CVE-2026-41446
Unauthorized Root Command Execution via Diagnostic HTTP in WattBox Firmware
Publication date: 2026-04-28
Last updated on: 2026-04-29
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| snap_one | wattbox | to 2.10.0.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-798 | The product contains hard-coded credentials, such as a password or cryptographic key. |
| CWE-912 | The product contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the product's users or administrators. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows attackers to execute arbitrary commands as root on the device by exploiting undisclosed diagnostic HTTP endpoints that require only easily accessible authentication information. Such unauthorized access and control over the device could lead to unauthorized data access, manipulation, or disruption of services.
Consequently, this could impact compliance with common standards and regulations such as GDPR and HIPAA, which mandate strict controls over data confidentiality, integrity, and availability. The ability for attackers to gain root access using publicly available device information may result in violations of these regulations due to potential data breaches or unauthorized system control.
Can you explain this vulnerability to me?
Snap One WattBox 800 and 820 series firmware versions prior to 2.10.0.0 have undisclosed diagnostic HTTP endpoints that require only the device MAC address and service tag for authentication.
Both the MAC address and service tag are printed in plaintext on the physical device label, making them easily accessible.
Attackers who obtain these values from the device label or related documentation can authenticate to these endpoints and execute arbitrary commands with root privileges on the device.
How can this vulnerability impact me? :
This vulnerability allows attackers to gain root-level access to affected devices by using easily obtainable authentication information.
With root access, attackers can execute arbitrary commands, potentially leading to full device compromise.
Such compromise could result in unauthorized control, data theft, disruption of device functionality, or use of the device as a foothold for further network attacks.