CVE-2013-0108
Honeywell Enterprise Buildings Integrator - Code Injection
Title source: ruleDescription
An ActiveX control in HscRemoteDeploy.dll in Honeywell Enterprise Buildings Integrator (EBI) R310, R400.2, R410.1, and R410.2; SymmetrE R310, R410.1, and R410.2; ComfortPoint Open Manager (aka CPO-M) Station R100; and HMIWeb Browser client packages allows remote attackers to execute arbitrary code via a crafted HTML document.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/24745
metasploit
WORKING POC
EXCELLENT
by juan vazquez · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/honeywell_hscremotedeploy_exec.rb
Scores
EPSS
0.6143
EPSS Percentile
98.3%
Details
CWE
CWE-94
Status
published
Products (8)
honeywell/comfortpoint_open_manager_station
r100
honeywell/enterprise_buildings_integrator
r310
honeywell/enterprise_buildings_integrator
r400.2
honeywell/enterprise_buildings_integrator
r410.1
honeywell/enterprise_buildings_integrator
r410.2
honeywell/symmetre
r310
honeywell/symmetre
r400.2
honeywell/symmetre
r410.1
Published
Feb 24, 2013
Tracked Since
Feb 18, 2026