The peerAddresses API in the Belkin WeMo Home Automation firmware before 3949 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
Link | Resource |
---|---|
http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf | |
http://www.kb.cert.org/vuls/id/656302 | US Government Resource |
http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf | |
http://www.kb.cert.org/vuls/id/656302 | US Government Resource |
Configurations
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf - | |
References | () http://www.kb.cert.org/vuls/id/656302 - US Government Resource |
Information
Published : 2014-02-22 21:55
Updated : 2024-11-21 02:00
NVD link : CVE-2013-6948
Mitre link : CVE-2013-6948
CVE.ORG link : CVE-2013-6948
JSON object : View
Products Affected
belkin
- wemo_home_automation_firmware
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')