Impact
EnOcean SmartServer IoT devices running versions 4.60.009 and earlier are vulnerable to an arbitrary OS command injection via crafted LON IP-852 management messages. The flaw allows remote attackers to execute any command on the device, compromising confidentiality, integrity, and availability. The vulnerability is a classic input-to-command injection (CWE-77).
Affected Systems
EnOcean Edge Inc SmartServer IoT devices, specifically those with SmartServer platform versions 4.60.009 or earlier, are affected. The flaw exists in the LON IP‑852 management interface delivered with those firmware releases.
Risk and Exploitability
The CVSS score of 8.1 indicates a high risk, but the EPSS indicates an exploitation probability of less than 1%, reflecting a low likelihood of attacks at present. The flaw is not listed in the CISA KEV catalog. Exploitation requires remote network access to the LON IP‑852 management channel, meaning an attacker must be able to send specially crafted packets to the device. Once accessed, the attacker can run arbitrary commands, giving full control of the device.
OpenCVE Enrichment