Eq-3

Homematic Central Control Unit Ccu2 Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.22%
  • Veröffentlicht 22.02.2018 19:29:06
  • Zuletzt bearbeitet 21.11.2024 04:11:58

eQ-3 AG HomeMatic CCU2 2.29.22 devices have an open XML-RPC port without authentication. This can be exploited by sending arbitrary XML-RPC requests to control the attached BidCos devices.

  • EPSS 0.11%
  • Veröffentlicht 22.02.2018 19:29:05
  • Zuletzt bearbeitet 21.11.2024 04:11:57

In /usr/local/etc/config/addons/mh/loopupd.sh on eQ-3 AG HomeMatic CCU2 2.29.22 devices, software update packages are downloaded via the HTTP protocol, which does not provide any cryptographic protection of the downloaded contents. An attacker with a...

  • EPSS 0.2%
  • Veröffentlicht 22.02.2018 19:29:05
  • Zuletzt bearbeitet 21.11.2024 04:11:57

Remote Code Execution in the addon installation process in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows authenticated attackers to create or overwrite arbitrary files or install malicious software on the device.

  • EPSS 0.24%
  • Veröffentlicht 22.02.2018 19:29:04
  • Zuletzt bearbeitet 21.11.2024 04:11:57

Directory Traversal / Arbitrary File Read in User.getLanguage method in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to read the first line of an arbitrary file on the CCU2's filesystem. This vulnerability can be exploited by una...

  • EPSS 46.57%
  • Veröffentlicht 22.02.2018 19:29:04
  • Zuletzt bearbeitet 21.11.2024 04:11:57

Remote Code Execution in the TCL script interpreter in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to obtain read/write access and execute system commands on the device. This vulnerability can be exploited by unauthenticated att...