Ksenia Security lares (legacy model) Home Automation version 1.6 contains an unprotected endpoint vulnerability that allows authenticated attackers to upload MPFS File System binary images. Attackers can exploit this vulnerability to overwrite flash program memory and potentially execute arbitrary code on the home automation system's web server.
References
| Link | Resource |
|---|---|
| https://packetstorm.news/files/id/190178/ | Third Party Advisory |
| https://www.kseniasecurity.com/ | Product |
| https://www.vulncheck.com/advisories/ksenia-security-lares-home-automation-remote-code-execution-via-mpfs-upload | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5930.php | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5930.php | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
19 Feb 2026, 20:25
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | ||
| Summary | (en) Ksenia Security lares (legacy model) Home Automation version 1.6 contains an unprotected endpoint vulnerability that allows authenticated attackers to upload MPFS File System binary images. Attackers can exploit this vulnerability to overwrite flash program memory and potentially execute arbitrary code on the home automation system's web server. |
21 Jan 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.3 |
16 Jan 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.4 |
07 Jan 2026, 22:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://packetstorm.news/files/id/190178/ - Third Party Advisory | |
| References | () https://www.kseniasecurity.com/ - Product | |
| References | () https://www.vulncheck.com/advisories/ksenia-security-lares-home-automation-remote-code-execution-via-mpfs-upload - Third Party Advisory | |
| References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5930.php - Third Party Advisory | |
| First Time |
Kseniasecurity
Kseniasecurity lares Kseniasecurity lares Firmware |
|
| CWE | CWE-522 | |
| CPE | cpe:2.3:o:kseniasecurity:lares_firmware:1.6:*:*:*:*:*:*:* cpe:2.3:h:kseniasecurity:lares:4.0:*:*:*:*:*:*:* |
02 Jan 2026, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5930.php - |
30 Dec 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-30 23:15
Updated : 2026-02-19 20:25
NVD link : CVE-2025-15113
Mitre link : CVE-2025-15113
CVE.ORG link : CVE-2025-15113
JSON object : View
Products Affected
kseniasecurity
- lares_firmware
- lares
CWE
CWE-522
Insufficiently Protected Credentials
