Impact
Undisclosed diagnostic HTTP endpoints in Snap One WattBox 800 and 820 firmware versions before 2.10.0.0 allow authentication using only the device MAC address and service tag—information printed on a physical label. Attackers who can read these values can log in and execute arbitrary commands as root, compromising device confidentiality, integrity, and availability through remote code execution. The weakness corresponds to mismanaged authentication and exposure of privileged credentials.
Affected Systems
Snap One WattBox 800 and Snap One WattBox 820 devices running firmware versions less than 2.10.0.0 are affected.
Risk and Exploitability
The CVSS score of 9.2 indicates critical severity. EPSS is not available and the vulnerability is not yet listed in the CISA KEV catalog. The likely attack vector requires physical or documented access to the device label to obtain the MAC address and service tag; once obtained, the attacker can exploit the endpoints without further credentials, making this risk high for any device in a network without proper segmentation.
OpenCVE Enrichment