Description
An authenticated attacker is able to use the Plugin Manager of the web interface of the Wattsense Bridge devices to upload malicious Python files to the device. This enables an attacker to gain remote root access to the device. An attacker needs a valid user account on the Wattsense web interface to be able to conduct this attack. This issue is fixed in recent firmware versions BSP >= 6.1.0.
References (3)
Core 3
Core References
Mailing List
http://seclists.org/fulldisclosure/2025/Feb/9
Various Sources third-party-advisory
https://r.sec-consult.com/wattsense
Various Sources release-notes
https://support.wattsense.com/hc/en-150/articles/13366066529437-Release-Notes
Scores
CVSS v3
8.8
EPSS
0.0027
EPSS Percentile
50.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-434
Status
published
Products (1)
Wattsense/Wattsense Bridge
< 6.1.0
Published
Feb 11, 2025
Tracked Since
Feb 18, 2026