A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request.
References
Link | Resource |
---|---|
https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/ | Exploit Third Party Advisory |
https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf | Release Notes Vendor Advisory |
https://www.eq-3.de/downloads/software/firmware/ccu3-firmware/CCU3-Changelog.3.59.6.pdf | Release Notes Vendor Advisory |
https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/ | Exploit Third Party Advisory |
https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf | Release Notes Vendor Advisory |
https://www.eq-3.de/downloads/software/firmware/ccu3-firmware/CCU3-Changelog.3.59.6.pdf | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 06:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/ - Exploit, Third Party Advisory | |
References | () https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf - Release Notes, Vendor Advisory | |
References | () https://www.eq-3.de/downloads/software/firmware/ccu3-firmware/CCU3-Changelog.3.59.6.pdf - Release Notes, Vendor Advisory |
30 Jul 2021, 21:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request. |
27 Jul 2021, 15:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:* cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:* cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:* |
|
CWE | CWE-78 | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 10.0 |
References | (MISC) https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/ - Exploit, Third Party Advisory | |
References | (MISC) https://www.eq-3.de/downloads/software/firmware/ccu3-firmware/CCU3-Changelog.3.59.6.pdf - Release Notes, Vendor Advisory | |
References | (MISC) https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf - Release Notes, Vendor Advisory |
22 Jul 2021, 18:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-07-22 18:15
Updated : 2024-11-21 06:08
NVD link : CVE-2021-33032
Mitre link : CVE-2021-33032
CVE.ORG link : CVE-2021-33032
JSON object : View
Products Affected
eq-3
- homematic_ccu2_firmware
- homematic_ccu3
- homematic_ccu3_firmware
- homematic_ccu2
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')