Ksenia Security Lares 4.0 Home Automation URL Redirection
Title: Ksenia Security Lares 4.0 Home Automation URL Redirection
Advisory ID: ZSL-2025-5928
Type: Local/Remote
Impact: Spoofing
Risk: (3/5)
Release Date: 31.03.2025
Webserver version 1.0.0.15
[27.09.2024] Vendor contacted.
[30.03.2025] No response from the vendor.
[31.03.2025] Public security advisory released.
Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2025-5928
Type: Local/Remote
Impact: Spoofing
Risk: (3/5)
Release Date: 31.03.2025
Summary
Lares is a burglar alarm & home automation system that can be controlled by means of an ergo LCD keyboard, as well as remotely by telephone, and even via the Internet through a built-in WEB server.Description
Input passed via the 'redirectPage' GET parameter in 'cmdOk.xml' script is not properly verified before being used to redirect users. This can be exploited to redirect an authenticating user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.Vendor
Ksenia Security S.p.A. - https://www.kseniasecurity.comAffected Version
Firmware version 1.6Webserver version 1.0.0.15
Tested On
Ksenia Lares WebserverVendor Status
[03.07.2024] Vulnerability discovered.[27.09.2024] Vendor contacted.
[30.03.2025] No response from the vendor.
[31.03.2025] Public security advisory released.
PoC
ksenia_redir.txtCredits
Vulnerability discovered by Mencha Isajlovska - <shadelock@zeroscience.mk>References
N/AChangelog
[31.03.2025] - Initial releaseContact
Zero Science LabWeb: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk