CVE-2026-41446
Received Received - Intake
Unauthorized Root Command Execution via Diagnostic HTTP in WattBox Firmware

Publication date: 2026-04-28

Last updated on: 2026-04-29

Assigner: VulnCheck

Description
Snap One WattBox 800 and 820 series firmware versions prior to 2.10.0.0 contain undisclosed diagnostic HTTP endpoints that require only the device MAC address and service tag for authentication, both of which are printed in plaintext on the physical device label. Attackers with access to the device label or documentation containing these values can authenticate to the several endpoints and execute arbitrary commands as root on the device.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-29
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
snap_one wattbox to 2.10.0.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-798 The product contains hard-coded credentials, such as a password or cryptographic key.
CWE-912 The product contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the product's users or administrators.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows attackers to execute arbitrary commands as root on the device by exploiting undisclosed diagnostic HTTP endpoints that require only easily accessible authentication information. Such unauthorized access and control over the device could lead to unauthorized data access, manipulation, or disruption of services.

Consequently, this could impact compliance with common standards and regulations such as GDPR and HIPAA, which mandate strict controls over data confidentiality, integrity, and availability. The ability for attackers to gain root access using publicly available device information may result in violations of these regulations due to potential data breaches or unauthorized system control.


Can you explain this vulnerability to me?

Snap One WattBox 800 and 820 series firmware versions prior to 2.10.0.0 have undisclosed diagnostic HTTP endpoints that require only the device MAC address and service tag for authentication.

Both the MAC address and service tag are printed in plaintext on the physical device label, making them easily accessible.

Attackers who obtain these values from the device label or related documentation can authenticate to these endpoints and execute arbitrary commands with root privileges on the device.


How can this vulnerability impact me? :

This vulnerability allows attackers to gain root-level access to affected devices by using easily obtainable authentication information.

With root access, attackers can execute arbitrary commands, potentially leading to full device compromise.

Such compromise could result in unauthorized control, data theft, disruption of device functionality, or use of the device as a foothold for further network attacks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart