Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
eq-3 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2021-33032
A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated malicious users to execute system commands as root via a si...
Eq-3 Homematic Ccu2 Firmware
Eq-3 Homematic Ccu3 Firmware
10
CVSSv2
CVE-2018-7300
Directory Traversal / Arbitrary File Write / Remote Code Execution in the User.setLanguage method in eQ-3 AG Homematic CCU2 2.29.2 and previous versions allows remote malicious users to write arbitrary files to the device's filesystem. This vulnerability can be exploited by ...
Eq-3 Homematic Ccu2 Firmware
1 EDB exploit
10
CVSSv2
CVE-2018-7297
Remote Code Execution in the TCL script interpreter in eQ-3 AG Homematic CCU2 2.29.2 and previous versions allows remote malicious users to obtain read/write access and execute system commands on the device. This vulnerability can be exploited by unauthenticated attackers with ac...
Eq-3 Homematic Central Control Unit Ccu2 Firmware
1 EDB exploit
9.3
CVSSv2
CVE-2019-14986
eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn prior to 2.3.0 installed allow administrative operations by unauthenticated attackers with access to the web interface, because features such as File-Browser and Shell Command (as well as "Set root password") are exposed.
Eq-3 Homematic Ccu2 Firmware
Eq-3 Homematic Ccu3 Firmware
9.3
CVSSv2
CVE-2018-7298
In /usr/local/etc/config/addons/mh/loopupd.sh on eQ-3 AG HomeMatic CCU2 2.29.22 devices, software update packages are downloaded via the HTTP protocol, which does not provide any cryptographic protection of the downloaded contents. An attacker with a privileged network position (...
Eq-3 Homematic Central Control Unit Ccu2 Firmware 2.29.22
9
CVSSv2
CVE-2019-14423
A Remote Code Execution (RCE) issue in the addon CUx-Daemon 1.11a of the eQ-3 Homematic CCU-Firmware 2.35.16 until 2.45.6 allows remote authenticated malicious users to execute system commands as root remotely via a simple HTTP request.
Eq-3 Cux-daemon
Eq-3 Ccu2 Firmware
9
CVSSv2
CVE-2019-15850
eQ-3 HomeMatic CCU3 firmware version 3.41.11 allows Remote Code Execution in the ReGa.runScript method. An authenticated attacker can easily execute code and compromise the system.
Eq-3 Homematic Ccu3 Firmware 3.41.11
7.8
CVSSv2
CVE-2019-9582
eQ-3 Homematic CCU2 outdated base software packages allows Denial of Service. CCU2 affected versions: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15.
Eq-3 Homematic Ccu2 Firmware 2.35.16
Eq-3 Homematic Ccu2 Firmware 2.41.8
Eq-3 Homematic Ccu2 Firmware 2.41.9
Eq-3 Homematic Ccu2 Firmware 2.45.6
Eq-3 Homematic Ccu2 Firmware 2.45.7
Eq-3 Homematic Ccu2 Firmware 2.47.10
Eq-3 Homematic Ccu2 Firmware 2.47.12
Eq-3 Homematic Ccu2 Firmware 2.41.5
Eq-3 Homematic Ccu2 Firmware 2.47.15
7.5
CVSSv2
CVE-2020-12834
eQ-3 Homematic Central Control Unit (CCU)2 up to and including 2.51.6 and CCU3 up to and including 3.51.6 allow Remote Code Execution in the JSON API Method ReGa.runScript, by unauthenticated attackers with access to the web interface, due to the default auto-login feature being ...
Eq-3 Homematic Ccu2 Firmware
Eq-3 Ccu3 Firmware
7.5
CVSSv2
CVE-2019-18939
eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the HM-Print AddOn up to and including 1.2a installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi and exec1.cgi scripts, which execute TCL script content from an HTTP ...
Hm-print Project Hm-print 1.2a
Eq-3 Homematic Ccu2 Firmware 2.47.20
Hm-print Project Hm-print 1.2
Eq-3 Homematic Ccu3 Firmware 3.47.18
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »