Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-41446

Snap One WattBox 800 and 820 series firmware versions prior to 2.10.0.0 contain undisclosed diagnostic HTTP endpoints that require only the device MAC address and service tag for authentication, both of which are printed in plaintext on the physical device label. Attackers with access to the device label or documentation containing these values can authenticate to the several endpoints and execute arbitrary commands as root on the device.

View on NVD

Analysis

This CVE affects WattBox power distribution units, which are specialized AV and networking hardware. While the vulnerability is critical and allows root access via predictable credentials found on the device label, this equipment is not part of the standard web, mobile, or cloud development stack relevant to the community.

Severity

Score: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-798CWE-912

EPSS

Probability of exploitation (next 30 days): 0.0008 (0.1%)
Percentile: 24.3%
EPSS: 2026-05-06

Technical description

Snap One WattBox 800 and 820 series firmware versions prior to 2.10.0.0 contain undisclosed diagnostic HTTP endpoints that require only the device MAC address and service tag for authentication, both of which are printed in plaintext on the physical device label. Attackers with access to the device label or documentation containing these values can authenticate to the several endpoints and execute arbitrary commands as root on the device.

Published: 4/28/2026, 10:16:49 PM
Last modified: 4/30/2026, 3:48:26 PM

References

HomeEventsBlogResourcesTeam