CVE-2013-4861
- EPSS 14.56%
- Veröffentlicht 28.01.2020 17:15:11
- Zuletzt bearbeitet 21.11.2024 01:56:35
Directory traversal vulnerability in cgi-bin/cmh/get_file.sh in MiCasaVerde VeraLite with firmware 1.5.408 allows remote authenticated users to read arbirary files via a .. (dot dot) in the filename parameter.
CVE-2013-4862
- EPSS 7.94%
- Veröffentlicht 28.01.2020 17:15:11
- Zuletzt bearbeitet 21.11.2024 01:56:35
MiCasaVerde VeraLite with firmware 1.5.408 does not properly restrict access, which allows remote authenticated users to (1) update the firmware via the squashfs parameter to upgrade_step2.sh or (2) obtain hashed passwords via the cgi-bin/cmh/backup....
- EPSS 29.41%
- Veröffentlicht 28.01.2020 17:15:11
- Zuletzt bearbeitet 21.11.2024 01:56:35
The HomeAutomationGateway service in MiCasaVerde VeraLite with firmware 1.5.408 allows (1) remote attackers to execute arbitrary Lua code via a RunLua action in a request to upnp/control/hag on port 49451 or (2) remote authenticated users to execute ...
CVE-2013-4864
- EPSS 30.46%
- Veröffentlicht 28.01.2020 17:15:11
- Zuletzt bearbeitet 21.11.2024 01:56:35
MiCasaVerde VeraLite with firmware 1.5.408 allows remote attackers to send HTTP requests to intranet servers via the url parameter to cgi-bin/cmh/proxy.sh, related to a Server-Side Request Forgery (SSRF) issue.
CVE-2013-4865
- EPSS 0.16%
- Veröffentlicht 28.01.2020 17:15:11
- Zuletzt bearbeitet 21.11.2024 01:56:35
Cross-site request forgery (CSRF) vulnerability in upgrade_step2.sh in MiCasaVerde VeraLite with firmware 1.5.408 allows remote attackers to hijack the authentication of users for requests that install arbitrary firmware via the squashfs parameter.