Show filters
19 Total Results
Displaying 11-19 of 19
Sort by:
Attacker Value
Unknown

CVE-2019-14986

Disclosure Date: August 13, 2019 (last updated November 27, 2024)
eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn before 2.3.0 installed allow administrative operations by unauthenticated attackers with access to the web interface, because features such as File-Browser and Shell Command (as well as "Set root password") are exposed.
0
Attacker Value
Unknown

CVE-2019-14985

Disclosure Date: August 13, 2019 (last updated November 27, 2024)
eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because this interface can access the CMD_EXEC virtual device type 28.
0
Attacker Value
Unknown

CVE-2019-14984

Disclosure Date: August 13, 2019 (last updated November 27, 2024)
eQ-3 Homematic CCU2 and CCU3 with the XML-API through 1.2.0 AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because the undocumented addons/xmlapi/exec.cgi script uses CMD_EXEC to execute TCL code from a POST request.
0
Attacker Value
Unknown

CVE-2018-7301

Disclosure Date: February 22, 2018 (last updated November 26, 2024)
eQ-3 AG HomeMatic CCU2 2.29.22 devices have an open XML-RPC port without authentication. This can be exploited by sending arbitrary XML-RPC requests to control the attached BidCos devices.
0
Attacker Value
Unknown

CVE-2018-7299

Disclosure Date: February 22, 2018 (last updated November 26, 2024)
Remote Code Execution in the addon installation process in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows authenticated attackers to create or overwrite arbitrary files or install malicious software on the device.
0
Attacker Value
Unknown

CVE-2018-7298

Disclosure Date: February 22, 2018 (last updated November 26, 2024)
In /usr/local/etc/config/addons/mh/loopupd.sh on eQ-3 AG HomeMatic CCU2 2.29.22 devices, software update packages are downloaded via the HTTP protocol, which does not provide any cryptographic protection of the downloaded contents. An attacker with a privileged network position (which could be obtained via DNS spoofing of www.meine-homematic.de or other approaches) can exploit this issue in order to provide arbitrary malicious firmware updates to the CCU2. This can result in a full system compromise.
0
Attacker Value
Unknown

CVE-2018-7296

Disclosure Date: February 22, 2018 (last updated November 26, 2024)
Directory Traversal / Arbitrary File Read in User.getLanguage method in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to read the first line of an arbitrary file on the CCU2's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.
0
Attacker Value
Unknown

CVE-2018-7300

Disclosure Date: February 22, 2018 (last updated November 26, 2024)
Directory Traversal / Arbitrary File Write / Remote Code Execution in the User.setLanguage method in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to write arbitrary files to the device's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.
Attacker Value
Unknown

CVE-2018-7297

Disclosure Date: February 22, 2018 (last updated November 26, 2024)
Remote Code Execution in the TCL script interpreter in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to obtain read/write access and execute system commands on the device. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.
0