Vulnerabilities > Micasaverde
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-01-28 | CVE-2013-4865 | Cross-Site Request Forgery (CSRF) vulnerability in Micasaverde Veralite Firmware 1.5.408 Cross-site request forgery (CSRF) vulnerability in upgrade_step2.sh in MiCasaVerde VeraLite with firmware 1.5.408 allows remote attackers to hijack the authentication of users for requests that install arbitrary firmware via the squashfs parameter. | 6.5 |
2020-01-28 | CVE-2013-4864 | Server-Side Request Forgery (SSRF) vulnerability in Micasaverde Veralite Firmware 1.5.408 MiCasaVerde VeraLite with firmware 1.5.408 allows remote attackers to send HTTP requests to intranet servers via the url parameter to cgi-bin/cmh/proxy.sh, related to a Server-Side Request Forgery (SSRF) issue. | 9.8 |
2020-01-28 | CVE-2013-4863 | Improper Authentication vulnerability in Micasaverde Veralite Firmware 1.5.408 The HomeAutomationGateway service in MiCasaVerde VeraLite with firmware 1.5.408 allows (1) remote attackers to execute arbitrary Lua code via a RunLua action in a request to upnp/control/hag on port 49451 or (2) remote authenticated users to execute arbitrary Lua code via a RunLua action in a request to port_49451/upnp/control/hag. | 8.8 |
2020-01-28 | CVE-2013-4862 | Incorrect Authorization vulnerability in Micasaverde Veralite Firmware 1.5.408 MiCasaVerde VeraLite with firmware 1.5.408 does not properly restrict access, which allows remote authenticated users to (1) update the firmware via the squashfs parameter to upgrade_step2.sh or (2) obtain hashed passwords via the cgi-bin/cmh/backup.sh page. | 8.1 |
2020-01-28 | CVE-2013-4861 | Path Traversal vulnerability in Micasaverde Veralite Firmware 1.5.408 Directory traversal vulnerability in cgi-bin/cmh/get_file.sh in MiCasaVerde VeraLite with firmware 1.5.408 allows remote authenticated users to read arbirary files via a .. | 6.5 |