MiCasaVerde VeraLite with firmware 1.5.408 does not properly restrict access, which allows remote authenticated users to (1) update the firmware via the squashfs parameter to upgrade_step2.sh or (2) obtain hashed passwords via the cgi-bin/cmh/backup.sh page.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.exploit-db.com/exploits/27286 | Exploit Third Party Advisory VDB Entry | 
| http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html | Exploit Third Party Advisory VDB Entry | 
| https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt | Exploit | 
Configurations
                    Configuration 1 (hide)
| AND | 
                                
                                
 
  | 
                        
Information
                Published : 2020-01-28 09:15
Updated : 2020-02-04 08:32
NVD link : CVE-2013-4862
Mitre link : CVE-2013-4862
JSON object : View
CWE
                
                    
                        
                        CWE-863
                        
            Incorrect Authorization
Products Affected
                micasaverde
- veralite
 - veralite_firmware
 


