Lucene search

K
BelkinWemo Home Automation Firmware

5 matches found

CVE
CVE
added 2014/02/22 9:55 p.m.39 views

CVE-2013-6949

The Belkin WeMo Home Automation firmware before 3949 does not properly use the STUN and TURN protocols, which allows remote attackers to hijack connections and possibly have unspecified other impact by leveraging access to a single WeMo device.

9.3CVSS7.5AI score0.00615EPSS
CVE
CVE
added 2014/02/22 9:55 p.m.39 views

CVE-2013-6950

The Belkin WeMo Home Automation firmware before 3949 does not use SSL for the distribution feed, which allows man-in-the-middle attackers to install arbitrary firmware by spoofing a distribution server.

7.8CVSS6.8AI score0.00308EPSS
CVE
CVE
added 2014/02/22 9:55 p.m.38 views

CVE-2013-6951

The Belkin WeMo Home Automation firmware before 3949 does not maintain a set of Certification Authority public keys, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary X.509 certificate.

7.1CVSS6.8AI score0.00181EPSS
CVE
CVE
added 2014/02/22 9:55 p.m.38 views

CVE-2013-6952

The Belkin WeMo Home Automation firmware before 3949 has a hardcoded GPG key, which makes it easier for remote attackers to spoof firmware updates and execute arbitrary code via crafted signed data.

10CVSS7.8AI score0.04637EPSS
CVE
CVE
added 2014/02/22 9:55 p.m.32 views

CVE-2013-6948

The peerAddresses API in the Belkin WeMo Home Automation firmware before 3949 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

7.8CVSS7AI score0.00449EPSS