Vulnerabilities (CVE)

Filtered by vendor Homeautomation Project Subscribe
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-22000 1 Homeautomation Project 1 Homeautomation 2024-02-04 8.5 HIGH 8.0 HIGH
HomeAutomation 3.3.2 suffers from an authenticated OS command execution vulnerability using custom command v0.1 plugin. This can be exploited with a CSRF vulnerability to execute arbitrary shell commands as the web user via the 'set_command_on' and 'set_command_off' POST parameters in '/system/systemplugins/customcommand/customcommand.plugin.php' by using an unsanitized PHP exec() function.
CVE-2020-21989 1 Homeautomation Project 1 Homeautomation 2024-02-04 6.8 MEDIUM 8.8 HIGH
HomeAutomation 3.3.2 is affected by Cross Site Request Forgery (CSRF). The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
CVE-2020-21998 1 Homeautomation Project 1 Homeautomation 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
In HomeAutomation 3.3.2 input passed via the 'redirect' GET parameter in 'api.php' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.
CVE-2020-21987 1 Homeautomation Project 1 Homeautomation 2024-02-04 4.3 MEDIUM 6.1 MEDIUM
HomeAutomation 3.3.2 is affected by persistent Cross Site Scripting (XSS). XSS vulnerabilities occur when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session.
CVE-2020-22001 1 Homeautomation Project 1 Homeautomation 2024-02-04 7.5 HIGH 9.8 CRITICAL
HomeAutomation 3.3.2 suffers from an authentication bypass vulnerability when spoofing client IP address using the X-Forwarded-For header with the local (loopback) IP address value allowing remote control of the smart home solution.