The Belkin WeMo Home Automation firmware before 3949 does not properly use the STUN and TURN protocols, which allows remote attackers to hijack connections and possibly have unspecified other impact by leveraging access to a single WeMo device.
References
Link | Resource |
---|---|
http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf | |
http://www.kb.cert.org/vuls/id/656302 | US Government Resource |
http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf | |
http://www.kb.cert.org/vuls/id/656302 | US Government Resource |
Configurations
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf - | |
References | () http://www.kb.cert.org/vuls/id/656302 - US Government Resource |
Information
Published : 2014-02-22 21:55
Updated : 2024-11-21 02:00
NVD link : CVE-2013-6949
Mitre link : CVE-2013-6949
CVE.ORG link : CVE-2013-6949
JSON object : View
Products Affected
belkin
- wemo_home_automation_firmware
CWE
CWE-264
Permissions, Privileges, and Access Controls