Cross-Site Request Forgery (CSRF) vulnerability in the OAuth implementation of the Tuya SDK 6.5.0 for Android and iOS, affects the Tuya Smart and Smartlife mobile applications, as well as other third-party applications that integrate the SDK, allows an attacker to link their own Amazon Alexa account to a victims Tuya account. The applications fail to validate the OAuth state parameter during the account linking flow, enabling a cross-site request forgery (CSRF)-like attack. By tricking the victim into clicking a crafted authorization link, an attacker can complete the OAuth flow on the victims behalf, resulting in unauthorized Alexa access to the victims Tuya-connected devices. This affects users regardless of prior Alexa linkage and does not require the Tuya application to be active at the time. Successful exploitation may allow remote control of devices such as cameras, doorbells, door locks, or alarms.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Smartlife | Tuya | 6.3.1 (including) | 6.3.1 (including) |
| Smartlife | Tuya | 6.3.4 (including) | 6.3.4 (including) |
| Tuya | Tuya | * | 6.5.0 (excluding) |
| Tuya_smart | Tuya | 6.3.1 (including) | 6.3.1 (including) |