CVE-2025-15113
Unprotected Endpoint in Ksenia Lares 4.0 Enables Code Execution
Publication date: 2025-12-30
Last updated on: 2026-03-11
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ksenia_security | lares | 4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-256 | The product stores a password in plaintext within resources such as memory or files. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Ksenia Security Lares 4.0 Home Automation version 1.6 and involves an unprotected endpoint that allows authenticated attackers to upload MPFS File System binary images. By exploiting this, attackers can overwrite the flash program memory and potentially execute arbitrary code on the system's web server.
How can this vulnerability impact me? :
The vulnerability can allow an attacker with authentication to overwrite the device's flash memory and execute arbitrary code on the home automation system's web server. This could lead to unauthorized control, disruption of service, or compromise of the home automation system.