Описание
The HomeAutomationGateway service in MiCasaVerde VeraLite with firmware 1.5.408 allows (1) remote attackers to execute arbitrary Lua code via a RunLua action in a request to upnp/control/hag on port 49451 or (2) remote authenticated users to execute arbitrary Lua code via a RunLua action in a request to port_49451/upnp/control/hag.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- Exploit
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:micasaverde:veralite_firmware:1.5.408:*:*:*:*:*:*:*
cpe:2.3:h:micasaverde:veralite:-:*:*:*:*:*:*:*
EPSS
Процентиль: 96%
0.29409
Средний
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-287
Связанные уязвимости
github
почти 4 года назад
The HomeAutomationGateway service in MiCasaVerde VeraLite with firmware 1.5.408 allows (1) remote attackers to execute arbitrary Lua code via a RunLua action in a request to upnp/control/hag on port 49451 or (2) remote authenticated users to execute arbitrary Lua code via a RunLua action in a request to port_49451/upnp/control/hag.
EPSS
Процентиль: 96%
0.29409
Средний
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-287