vendor:
Homematic CCU2
by:
Patrick Muench, Gregor Kopf
8.8
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: Homematic CCU2
Affected Version From: 2.29.23
Affected Version To: 2.29.23
Patch Exists: YES
Related CWE: 2018-7297
CPE: a:eq-3:homematic_ccu2
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: None
2018
Homematic CCU2 Remote Command Execution
The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Homematic CCU2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Test.exe component, which listens on TCP port 8181. The issue lies in the handling of a crafted POST request containing a TCL command. An attacker can leverage this vulnerability to execute code under the context of the webserver.
Mitigation:
Update to version 2.29.24 or later