CVE-2013-4862

MiCasaVerde VeraLite with firmware 1.5.408 does not properly restrict access, which allows remote authenticated users to (1) update the firmware via the squashfs parameter to upgrade_step2.sh or (2) obtain hashed passwords via the cgi-bin/cmh/backup.sh page.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:micasaverde:veralite_firmware:1.5.408:*:*:*:*:*:*:*
cpe:2.3:h:micasaverde:veralite:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:56

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.exploit-db.com/exploits/27286 - Exploit, Third Party Advisory, VDB Entry () http://www.exploit-db.com/exploits/27286 - Exploit, Third Party Advisory, VDB Entry
References () https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt - Exploit () https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt - Exploit

Information

Published : 2020-01-28 17:15

Updated : 2024-11-21 01:56


NVD link : CVE-2013-4862

Mitre link : CVE-2013-4862

CVE.ORG link : CVE-2013-4862


JSON object : View

Products Affected

micasaverde

  • veralite_firmware
  • veralite
CWE
CWE-863

Incorrect Authorization