Security
Headlines
HeadlinesLatestCVEs

Headline

Ksenia Security Lares 4.0 Home Automation URL Redirection

Input passed via the ‘redirectPage’ GET parameter in ‘cmdOk.xml’ script is not properly verified before being used to redirect users. This can be exploited to redirect an authenticating user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

Zero Science Lab
#vulnerability#web#perl#auth

Title: Ksenia Security Lares 4.0 Home Automation URL Redirection
Advisory ID: ZSL-2025-5928
Type: Local/Remote
Impact: Spoofing
Risk: (3/5)
Release Date: 31.03.2025

Summary

Lares is a burglar alarm & home automation system that can be controlled by means of an ergo LCD keyboard, as well as remotely by telephone, and even via the Internet through a built-in WEB server.

Description

Input passed via the ‘redirectPage’ GET parameter in ‘cmdOk.xml’ script is not properly verified before being used to redirect users. This can be exploited to redirect an authenticating user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

Vendor

Ksenia Security S.p.A. - https://www.kseniasecurity.com

Affected Version

Firmware version 1.6
Webserver version 1.0.0.15

Tested On

Ksenia Lares Webserver

Vendor Status

[03.07.2024] Vulnerability discovered.
[27.09.2024] Vendor contacted.
[30.03.2025] No response from the vendor.
[31.03.2025] Public security advisory released.

PoC

ksenia_redir.txt

Credits

Vulnerability discovered by Mencha Isajlovska - <[email protected]>

References

[1] https://packetstorm.news/files/id/190179/

Changelog

[31.03.2025] - Initial release
[03.04.2025] - Added reference [1]

Contact

Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: [email protected]

Zero Science Lab: Latest News

ABB Cylon Aspect 3.08.04 (DeploySource) Unauthenticated Remote Code Execution