First published: Tue Jan 28 2020(Updated: )
The HomeAutomationGateway service in MiCasaVerde VeraLite with firmware 1.5.408 allows (1) remote attackers to execute arbitrary Lua code via a RunLua action in a request to upnp/control/hag on port 49451 or (2) remote authenticated users to execute arbitrary Lua code via a RunLua action in a request to port_49451/upnp/control/hag.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VeraLite Firmware | =1.5.408 | |
Micasaverde VeraLite Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2013-4863.
CVE-2013-4863 has a severity rating of 8.8, which is considered critical.
CVE-2013-4863 allows remote attackers to execute arbitrary Lua code through a RunLua action in a request to upnp/control/hag on port 49451.
Remote authenticated users can exploit CVE-2013-4863 by executing arbitrary Lua code through a RunLua action in a request.
No, MiCasaVerde VeraLite is not vulnerable to CVE-2013-4863.