Filtered by vendor Homeautomation Project
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-22000 | 1 Homeautomation Project | 1 Homeautomation | 2024-02-04 | 8.5 HIGH | 8.0 HIGH |
HomeAutomation 3.3.2 suffers from an authenticated OS command execution vulnerability using custom command v0.1 plugin. This can be exploited with a CSRF vulnerability to execute arbitrary shell commands as the web user via the 'set_command_on' and 'set_command_off' POST parameters in '/system/systemplugins/customcommand/customcommand.plugin.php' by using an unsanitized PHP exec() function. | |||||
CVE-2020-21989 | 1 Homeautomation Project | 1 Homeautomation | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
HomeAutomation 3.3.2 is affected by Cross Site Request Forgery (CSRF). The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. | |||||
CVE-2020-21998 | 1 Homeautomation Project | 1 Homeautomation | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
In HomeAutomation 3.3.2 input passed via the 'redirect' GET parameter in 'api.php' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain. | |||||
CVE-2020-21987 | 1 Homeautomation Project | 1 Homeautomation | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
HomeAutomation 3.3.2 is affected by persistent Cross Site Scripting (XSS). XSS vulnerabilities occur when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session. | |||||
CVE-2020-22001 | 1 Homeautomation Project | 1 Homeautomation | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
HomeAutomation 3.3.2 suffers from an authentication bypass vulnerability when spoofing client IP address using the X-Forwarded-For header with the local (loopback) IP address value allowing remote control of the smart home solution. |