VARIoT IoT exploits database

VAR-E-201706-0471 | No CVE | Digital Canal Structural Wind Analysis 9.1 Buffer Overflow | No EDB ID |
Digital Canal Structural Wind Analysis versions 9.1 and below suffer from a buffer overflow vulnerability.
VAR-E-201706-0148 | No CVE | Humax HG100R 2.0.6 - Backup File Download Exploit | No EDB ID |
VAR-E-201706-0189 | No CVE | Humax HG100R 2.0.6 - Backup File Download - Hardware webapps Exploit | EDB ID: 42284 |
Humax HG100R 2.0.6 - Backup File Download.. webapps exploit for Hardware platform
VAR-E-201706-0323 | No CVE | Netgear DGN2200 - dnslookup.cgi Command Injection Exploit | No EDB ID |
VAR-E-201706-0398 |
CVE-2017-2238 |
Toshiba Home Gateway CVE-2017-2238 Cross Site Request Forgery Vulnerability
Related entries in the VARIoT vulnerabilities database: VAR-201707-0330 | No EDB ID |
Toshiba Home Gateway is prone to a cross-site request-forgery vulnerability.
Exploiting the issue will allow a remote attacker to use a victim's currently active session to hijack the authentication of administrators. Successful exploits will compromise affected device.
VAR-E-201706-0371 | No CVE | DLink DSL-2640B - Unauthenticated Remote DNS Change Exploit | No EDB ID |
VAR-E-201706-0328 | No CVE | UTstarcom WA3002G4 - Unauthenticated DNS Change Exploit | No EDB ID |
VAR-E-201706-0220 | No CVE | DLink DSL-2640U - Unauthenticated DNS Change Exploit | No EDB ID |
VAR-E-201706-0027 | No CVE | D-Link DSL-2640B ADSL Router - 'dnscfg' Remote DNS Change - Hardware webapps Exploit | EDB ID: 42197 |
D-Link DSL-2640B ADSL Router - 'dnscfg' Remote DNS Change.. webapps exploit for Hardware platform
VAR-E-201706-0242 | No CVE | UTstarcom WA3002G4 Unauthenticated Remote DNS Changer | No EDB ID |
UTstarcom WA3002G4 remote dns changer exploit.
VAR-E-201706-0160 | No CVE | D-Link DSL-2640U - DNS Change - Hardware webapps Exploit | EDB ID: 42195 |
D-Link DSL-2640U - DNS Change.. webapps exploit for Hardware platform
VAR-E-201706-0251 | No CVE | UTstarcom WA3002G4 - DNS Change - Hardware webapps Exploit | EDB ID: 42194 |
UTstarcom WA3002G4 - DNS Change.. webapps exploit for Hardware platform
VAR-E-201706-0097 |
CVE-2017-7005 |
WebKit JSC - JSGlobalObject::haveABadTime Causes Type Confusions - Multiple dos Exploit
Related entries in the VARIoT vulnerabilities database: VAR-201804-1055 | EDB ID: 42188 |
WebKit JSC - JSGlobalObject::haveABadTime Causes Type Confusions. CVE-2017-7005 . dos exploit for Multiple platform
VAR-E-201706-0341 | No CVE | EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 - Remote Code Execution - Hardware webapps Exploit | EDB ID: 42114 |
EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 - Remote Code Execution.. webapps exploit for Hardware platform
VAR-E-201705-0461 | No CVE | MikroTik RouterBoard 6.38.5 Denial Of Service | No EDB ID |
MikroTik RouterBoard version 6.38.5 suffers from a denial of service vulnerability.
VAR-E-201705-0077 |
CVE-2017-6634 |
Cisco Industrial Ethernet 1000 Series Switches Cross Site Request Forgery Vulnerability
Related entries in the VARIoT vulnerabilities database: VAR-201705-3656 | No EDB ID |
Cisco Industrial Ethernet 1000 Series Switches are prone to a cross-site request-forgery vulnerability because the application does not properly validate HTTP requests.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions in the context of the affected user. Other attacks are also possible.
This issue is being tracked by Cisco bug ID CSCvc88811.
VAR-E-201705-0277 |
CVE-2017-5891 CVE-2017-5892 |
ASUS Routers CSRF / Information Disclosure
Related entries in the VARIoT vulnerabilities database: VAR-201705-3190, VAR-201705-3167 | No EDB ID |
ASUS routers suffer from cross site request forgery and information disclosure vulnerabilities. Versions affected include RT-AC55U, RT-AC56R, RT-AC56S, RT-AC56U, RT-AC66U, RT-AC88U, RT-AC66R, RT-AC66U, RT-AC66W, RT-AC68W, RT-AC68P, RT-AC68R, RT-AC68U, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC53U, RT-AC1900P, RT-AC3100, RT-AC3200, RT-AC5300, RT-N11P, RT-N12 (D1 version only), RT-N12+, RT-N12E, RT-N18U, RT-N56U, RT-N66R, RT-N66U (B1 version only), and RT-N66W.
VAR-E-201705-0104 | No CVE | MikroTik RouterBoard v6.38.5 - Denial of Service | No EDB ID |
VAR-E-201704-0190 | No CVE | Huawei HG532n - Command Injection (Metasploit) - Hardware remote Exploit | EDB ID: 41895 |
Huawei HG532n - Command Injection (Metasploit).. remote exploit for Hardware platform
VAR-E-201704-0146 | No CVE | Huawei HG532n Command Injection | No EDB ID |
This Metasploit module exploits a command injection vulnerability in the Huawei HG532n routers provided by TE-Data Egypt, leading to a root shell. The router's web interface has two kinds of logins, a "limited" user:user login given to all customers and an admin mode. The limited mode is used here to expose the router's telnet port to the outside world through NAT port-forwarding. With telnet now remotely accessible, the router's limited "ATP command line tool" (served over telnet) can be upgraded to a root shell through an injection into the ATP's hidden "ping" command.