Vulnerability Description
The HomeAutomationGateway service in MiCasaVerde VeraLite with firmware 1.5.408 allows (1) remote attackers to execute arbitrary Lua code via a RunLua action in a request to upnp/control/hag on port 49451 or (2) remote authenticated users to execute arbitrary Lua code via a RunLua action in a request to port_49451/upnp/control/hag.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Micasaverde | Veralite Firmware | 1.5.408 |
| Micasaverde | Veralite | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-TraversExploitThird Party AdvisoryVDB Entry
- http://www.exploit-db.com/exploits/27286ExploitThird Party AdvisoryVDB Entry
- https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txtExploit
- http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-TraversExploitThird Party AdvisoryVDB Entry
- http://www.exploit-db.com/exploits/27286ExploitThird Party AdvisoryVDB Entry
- https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txtExploit
FAQ
What is CVE-2013-4863?
CVE-2013-4863 is a vulnerability with a CVSS score of 8.8 (HIGH). The HomeAutomationGateway service in MiCasaVerde VeraLite with firmware 1.5.408 allows (1) remote attackers to execute arbitrary Lua code via a RunLua action in a request to upnp/control/hag on port 4...
How severe is CVE-2013-4863?
CVE-2013-4863 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4863?
Check the references section above for vendor advisories and patch information. Affected products include: Micasaverde Veralite Firmware, Micasaverde Veralite.