Yesido TWS38

From Wiki-IoT


Classification

Yesido TWS38
Classification
Grade D
Calculator version 1
Classification date 2025-10-09
Information
Name Yesido TWS38 (TWS True Wireless Bluetooth Earphones)
Brand by Parent Yesido by Shenzhen Yashitong Electronics Co., Ltd.
Generation Not clearly divided (no official generation labeling)
Model(s) TWS38 (no derivative models publicly disclosed)
Release date 2022-03-04
Type/Category TWS True Wireless Bluetooth Earphones (Category: Audio Accessories)
Website (official brand website)
Status In sale
More
Dimensions - Single earbud: ~20mm × 18mm × 25mm - Charging case: ~60mm × 40mm × 28mm (from e-commerce parameters)
Mass - Single earbud: ~4.5g - Charging case: ~35g (from e-commerce parameters)
Operating system No independent operating system (relies on the connected device’s OS)
Companion App No exclusive companion App; basic functions are adjusted via Bluetooth settings on the connected device
CPU Realtek RTL8763BFR (or similar entry-level Bluetooth 5.3 chip, from teardown info)
GPU No independent GPU (not required for TWS earphone functions)
Memory Integrated 64KB-128KB RAM (built into the Bluetooth chip, entry-level standard)
Storage No independent storage (does not support local music storage)
Battery - Single earbud: ~30mAh - Charging case: ~300mAh (from e-commerce parameters)
Power - Working power: ~5mW (Bluetooth connected state) - Charging power: Input (charging case) ~5V/1A (5W); Output ~5V/0.5A (2.5W)
Charging - Port: Type-C (wired charging only, no wireless charging) - Charging time: Single earbud ~1.5h; Charging case ~2h (from product manual)
Display No display (no screen on earbuds or charging case)
Camera No camera (no imaging function)
Sound - Driver unit: 10mm dynamic driver - Frequency response: 20Hz-20kHz - Audio codec: SBC - Additional: Basic call noise reduction (via built-in microphone)
Connectivity - Bluetooth version: Bluetooth 5.3 - Connection range: ~10m (obstacle-free) - Supported protocols: HFP, HSP, A2DP, AVRCP - No NFC/WiFi/Bluetooth multipoint (public parameters)
Device
Criterion Value Proof(s) Comment
Known hardware tampering None [No official URLs (low user demand for tampering entry-level TWS earphones; no public cases)] Non-modular design, high difficulty for user disassembly. No public tampering cases due to low practical value.
Known vulnerabilities None [No official URLs (no vulnerabilities recorded in CVE Details/NVD as of May 2024)] Simple functions, no complex system, low vulnerability risk. No public reports.
Prior attacks None [No official URLs (no attack events reported by tech media/security institutions)] No sensitive data processing capability, low attack value. No public attack records.
Updatability None [No official URLs (no firmware update function mentioned on brand website/product manual)] Does not support firmware updates; cannot fix potential issues or optimize functions via software.
Category score 2
System
Criterion Value Proof(s) Comment
Authentication with other systems No [No official URLs (pairing only requires Bluetooth search, no system-level authentication)] Only relies on basic Bluetooth pairing (default code 0000 or auto-pairing); no association with device accounts/cloud systems.
Communications Encrypted with up-to-date encryption [Reference: Bluetooth SIG official Bluetooth 5.3 encryption: https://www.bluetooth.com/specifications/bluetooth-core-specification/] Adopts AES-CCM encryption (built into Bluetooth 5.3), a mainstream and up-to-date encryption method for Bluetooth transmission.
Storage No encryption [No official URLs (product parameters confirm no local storage)] No music/data local storage capability; no storage module, so no storage encryption is needed.
Category score 3
User Authentication
Criterion Value Proof(s) Comment
Account management Absent [No official URLs (no account registration/login mentioned on brand platforms)] No account system; users do not need to create/manage accounts to use the product.
Authentication Absent [No official URLs (no identity verification required after successful pairing)] No user authentication (e.g., password/fingerprint); anyone with a paired device or re-pairing capability can use the earphones.
Brute-force protection Absent [No official URLs (no limit on Bluetooth pairing attempts)] No limit on Bluetooth pairing attempts; if a simple pairing code (e.g., 0000) is used, brute-force cracking is theoretically possible.
Event logging Absent [No official URLs (no storage/App to record events)] No ability to generate/store logs; cannot trace connection history or operation records.
Passwords Default/Common/Easy to guess [No official URLs (auto-pairing or default code 0000)] No mandatory password change requirements; Bluetooth pairing uses common simple codes or no code, which is easy to guess.
Category score 3
Grade D