Executive Summary
A critical authentication bypass vulnerability (CVE-2026-41446) has been disclosed in the Snap One WattBox 800 and 820 series power management firmware. Undisclosed diagnostic HTTP endpoints on affected devices require only the device MAC address and service tag for authentication — both of which are printed in plaintext on the physical device label. With a CVSS score of 9.8 (Critical), an attacker with brief physical access to the device (or who can read the label via a photograph) can achieve unauthenticated access to privileged diagnostic functions. Firmware versions prior to 2.10.0.0 are affected.
CVSS Score: 9.8 (Critical)
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Overview
| Attribute | Value |
|---|---|
| CVE ID | CVE-2026-41446 |
| CVSS Score | 9.8 (Critical) |
| Type | Authentication Bypass (CWE-287) |
| Attack Vector | Network |
| Attack Complexity | Low |
| Privileges Required | None |
| User Interaction | None |
| Affected Component | Diagnostic HTTP Endpoints |
| Firmware | WattBox 800/820 prior to 2.10.0.0 |
| Public Exploit | Unknown |
| Published | 2026-04-28 |
Affected Products
| Product | Firmware | Status |
|---|---|---|
| Snap One WattBox 800 series | Prior to 2.10.0.0 | Vulnerable |
| Snap One WattBox 820 series | Prior to 2.10.0.0 | Vulnerable |
WattBox is an IP-controlled power management device widely deployed in commercial AV (audio/visual) installations, smart buildings, conference rooms, and enterprise environments. These devices allow remote power cycling, outlet scheduling, and monitoring of connected equipment. They are commonly integrated with control systems such as Control4, Savant, and Crestron.
Technical Details
Vulnerability Root Cause
Affected WattBox firmware exposes undisclosed diagnostic HTTP endpoints that were likely intended for factory use or technical support. These endpoints bypass the device's standard authentication mechanism and instead accept the device MAC address and service tag as credentials. Both of these values are printed in plaintext on a label affixed to the physical device.
Why This Is Critically Dangerous
The authentication model is fundamentally broken for several reasons:
1. Authentication credentials (MAC + service tag) are permanently
fixed — they cannot be changed or rotated
2. The MAC address is broadcast on the local network and trivially
discoverable via passive network scanning
3. A photograph of the device label — from an installer, a data center
visitor, or a social engineering pretext — is sufficient to authenticate
4. Diagnostic endpoints likely expose sensitive functions:
- Power outlet control (toggle/reset equipment)
- Firmware update mechanisms
- Device configuration export/import
- Network configuration changes
5. In network-accessible deployments, any attacker who can reach the
device's HTTP interface can authenticate with publicly known infoAttack Chain
1. Attacker identifies WattBox 800/820 on the network
(Shodan/ZoomEye for internet-exposed devices, or internal scan)
2. Attacker obtains MAC address via:
- Passive ARP monitoring on the local network
- nmap scan of the device's IP
- DHCP server lease records
- Physical access to read device label
3. Attacker obtains service tag via:
- Physical access to read device label
- Previous installation photos or documentation
- Social engineering of installer/vendor
4. Attacker sends crafted HTTP request to undisclosed diagnostic
endpoint using MAC + service tag as auth credentials
5. Attacker gains privileged access to diagnostic functions:
- Power cycling critical equipment
- Modifying device configuration
- Potentially uploading malicious firmware
6. In severe scenarios: attacker permanently destroys connected equipment
or achieves persistent access to the network via the WattBoxImpact Assessment
| Impact Area | Description |
|---|---|
| Unauthorized Power Control | Remote power cycling of critical connected equipment — servers, network gear, medical devices |
| Configuration Tampering | Modify outlet scheduling, SNMP settings, network configuration |
| Firmware Replacement | Upload malicious firmware if update endpoint is accessible |
| Network Pivoting | Use WattBox as a foothold to access the broader AV/building network |
| Physical Damage | Repeated power cycling can damage connected hardware |
| Business Disruption | Power off critical AV or IT infrastructure in conference rooms, boardrooms, data centers |
WattBox devices are commonly installed in inaccessible locations (ceiling mounts, equipment racks, server closets), making physical remediation difficult. They often connect to high-value equipment, making exploitation highly impactful.
Recommendations
Immediate Actions
- Update firmware to version 2.10.0.0 or later — apply the patch immediately to all WattBox 800 and 820 devices
- Audit network exposure — confirm WattBox management interfaces are not accessible from untrusted network segments
- Inventory all WattBox deployments — identify all affected devices and prioritize patching by exposure level
- Check for unauthorized access — review device logs for unexpected connections to diagnostic endpoints
Network-Level Mitigations (Pre-Patch)
- Firewall the WattBox HTTP management interface (default port 80/443)
to restrict access to authorized management hosts only
- Place WattBox devices on a dedicated IoT/AV VLAN with no
internet-facing exposure and restricted inter-VLAN routing
- Enable port-level ACLs on the switch to limit who can reach the
device's IP address
- Monitor outbound connections from WattBox IP for anomalous traffic
- Alert on unexpected HTTP requests to WattBox management interface
from non-management hostsDetection Indicators
| Indicator | Description |
|---|---|
| HTTP requests to undocumented diagnostic paths | Possible exploitation attempt |
| Power state changes outside scheduled windows | Possible unauthorized outlet control |
| Unexpected firmware version change | Possible malicious firmware upload |
| Configuration export events with no admin session | Possible credential-based unauthorized access |
| ARP entries for new devices on WattBox VLAN | Possible network pivoting post-exploitation |
Example Detection Rule (Suricata)
alert http $HOME_NET any -> $AV_MGMT_NET 80 (
msg:"CVE-2026-41446 WattBox Diagnostic Endpoint Access";
flow:to_server,established;
content:"wattbox";
http_header;
threshold: type both, track by_src, count 3, seconds 60;
classtype:attempted-admin;
sid:9026414;
rev:1;
)Post-Remediation Checklist
- Confirm firmware version 2.10.0.0 or later on all affected devices
- Review power event logs for unauthorized outlet state changes during the exposure window
- Rotate all credentials on equipment connected to the WattBox
- Audit AV control system integrations (Control4, Crestron, Savant) for signs of unauthorized control commands
- Update asset inventory with WattBox firmware versions for ongoing patch tracking
- Verify VLAN segmentation is in place so WattBox devices cannot reach corporate network segments