
CVE-2024-29019 – ESPHome vulnerable to Authentication bypass via Cross site request forgery
https://notcve.org/view.php?id=CVE-2024-29019
21 Mar 2024 — ESPHome is a system to control microcontrollers remotely through Home Automation systems. API endpoints in dashboard component of ESPHome version 2023.12.9 (command line installation) are vulnerable to Cross-Site Request Forgery (CSRF) allowing remote attackers to carry out attacks against a logged user of the dashboard to perform operations on configuration files (create, edit, delete). It is possible for a malicious actor to create a specifically crafted web page that triggers a cross site request against... • https://github.com/advisories/GHSA-9p43-hj5j-96h5 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2024-27287 – ESPHome vulnerable to stored Cross-site Scripting in edit configuration file API
https://notcve.org/view.php?id=CVE-2024-27287
06 Mar 2024 — ESPHome is a system to control your ESP8266/ESP32 for Home Automation systems. Starting in version 2023.12.9 and prior to version 2024.2.2, editing the configuration file API in dashboard component of ESPHome version 2023.12.9 (command line installation and Home Assistant add-on) serves unsanitized data with `Content-Type: text/html; charset=UTF-8`, allowing a remote authenticated user to inject arbitrary web script and exfiltrate session cookies via Cross-Site scripting. It is possible for a malicious auth... • https://github.com/esphome/esphome/commit/37d2b3c7977a4ccbec59726ca7549cb776661455 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-27081 – ESPHome remote code execution via arbitrary file write
https://notcve.org/view.php?id=CVE-2024-27081
26 Feb 2024 — ESPHome is a system to control your ESP8266/ESP32. A security misconfiguration in the edit configuration file API in the dashboard component of ESPHome version 2023.12.9 (command line installation) allows authenticated remote attackers to read and write arbitrary files under the configuration directory rendering remote code execution possible. This vulnerability is patched in 2024.2.1. ESPHome es un sistema para controlar su ESP8266/ESP32. Una mala configuración de seguridad en la API de edición del archivo... • https://github.com/esphome/esphome/commit/d814ed1d4adc71fde47c4df41215bee449884513 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2021-41104 – web_server allows OTA update without checking user defined basic auth username & password
https://notcve.org/view.php?id=CVE-2021-41104
28 Sep 2021 — ESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version 2021.9.1 or older is vulnerable to an issue in which `web_server` allows over-the-air (OTA) updates without checking user defined basic auth username & password. This issue is patched in version 2021.9.2. As a workaround, one may disable or remove `web_server`. ESPHome es un sistema para controlar el ESP8266/ESP32. • https://github.com/esphome/esphome/pull/2409/commits/207cde1667d8c799a197b78ca8a5a14de8d5ca1e • CWE-306: Missing Authentication for Critical Function •