Belkin : Security Vulnerabilities, CVEs, Published In February 2014
The Belkin WeMo Home Automation firmware before 3949 has a hardcoded GPG key, which makes it easier for remote attackers to spoof firmware updates and execute arbitrary code via crafted signed data.
Max CVSS
10.0
EPSS Score
1.06%
Published
2014-02-22
Updated
2014-03-06
The Belkin WeMo Home Automation firmware before 3949 does not maintain a set of Certification Authority public keys, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary X.509 certificate.
Max CVSS
7.1
EPSS Score
0.06%
Published
2014-02-22
Updated
2014-02-24
The Belkin WeMo Home Automation firmware before 3949 does not use SSL for the distribution feed, which allows man-in-the-middle attackers to install arbitrary firmware by spoofing a distribution server.
Max CVSS
7.8
EPSS Score
0.10%
Published
2014-02-22
Updated
2014-03-06
The Belkin WeMo Home Automation firmware before 3949 does not properly use the STUN and TURN protocols, which allows remote attackers to hijack connections and possibly have unspecified other impact by leveraging access to a single WeMo device.
Max CVSS
9.3
EPSS Score
0.73%
Published
2014-02-22
Updated
2014-03-06
The peerAddresses API in the Belkin WeMo Home Automation firmware before 3949 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Max CVSS
7.8
EPSS Score
0.28%
Published
2014-02-22
Updated
2014-03-06
5 vulnerabilities found