The UPnP HTTP server on Sonos wireless speaker products allow unauthorized access via a DNS rebinding attack. This can result in remote device control and privileged device and network information to be exfiltrated by an attacker.
References
Link | Resource |
---|---|
https://medium.com/%40brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325 | |
https://www.wired.com/story/chromecast-roku-sonos-dns-rebinding-vulnerability | Press/Media Coverage Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2018-07-03 16:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-11316
Mitre link : CVE-2018-11316
CVE.ORG link : CVE-2018-11316
JSON object : View
Products Affected
sonos
- sonos
- sonos_firmware
CWE
CWE-20
Improper Input Validation