vendor:
VeraLite
by:
Jacob Baines
8,8
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: VeraLite
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE: CVE-2013-4863 & CVE-2016-6255
CPE: h:micasa:veralite
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Hardware
2016
MiCasa VeraLite Remote Code Execution
A remote attacker can execute code on the MiCasa VeraLite if someone on the same LAN as the VeraLite visits a crafted webpage. This is achieved by acquiring the client's internal IP address using webrtc, POSTing :49451/z3n.html to every address on the subnet, attempting to load :49451/z3n.html in an iframe, and executing a reverse shell to 192.168.217:1270.
Mitigation:
Ensure that the MiCasa VeraLite is not accessible from the public internet, and that only trusted users have access to the local network.