Vulnerability Note VU#796883

HomeSeer HS2 web interface multiple vulnerabilities

Original Release date: 08 Dec 2011 | Last revised: 12 Jan 2012


HomeSeer HS2 home automation software web interface contains multiple vulnerabilities.


According to HomeSeer's website, "HomeSeer HS2 is an advanced home automation and remote access software package that is designed to integrate the major systems of any home". The HomeSeer HS2 home automation software webserver contains multiple vulnerabilities. HomeSeer HS2, and possibly prior versions, includes a web interface which contains a directory traversal vulnerability which could allow an attacker to access files outside of the web directory. In addition the HomeSeer HS2 web interface is vulnerable to a stored and reflective cross site scripting (XSS) vulnerability. An attacker can request a web page such as http://ipaddress/example<script>alert(document.cookie)</script>, causing the JavaScript to be stored in the log viewer page. The next time an administrator or user within the web application views the logfile (http://ipaddress/elog), the JavaScript will be executed in their browser session. The HomeSeer HS2 web interface is also vulnerable to cross-site request forgery (CSRF) attacks with within the /ctrl URL. A successful CSRF attack against an admin user will allow a remote attacker to run commands as the admin user, including remotely launching known executable files on the system.


An attacker with access to the HomeSeer HS2 web interface can conduct a cross site scripting attack, which could be used to result in information leakage, privilege escalation, and/or denial of service. In addition an attacker with network access to the HomeSeer HS2 web server may also be able to run system commands, inject arbitrary data, or download arbitrary files.


This has been reported to be addressed in HomeSeer HS2 or later.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS or CSRF attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing a HomeSeer HS2 using stolen credentials from a blocked network location.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
HomeSeerAffected07 Nov 201112 Jan 2012
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Silent Dream for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

  • CVE IDs: Unknown
  • Date Public: 08 Dec 2011
  • Date First Published: 08 Dec 2011
  • Date Last Updated: 12 Jan 2012
  • Severity Metric: 0.11
  • Document Revision: 9


If you have feedback, comments, or additional information about this vulnerability, please send us email.