VARIoT IoT exploits database
| VAR-E-201711-0161 |
CVE-2017-16819 |
Icon Time Systems RTC-1000 Firmware 2.5.7458 - Cross-Site Scripting - Hardware webapps Exploit
Related entries in the VARIoT vulnerabilities database: VAR-201711-0621 | EDB ID: 43158 |
Icon Time Systems RTC-1000 Firmware 2.5.7458 - Cross-Site Scripting. CVE-2017-16819 . webapps exploit for Hardware platform
| VAR-E-201711-0229 | No CVE | TP-Link TL-WR740N - Cross-Site Scripting - Hardware webapps Exploit | EDB ID: 43148 |
TP-Link TL-WR740N - Cross-Site Scripting.. webapps exploit for Hardware platform
| VAR-E-201711-0295 |
CVE-2017-12737 CVE-2017-12738 CVE-2017-12739 |
Siemens SICAM RTUs SM-2556 COM Modules XSS / Bypass / Code Execution
Related entries in the VARIoT vulnerabilities database: VAR-201711-0761, VAR-201711-0759, VAR-201711-0760 | No EDB ID |
Siemens SICAM RTUs SM-2556 COM modules (firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00) suffer from authentication bypass, code execution, and cross site scripting vulnerabilities.
| VAR-E-201711-0123 |
CVE-2017-9675 |
D-Link DIR-605L < 2.08 - Denial of Service - Hardware dos Exploit
Related entries in the VARIoT vulnerabilities database: VAR-201706-0669 | EDB ID: 43147 |
D-Link DIR-605L < 2.08 - Denial of Service. CVE-2017-9675 . dos exploit for Hardware platform
| VAR-E-201710-0308 |
CVE-2017-12728 |
SpiderControl SCADA Web Server 2.02.0007 Improper Privilege Management Vulnerability
Related entries in the VARIoT vulnerabilities database: VAR-201710-1115 | No EDB ID |
| VAR-E-201710-0246 |
CVE-2017-14017 CVE-2017-14019 |
Progea Movicon 11.5.1181 Search Path Issues Vulnerability
Related entries in the VARIoT vulnerabilities database: VAR-201710-0804, VAR-201710-0805 | No EDB ID |
| VAR-E-201710-0220 |
CVE-2016-10401 |
ZyXEL PK5001Z Modem - Backdoor Account - Hardware remote Exploit
Related entries in the VARIoT vulnerabilities database: VAR-201707-0041 | EDB ID: 43105 |
ZyXEL PK5001Z Modem - Backdoor Account. CVE-2016-10401 . remote exploit for Hardware platform
| VAR-E-201710-0435 | No CVE | TP-Link WR940N - Authenticated Remote Code Exploit Exploit | No EDB ID |
| VAR-E-201710-0493 | No CVE | Huawei HG255s - Server Directory Traversal Vulnerability | No EDB ID |
| VAR-E-201710-0190 | No CVE | Huawei HG255s - Server Directory Traversal Vulnerability | No EDB ID |
| VAR-E-201710-0438 | No CVE | Netgear DGN1000 1.1.00.48 - 'Setup.cgi' Remote Code Execution (Metasploit) - Hardware remote Exploit | EDB ID: 43055 |
Netgear DGN1000 1.1.00.48 - 'Setup.cgi' Remote Code Execution (Metasploit).. remote exploit for Hardware platform
| VAR-E-201710-0001 |
CVE-2017-13772 |
TP-Link WDR4300 - Remote Code Execution (Authenticated) - Hardware remote Exploit
Related entries in the VARIoT vulnerabilities database: VAR-201710-1271 | EDB ID: 48994 |
TP-Link WDR4300 - Remote Code Execution (Authenticated). CVE-2017-13772 . remote exploit for Hardware platform
| VAR-E-201710-0003 |
CVE-2017-13772 CVE-2021-26709 CVE-2019-1912 CVE-2019-1913 CVE-2019-1914 |
Cisco Small Business 220 Series - Multiple Vulnerabilities
Related entries in the VARIoT vulnerabilities database: VAR-201908-1018, VAR-201908-1017, VAR-201908-1016, VAR-202104-1584, VAR-201710-1271 | EDB ID: 45541 |
| VAR-E-201710-0002 |
CVE-2017-13772 |
TP-Link WR940N - (Authenticated) Remote Code - Hardware webapps Exploit
Related entries in the VARIoT vulnerabilities database: VAR-201710-1271 | EDB ID: 43022 |
TP-Link WR940N - (Authenticated) Remote Code. CVE-2017-13772 . webapps exploit for Hardware platform
| VAR-E-201710-0481 |
CVE-2017-13078 CVE-2017-13087 CVE-2017-13079 CVE-2017-13082 CVE-2017-13088 CVE-2017-13077 CVE-2017-13086 CVE-2017-13084 CVE-2017-13080 CVE-2017-13081 |
WPA2 Key Reinstallation Multiple Security Weaknesses
Related entries in the VARIoT vulnerabilities database: VAR-201710-0213, VAR-201710-0975, VAR-201710-0974, VAR-201710-0214, VAR-201710-0212, VAR-201710-0209, VAR-201710-0208, VAR-201710-0211, VAR-201710-0206, VAR-201710-0207 | No EDB ID |
WPA2 is prone to multiple security weaknesses.
Exploiting these issues may allow an unauthorized user to intercept and manipulate data or disclose sensitive information. This may aid in further attacks.
| VAR-E-201710-0391 | No CVE | UCOPIA Wireless Appliance 5.1 (Captive Portal) - Root Remote Code Execution Vulnerability | No EDB ID |
| VAR-E-201710-0369 |
CVE-2017-14013 CVE-2017-14005 CVE-2017-14009 CVE-2017-14007 CVE-2017-14011 |
MultiFLEX M10a Controller Multiple Security Vulnerabilities
Related entries in the VARIoT vulnerabilities database: VAR-201710-0800, VAR-201710-0799, VAR-201710-0801, VAR-201710-0802, VAR-201710-0803 | No EDB ID |
MultiFLEX M10a Controller is prone to the following multiple security vulnerabilities:
1. Multiple security-bypass vulnerabilities
2. An information-disclosure vulnerability
3. A cross-site request-forgery vulnerability
Exploiting these issues may allow a remote attacker to perform certain administrative actions, bypass certain security restrictions, gaining unauthorized access to the affected device and obtaining sensitive information; other attacks are also possible.
| VAR-E-201710-0022 |
CVE-2017-15291 |
TP-Link TL-MR3220 - Cross-Site Scripting - Hardware webapps Exploit
Related entries in the VARIoT vulnerabilities database: VAR-201710-1284 | EDB ID: 43023 |
TP-Link TL-MR3220 - Cross-Site Scripting. CVE-2017-15291 . webapps exploit for Hardware platform
| VAR-E-201710-0359 | No CVE | UCOPIA Wireless Appliance 5.1 Code Execution | No EDB ID |
UCOPIA Wireless Appliance versions 5.1 and below suffer from a captive portal remote root code execution vulnerability.
| VAR-E-201710-0367 | No CVE | UCOPIA Wireless Appliance < 5.1 (Captive Portal) - Root Remote Code Execution - Linux remote Exploit | EDB ID: 42949 |
UCOPIA Wireless Appliance < 5.1 (Captive Portal) - Root Remote Code Execution.. remote exploit for Linux platform