Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
eq-3 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-14474
eQ-3 Homematic CCU3 3.47.15 and prior has Improper Input Validation in function 'Call()' of ReGa core logic process, resulting in the ability to start a Denial of Service. Due to Improper Authorization an attacker can obtain a session ID from CVE-2019-9583 or a valid gu...
Eq-3 Ccu3 Firmware
5
CVSSv2
CVE-2018-7296
Directory Traversal / Arbitrary File Read in User.getLanguage method in eQ-3 AG Homematic CCU2 2.29.2 and previous versions allows remote malicious users to read the first line of an arbitrary file on the CCU2's filesystem. This vulnerability can be exploited by unauthentica...
Eq-3 Homematic Central Control Unit Ccu2 Firmware
5.2
CVSSv2
CVE-2018-7299
Remote Code Execution in the addon installation process in eQ-3 AG Homematic CCU2 2.29.2 and previous versions allows authenticated malicious users to create or overwrite arbitrary files or install malicious software on the device.
Eq-3 Homematic Central Control Unit Ccu2 Firmware
5
CVSSv2
CVE-2019-9726
Directory Traversal / Arbitrary File Read in eQ-3 AG Homematic CCU3 3.43.15 and previous versions allows remote malicious users to read arbitrary files of the device's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interfa...
Eq-3 Ccu3 Firmware
5
CVSSv2
CVE-2019-9727
Unauthenticated password hash disclosure in the User.getUserPWD method in eQ-3 AG Homematic CCU3 3.43.15 and previous versions allows remote malicious users to retrieve the GUI password hashes of GUI users. This vulnerability can be exploited by unauthenticated attackers with acc...
Eq-3 Ccu3 Firmware
9.3
CVSSv2
CVE-2018-7298
In /usr/local/etc/config/addons/mh/loopupd.sh on eQ-3 AG HomeMatic CCU2 2.29.22 devices, software update packages are downloaded via the HTTP protocol, which does not provide any cryptographic protection of the downloaded contents. An attacker with a privileged network position (...
Eq-3 Homematic Central Control Unit Ccu2 Firmware 2.29.22
7.5
CVSSv2
CVE-2018-7301
eQ-3 AG HomeMatic CCU2 2.29.22 devices have an open XML-RPC port without authentication. This can be exploited by sending arbitrary XML-RPC requests to control the attached BidCos devices.
Eq-3 Homematic Central Control Unit Ccu2 Firmware 2.29.22
4.9
CVSSv2
CVE-2019-15849
eQ-3 HomeMatic CCU3 firmware 3.41.11 allows session fixation. An attacker can create session IDs and send them to the victim. After the victim logs in to the session, the attacker can use that session. The attacker could create SSH logins after a valid session and easily compromi...
Eq-3 Homematic Ccu3 Firmware 3.14.11
9
CVSSv2
CVE-2019-15850
eQ-3 HomeMatic CCU3 firmware version 3.41.11 allows Remote Code Execution in the ReGa.runScript method. An authenticated attacker can easily execute code and compromise the system.
Eq-3 Homematic Ccu3 Firmware 3.41.11
7.5
CVSSv2
CVE-2019-18939
eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the HM-Print AddOn up to and including 1.2a installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi and exec1.cgi scripts, which execute TCL script content from an HTTP ...
Hm-print Project Hm-print 1.2a
Eq-3 Homematic Ccu2 Firmware 2.47.20
Hm-print Project Hm-print 1.2
Eq-3 Homematic Ccu3 Firmware 3.47.18
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »