The Belkin WeMo Home Automation firmware before 3949 does not properly use the STUN and TURN protocols, which allows remote attackers to hijack connections and possibly have unspecified other impact by leveraging access to a single WeMo device.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf | |
http://www.kb.cert.org/vuls/id/656302 | third party advisory us government resource |