Shelly Pro 3EM Vulnerability: When Your Smart Switch Gets a Little Too Smart!

Shelly’s Pro 3EM has a vulnerability so serious it could knock the device offline with a single crafty Modbus request! Dubbed CVE-2025-12056, this out-of-bounds read bug needs attention—ignore it, and you’ll have a smart switch stuck on the dumb setting. Users, update your systems and keep those firewalls tighter than a drum!

Pro Dashboard

Hot Take:

Who knew that a humble DIN rail switch could cause such a stir? With Shelly’s Pro 3EM inviting cyber villains to the party, it’s like a bad game of peek-a-boo where Shelly’s the only one not in on the joke. Maybe it’s time they switched their priorities from smart to savvy!

Key Points:

  • Shelly’s Pro 3EM device has an Out-of-Bounds Read vulnerability with a CVSS v4 score of 8.3.
  • The vulnerability allows attackers to initiate a denial-of-service condition by sending a crafty Modbus request.
  • Shelly, the manufacturer, has been as responsive as a ghost during a séance.
  • The vulnerability primarily affects critical manufacturing sectors worldwide.
  • CISA suggests users deploy firewalls, VPNs, and other defensive measures to keep cyber baddies at bay.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?