CVE-2025-15113

Ksenia Security lares (legacy model) Home Automation version 1.6 contains an unprotected endpoint vulnerability that allows authenticated attackers to upload MPFS File System binary images. Attackers can exploit this vulnerability to overwrite flash program memory and potentially execute arbitrary code on the home automation system's web server.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:kseniasecurity:lares_firmware:1.6:*:*:*:*:*:*:*
cpe:2.3:h:kseniasecurity:lares:4.0:*:*:*:*:*:*:*

History

19 Feb 2026, 20:25

Type Values Removed Values Added
CWE CWE-256
Summary (en) Ksenia Security Lares 4.0 Home Automation version 1.6 contains an unprotected endpoint vulnerability that allows authenticated attackers to upload MPFS File System binary images. Attackers can exploit this vulnerability to overwrite flash program memory and potentially execute arbitrary code on the home automation system's web server. (en) Ksenia Security lares (legacy model) Home Automation version 1.6 contains an unprotected endpoint vulnerability that allows authenticated attackers to upload MPFS File System binary images. Attackers can exploit this vulnerability to overwrite flash program memory and potentially execute arbitrary code on the home automation system's web server.

21 Jan 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.4
v2 : unknown
v3 : 9.3

16 Jan 2026, 19:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 8.4

07 Jan 2026, 22:05

Type Values Removed Values Added
References () https://packetstorm.news/files/id/190178/ - () https://packetstorm.news/files/id/190178/ - Third Party Advisory
References () https://www.kseniasecurity.com/ - () https://www.kseniasecurity.com/ - Product
References () https://www.vulncheck.com/advisories/ksenia-security-lares-home-automation-remote-code-execution-via-mpfs-upload - () https://www.vulncheck.com/advisories/ksenia-security-lares-home-automation-remote-code-execution-via-mpfs-upload - Third Party Advisory
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5930.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5930.php - Third Party Advisory
First Time Kseniasecurity
Kseniasecurity lares
Kseniasecurity lares Firmware
CWE CWE-522
CPE cpe:2.3:o:kseniasecurity:lares_firmware:1.6:*:*:*:*:*:*:*
cpe:2.3:h:kseniasecurity:lares:4.0:*:*:*:*:*:*:*

02 Jan 2026, 15:15

Type Values Removed Values Added
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5930.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5930.php -

30 Dec 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-30 23:15

Updated : 2026-02-19 20:25


NVD link : CVE-2025-15113

Mitre link : CVE-2025-15113

CVE.ORG link : CVE-2025-15113


JSON object : View

Products Affected

kseniasecurity

  • lares_firmware
  • lares
CWE
CWE-522

Insufficiently Protected Credentials