The HomeAutomationGateway service in MiCasaVerde VeraLite with firmware 1.5.408 allows (1) remote attackers to execute arbitrary Lua code via a RunLua action in a request to upnp/control/hag on port 49451 or (2) remote authenticated users to execute arbitrary Lua code via a RunLua action in a request to port_49451/upnp/control/hag.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.exploit-db.com/exploits/27286 | Exploit Third Party Advisory VDB Entry | 
| http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html | Exploit Third Party Advisory VDB Entry | 
| https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt | Exploit | 
Configurations
                    Configuration 1 (hide)
| AND | 
                                
                                
 
  | 
                        
Information
                Published : 2020-01-28 09:15
Updated : 2020-02-04 08:23
NVD link : CVE-2013-4863
Mitre link : CVE-2013-4863
JSON object : View
CWE
                
                    
                        
                        CWE-287
                        
            Improper Authentication
Products Affected
                micasaverde
- veralite
 - veralite_firmware
 


