The UPnP HTTP server on Sonos wireless speaker products allow unauthorized access via a DNS rebinding attack. This can result in remote device control and privileged device and network information to be exfiltrated by an attacker.
References
Link | Resource |
---|---|
https://medium.com/%40brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325 | |
https://www.wired.com/story/chromecast-roku-sonos-dns-rebinding-vulnerability | Press/Media Coverage Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
07 Nov 2023, 02:51
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-07-03 16:29
Updated : 2024-02-28 16:25
NVD link : CVE-2018-11316
Mitre link : CVE-2018-11316
CVE.ORG link : CVE-2018-11316
JSON object : View
Products Affected
sonos
- sonos
- sonos_firmware
CWE
CWE-20
Improper Input Validation