Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Homematic_ccu2_firmware
(Eq\-3)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 13 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-05-15 | CVE-2020-12834 | eQ-3 Homematic Central Control Unit (CCU)2 through 2.51.6 and CCU3 through 3.51.6 allow Remote Code Execution in the JSON API Method ReGa.runScript, by unauthenticated attackers with access to the web interface, due to the default auto-login feature being enabled during first-time setup (or factory reset). | Ccu3_firmware, Homematic_ccu2_firmware | 9.8 | ||
2021-07-22 | CVE-2021-33032 | A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request. | Homematic_ccu2_firmware, Homematic_ccu3_firmware | 10.0 | ||
2019-11-14 | CVE-2019-18937 | eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the Script Parser AddOn through 1.8 installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi script, which executes TCL script content from an HTTP POST request. | Homematic_ccu2, Homematic_ccu2_firmware, Homematic_ccu3, Homematic_ccu3_firmware, Scriptparser | 9.8 |