android e iOS permite a un atacante remoto controlar dispositivos propiedad de otros usuarios modificando los valores de los campos \"device\", \"sku\" y \"type\". Este problema afecta a las aplicaciones Govee Home en Android e iOS en versiones anteriores a la 5.9."}],"metrics":{"cvssMetricV31":[{"source":"cvd@cert.pl","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0}]},"weaknesses":[{"source":"cvd@cert.pl","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]}],"references":[{"url":"https://apps.apple.com/us/app/govee-home/id1395696823","source":"cvd@cert.pl"},{"url":"https://cert.pl/en/posts/2024/12/CVE-2023-4617/","source":"cvd@cert.pl"},{"url":"https://cert.pl/posts/2024/12/CVE-2023-4617/","source":"cvd@cert.pl"},{"url":"https://play.google.com/store/apps/details?id=com.govee.home","source":"cvd@cert.pl"}]}}]}