{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T08:46:51.412","vulnerabilities":[{"cve":{"id":"CVE-2021-33032","sourceIdentifier":"cve@mitre.org","published":"2021-07-22T18:15:23.177","lastModified":"2024-11-21T06:08:09.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request."},{"lang":"es","value":"Una vulnerabilidad de ejecución remota de código (RCE) en el componente WebUI del firmware eQ-3 HomeMatic CCU2 hasta la versión 2.57.5 inclusive y del firmware CCU3 hasta la versión 3.57.5 inclusive permite a los atacantes remotos no autentificados ejecutar comandos del sistema como root a través de una simple petición HTTP."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.57.5","matchCriteriaId":"3D8EB8BC-1D19-4177-BA57-1E8DABD9C03C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*","matchCriteriaId":"9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"3.57.5","matchCriteriaId":"F14B9250-FCD9-404C-A1BE-A9F3893B2189"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*","matchCriteriaId":"33113AD0-F378-49B2-BCFC-C57B52FD3A04"}]}]}],"references":[{"url":"https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf","source":"cve@mitre.org","tags":["Release Notes","Vendor Advisory"]},{"url":"https://www.eq-3.de/downloads/software/firmware/ccu3-firmware/CCU3-Changelog.3.59.6.pdf","source":"cve@mitre.org","tags":["Release Notes","Vendor Advisory"]},{"url":"https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]},{"url":"https://www.eq-3.de/downloads/software/firmware/ccu3-firmware/CCU3-Changelog.3.59.6.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]}]}}]}