Description
Snap One WattBox 800 and 820 series firmware versions prior to 2.10.0.0 contain undisclosed diagnostic HTTP endpoints that require only the device MAC address and service tag for authentication, both of which are printed in plaintext on the physical device label. Attackers with access to the device label or documentation containing these values can authenticate to the several endpoints and execute arbitrary commands as root on the device.
Published: 2026-04-28
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Undisclosed diagnostic HTTP endpoints in Snap One WattBox 800 and 820 firmware versions before 2.10.0.0 allow authentication using only the device MAC address and service tag—information printed on a physical label. Attackers who can read these values can log in and execute arbitrary commands as root, compromising device confidentiality, integrity, and availability through remote code execution. The weakness corresponds to mismanaged authentication and exposure of privileged credentials.

Affected Systems

Snap One WattBox 800 and Snap One WattBox 820 devices running firmware versions less than 2.10.0.0 are affected.

Risk and Exploitability

The CVSS score of 9.2 indicates critical severity. EPSS is not available and the vulnerability is not yet listed in the CISA KEV catalog. The likely attack vector requires physical or documented access to the device label to obtain the MAC address and service tag; once obtained, the attacker can exploit the endpoints without further credentials, making this risk high for any device in a network without proper segmentation.

Generated by OpenCVE AI on April 29, 2026 at 01:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update all affected WattBox 800 and WattBox 820 devices to firmware version 2.10.0.0 or later.
  • Block external access to the diagnostic HTTP endpoints by configuring firewall or ACL rules to limit traffic to trusted management IP ranges.
  • Remove or obfuscate the printed MAC address and service tag on the device label to reduce the ease of credential acquisition.

Generated by OpenCVE AI on April 29, 2026 at 01:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 29 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Snapone
Snapone wattbox 800
Snapone wattbox 820
Vendors & Products Snapone
Snapone wattbox 800
Snapone wattbox 820

Tue, 28 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Description Snap One WattBox 800 and 820 series firmware versions prior to 2.10.0.0 contain undisclosed diagnostic HTTP endpoints that require only the device MAC address and service tag for authentication, both of which are printed in plaintext on the physical device label. Attackers with access to the device label or documentation containing these values can authenticate to the several endpoints and execute arbitrary commands as root on the device.
Title WattBox 800 & 820 Series < 2.10.0.0 RCE via Diagnostic Endpoints
Weaknesses CWE-798
CWE-912
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Snapone Wattbox 800 Wattbox 820
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-29T15:10:09.331Z

Reserved: 2026-04-20T16:07:47.308Z

Link: CVE-2026-41446

cve-icon Vulnrichment

Updated: 2026-04-29T15:09:07.586Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-28T22:16:49.623

Modified: 2026-04-30T15:48:26.580

Link: CVE-2026-41446

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T10:10:20Z

Weaknesses