Gardyn Security Incident

← All CVEs in ICSA-26-055-03

CVE-2025-29631

OS Command Injection

CVECVE-2025-29631
SeverityCritical (9.1)
Weakness (CWE)CWE-78: OS Command Injection
Affected componentsFirmware <master.622
VendorGardyn Inc.
Affected productsGardyn Home Kit Models 1.0, 2.0, 3.0, 4.0; Gardyn Studio Models 1.0, 2.0
SectorFood and Agriculture (CISA classification)
Status per CISA Update ARemediated
CoordinatorCERT/CC (parent case VU#653116) and CISA

What is documented

Per the researcher’s coordinated-disclosure repository, the device firmware upgrade() routine in DMHandler.py passed input to os.system() without sanitization. The upgrade() method is registered as an Azure IoT Hub direct method invokable by any caller with IoT Hub credentials.

Primary sources

Mitigation per CISA Update A

Per CISA Update A (April 2, 2026), this CVE is remediated. The fix versions stated by CISA are: Gardyn mobile application 2.11.0 or later; Gardyn cloud API 2.12.2026 or later; Home Kit firmware master.622 or later. See the CISA advisory and the how to update page.

← All CVEs in ICSA-26-055-03