vendor:
SmartLiving SmartLAN/G/SI
by:
LiquidWorm
4.4
CVSS
MEDIUM
Server-Side Request Forgery
918
CWE
Product Name: SmartLiving SmartLAN/G/SI
Affected Version From: <=6.x
Affected Version To: <=6.x
Patch Exists: Yes
Related CWE: CVE-2019-19072
CPE: h:inim_electronics:smartliving_smartlan_g_si
Metasploit:
https://www.rapid7.com/db/vulnerabilities/debian-cve-2019-19072/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2019-19072/, https://www.rapid7.com/db/vulnerabilities/alma_linux-cve-2019-19072/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2019-19072/, https://www.rapid7.com/db/vulnerabilities/redhat-openshift-cve-2019-19072/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp8-cve-2019-19072/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2019-19072/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2019-19072/
Other Scripts:
N/A
Platforms Tested: None
2019
Inim Electronics Smartliving SmartLAN 6.x – Unauthenticated Server-Side Request Forgery
A Server-Side Request Forgery (SSRF) vulnerability exists in the SmartLiving SmartLAN/G/SI <=6.x devices. An unauthenticated attacker can send a specially crafted request to the vulnerable device, which can be used to access internal resources or to perform malicious activities.
Mitigation:
Upgrade to the latest version of the SmartLiving SmartLAN/G/SI device.