Vulnerability Details CVE-2018-11682
Default and unremovable support credentials allow attackers to gain total super user control of an IoT device through a TELNET session to products using the Stanza Lutron integration protocol Revision M to Revision Y. NOTE: The vendor disputes this id as not being a vulnerability because what can be done through the ports revolve around controlling lighting, not code execution. A certain set of commands are listed, which bear some similarity to code, but they are not arbitrary and do not allow admin-level control of a machine
Exploit prediction scoring system (EPSS) score
EPSS Score 0.023
EPSS Ranking 83.9%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 10.0
Products affected by CVE-2018-11682
-
cpe:2.3:h:lutron:homeworks_qs:-
-
cpe:2.3:h:lutron:radiora_2:-
-
cpe:2.3:h:lutron:stanza:-
-
cpe:2.3:o:lutron:homeworks_qs_firmware:-
-
cpe:2.3:o:lutron:radiora_2_firmware:-
-
cpe:2.3:o:lutron:stanza_firmware:-