An authenticated attacker is able to use the Plugin Manager of the web interface of the Wattsense Bridge devices to upload malicious Python files to the device. This enables an attacker to gain remote root access to the device. An attacker needs a valid user account on the Wattsense web interface to be able to conduct this attack. This issue is fixed in recent firmware versions BSP >= 6.1.0.
History

Tue, 18 Feb 2025 18:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 11 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 11 Feb 2025 09:30:00 +0000

Type Values Removed Values Added
Description An authenticated attacker is able to use the Plugin Manager of the web interface of the Wattsense Bridge devices to upload malicious Python files to the device. This enables an attacker to gain remote root access to the device. An attacker needs a valid user account on the Wattsense web interface to be able to conduct this attack. This issue is fixed in recent firmware versions BSP >= 6.1.0.
Title Authenticated Arbitrary Python File Upload via Plugin Manager
Weaknesses CWE-434
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-02-18T17:50:07.266Z

Reserved: 2025-02-10T07:48:38.352Z

Link: CVE-2025-26411

cve-icon Vulnrichment

Updated: 2025-02-11T14:34:26.418Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-02-11T10:15:09.973

Modified: 2025-02-18T18:15:36.473

Link: CVE-2025-26411

cve-icon Redhat

No data.