9
CVSSv2

CVE-2013-4863

Published: 28/01/2020 Updated: 04/02/2020
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 910
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

The HomeAutomationGateway service in MiCasaVerde VeraLite with firmware 1.5.408 allows (1) remote malicious users to execute arbitrary Lua code via a RunLua action in a request to upnp/control/hag on port 49451 or (2) remote authenticated users to execute arbitrary Lua code via a RunLua action in a request to port_49451/upnp/control/hag.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

micasaverde veralite_firmware 1.5.408

Exploits

# Exploit Title: MiCasa VeraLite Remote Code Execution # Date: 10-20-2016 # Software Link: getveracom/controllers/veralite/ # Exploit Author: Jacob Baines # Contact: twittercom/Junior_Baines # CVE: CVE-2013-4863 & CVE-2016-6255 # Platform: Hardware 1 Description A remote attacker can execute code on the MiCasa VeraLite if so ...
Trustwave SpiderLabs Security Advisory TWSL2013-019: Multiple Vulnerabilities in MiCasaVerde VeraLite Published: 08/01/13 Version: 10 Vendor: MiCasaVerde (wwwmicasaverdecom/) Product: VeraLite Version affected: 15408 Product description: The MiCasaVerde VeraLite is the budget model from MiCasaVerde, a product which centralizes contr ...
MiCasaVerde VeraLite version 15408 suffers from path traversal, insufficient authorization checks, and cross site request forgery vulnerabilities ...
MiCasa VeraLite suffers from a remote code execution vulnerability ...

Github Repositories

A proof of concept exploit against the Veralite

runluahtml Overview runluahtml, when loaded in a browser, will attempt to get a reverse shell on a VeraLite device on the client's network This is achieved using a combination of CVE-2013-4863, CVE-2016-6255, and WebRTC IP leak The full attack follows these steps: Acquire the client's internal IP address using webrtc We then assume the client is operating on a /