TROYANOSYVIRUS
Back to CVEs

CVE-2018-11682

CRITICAL
9.8

Description

Default and unremovable support credentials allow attackers to gain total super user control of an IoT device through a TELNET session to products using the Stanza Lutron integration protocol Revision M to Revision Y. NOTE: The vendor disputes this id as not being a vulnerability because what can be done through the ports revolve around controlling lighting, not code execution. A certain set of commands are listed, which bear some similarity to code, but they are not arbitrary and do not allow admin-level control of a machine

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published6/2/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

lutron:homeworks_qslutron:homeworks_qs_firmwarelutron:radiora_2lutron:radiora_2_firmwarelutron:stanzalutron:stanza_firmware

Weaknesses (CWE)

CWE-798CWE-798

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.