CVE-2025-15111

Ksenia Security lares (legacy model) version 1.6 contains a default credentials vulnerability that allows unauthorized attackers to gain administrative access. Attackers can exploit the weak default administrative credentials to obtain full control of the home automation system.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:kseniasecurity:lares_firmware:1.6:*:*:*:*:*:*:*
cpe:2.3:h:kseniasecurity:lares:4.0:*:*:*:*:*:*:*

History

11 Mar 2026, 20:16

Type Values Removed Values Added
CWE CWE-259

19 Feb 2026, 20:25

Type Values Removed Values Added
Summary (en) Ksenia Security Lares 4.0 Home Automation version 1.6 contains a default credentials vulnerability that allows unauthorized attackers to gain administrative access. Attackers can exploit the weak default administrative credentials to obtain full control of the home automation system. (en) Ksenia Security lares (legacy model) version 1.6 contains a default credentials vulnerability that allows unauthorized attackers to gain administrative access. Attackers can exploit the weak default administrative credentials to obtain full control of the home automation system.
CWE CWE-798

16 Jan 2026, 19:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 9.8
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5927.php - Third Party Advisory, Exploit () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5927.php - Exploit, Third Party Advisory

13 Jan 2026, 21:43

Type Values Removed Values Added
References () https://packetstorm.news/files/id/190180/ - () https://packetstorm.news/files/id/190180/ - Third Party Advisory
References () https://www.kseniasecurity.com/ - () https://www.kseniasecurity.com/ - Product
References () https://www.vulncheck.com/advisories/ksenia-security-lares-home-automation-default-credentials-vulnerability - () https://www.vulncheck.com/advisories/ksenia-security-lares-home-automation-default-credentials-vulnerability - Third Party Advisory
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5927.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5927.php - Third Party Advisory, Exploit
CPE cpe:2.3:o:kseniasecurity:lares_firmware:1.6:*:*:*:*:*:*:*
cpe:2.3:h:kseniasecurity:lares:4.0:*:*:*:*:*:*:*
First Time Kseniasecurity
Kseniasecurity lares
Kseniasecurity lares Firmware

02 Jan 2026, 15:15

Type Values Removed Values Added
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5927.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5927.php -

30 Dec 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-30 23:15

Updated : 2026-03-11 20:16


NVD link : CVE-2025-15111

Mitre link : CVE-2025-15111

CVE.ORG link : CVE-2025-15111


JSON object : View

Products Affected

kseniasecurity

  • lares_firmware
  • lares
CWE
CWE-259

Use of Hard-coded Password