{"uuid": "660e4b04-dae6-438e-ae8a-ca2c5bcb0cf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41104", "type": "seen", "source": "https://t.me/cibsecurity/29588", "content": "\u203c CVE-2021-41104 \u203c\n\nESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version 2021.9.1 or older is vulnerable to an issue in which `web_server` allows over-the-air (OTA) updates without checking user defined basic auth username &amp; password. This issue is patched in version 2021.9.2. As a workaround, one may disable or remove `web_server`.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-28T20:36:14.000000Z"}