CVE-2019-14423

A Remote Code Execution (RCE) issue in the addon CUx-Daemon 1.11a of the eQ-3 Homematic CCU-Firmware 2.35.16 until 2.45.6 allows remote authenticated attackers to execute system commands as root remotely via a simple HTTP request.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eq-3:cux-daemon:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:eq-3:ccu2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:eq-3:ccu2:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:26

Type Values Removed Values Added
References () https://noskill1337.github.io/homematic-with-cux-daemon-remote-code-execution - Exploit, Mitigation, Third Party Advisory () https://noskill1337.github.io/homematic-with-cux-daemon-remote-code-execution - Exploit, Mitigation, Third Party Advisory
References () https://www.eq-3.com/products/homematic.html - Vendor Advisory () https://www.eq-3.com/products/homematic.html - Vendor Advisory

Information

Published : 2019-10-17 14:15

Updated : 2024-11-21 04:26


NVD link : CVE-2019-14423

Mitre link : CVE-2019-14423

CVE.ORG link : CVE-2019-14423


JSON object : View

Products Affected

eq-3

  • cux-daemon
  • ccu2
  • ccu2_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')