Shelly Pro 3EM Vulnerability: When Your Smart Switch Gets a Little Too Smart!
Shelly’s Pro 3EM has a vulnerability so serious it could knock the device offline with a single crafty Modbus request! Dubbed CVE-2025-12056, this out-of-bounds read bug needs attention—ignore it, and you’ll have a smart switch stuck on the dumb setting. Users, update your systems and keep those firewalls tighter than a drum!

Hot Take:
Who knew that a humble DIN rail switch could cause such a stir? With Shelly’s Pro 3EM inviting cyber villains to the party, it’s like a bad game of peek-a-boo where Shelly’s the only one not in on the joke. Maybe it’s time they switched their priorities from smart to savvy!
Key Points:
- Shelly’s Pro 3EM device has an Out-of-Bounds Read vulnerability with a CVSS v4 score of 8.3.
- The vulnerability allows attackers to initiate a denial-of-service condition by sending a crafty Modbus request.
- Shelly, the manufacturer, has been as responsive as a ghost during a séance.
- The vulnerability primarily affects critical manufacturing sectors worldwide.
- CISA suggests users deploy firewalls, VPNs, and other defensive measures to keep cyber baddies at bay.
Already a member? Log in here
