Vulnerability Details CVE-2021-33032
A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.51
EPSS Ranking 97.7%
CVSS Severity
CVSS v3 Score 10.0
CVSS v2 Score 10.0
Products affected by CVE-2021-33032
-
cpe:2.3:h:eq-3:homematic_ccu2:-
-
cpe:2.3:h:eq-3:homematic_ccu3:-
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:-
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:1.2.0
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.11.6
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.11.9
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.13.7
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.15.2
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.15.5
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.17.14
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.17.15
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.17.16
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.19.9
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.21.10
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.25.12
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.25.14
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.25.15
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.27.7
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.27.8
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.29.18
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.29.23
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.3.0
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.3.17
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.3.18
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.31.23
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.31.25
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.35.16
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.5
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.8
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.9
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.45.6
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.45.7
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.10
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.12
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.15
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.18
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.49.17
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.49.18
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.5.4
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.51.6
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.53.27
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.53.34
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.55.10
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.55.5
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.57.4
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.57.5
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.7.16
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.7.17
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.7.8
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.9.10
-
cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.9.12
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:-
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:1.2.0
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:2.3.0
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.14.11
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.41.11
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.43.16
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.45.5
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.45.7
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.10
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.15
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.22
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.49.17
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.51.6
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.53.26
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.53.30
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.53.34
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.55.10
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.55.5
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.57.4
-
cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.57.5