VARIoT IoT exploits database

Affected products: vendor, model and version
Type can be e.g: Remote Code Execution or Denial of Service
Look up free text in title and description

VAR-E-201405-0120 No CVE D-Link Routers - Multiple Vulnerabilities - Hardware webapps Exploit EDB ID: 33520
D-Link Routers - Multiple Vulnerabilities. CVE-106821CVE-106820CVE-106808CVE-106807 . webapps exploit for Hardware platform
VAR-E-201405-0309 No CVE F5 BIG-IQ 4.1.0.2013.0 Password Change No EDB ID
F5 BIG-IQ version 4.1.0.2013.0 is vulnerable to a privilege escalation attack which allows an attacker to change the root users password. This Metasploit module does just this, then SSH's in.
VAR-E-201405-0358 No CVE NETGEAR DGN2200 1.0.0.29_1.7.29_HotS - CSRF Vulnerability No EDB ID
VAR-E-201405-0438 No CVE F5 BIG-IQ 4.1.0.2013.0 - Privilege Escalation Exploit No EDB ID
VAR-E-201405-0325 No CVE NETGEAR DGN2200 ADSL Router Cross Site Request Forgery Vulnerability No EDB ID
NETGEAR DGN2200 router is prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks. NETGEAR DGN2200 running firmware version 1.0.0.29_1.7.29 is vulnerable; other versions may also be affected.
VAR-E-201405-0431 No CVE Netgear DGN2200 Cross Site Scripting No EDB ID
Netgear DGN2200 suffers from a stored cross site scripting vulnerability.
VAR-E-201405-0272 No CVE Netgear DGN2200 1.0.0.29_1.7.29_HotS - Persistent Cross-Site Scripting - Hardware webapps Exploit EDB ID: 33138
Netgear DGN2200 1.0.0.29_1.7.29_HotS - Persistent Cross-Site Scripting. CVE-106530 . webapps exploit for Hardware platform
VAR-E-201405-0118 CVE-2014-2937
CVE-2014-3220
F5 BIG-IQ 4.1.0.2013.0 - Privilege Escalation (Metasploit) - Hardware remote Exploit

Related entries in the VARIoT vulnerabilities database: VAR-201405-0338
EDB ID: 33143
F5 BIG-IQ 4.1.0.2013.0 - Privilege Escalation (Metasploit). CVE-106532CVE-2014-3220CVE-2014-2937 . remote exploit for Hardware platform
VAR-E-201405-0185 CVE-2014-9727
Fritz!Box - Remote Command Execution - Hardware webapps Exploit

Related entries in the VARIoT vulnerabilities database: VAR-201505-0363
EDB ID: 33136
Fritz!Box - Remote Command Execution. CVE-103289CVE-2014-9727 . webapps exploit for Hardware platform
VAR-E-201404-0185 CVE-2014-3792
Beetel 450TC2 Router - Cross-Site Request Forgery (Admin Password) - Hardware webapps Exploit

Related entries in the VARIoT vulnerabilities database: VAR-201405-0537
EDB ID: 33129
Beetel 450TC2 Router - Cross-Site Request Forgery (Admin Password). CVE-106468CVE-2014-3792 . webapps exploit for Hardware platform
VAR-E-201404-0060 CVE-2014-2976
Sixnet Sixview 2.4.1 - Web Console Directory Traversal - Hardware webapps Exploit

Related entries in the VARIoT vulnerabilities database: VAR-201404-0511
EDB ID: 32973
Sixnet Sixview 2.4.1 - Web Console Directory Traversal. CVE-2014-2976CVE-106149 . webapps exploit for Hardware platform
VAR-E-201404-0147 No CVE Teracom T2-B-Gawv1.4U10Y-BI Cross Site Request Forgery Vulnerability No EDB ID
Teracom T2-B-Gawv1.4U10Y-BI is prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks.
VAR-E-201404-0439 No CVE D-Link DAP-1320 Directory Traversal / Cross Site Scripting No EDB ID
D-Link DAP-1320 wireless range extenders suffer from cross site scripting and directory traversal vulnerabilities.
VAR-E-201404-0260 CVE-2014-3760
CVE-2014-3761
D-Link DAP-1150 Cross Site Scripting and Cross Site Request Forgery Vulnerabilities

Related entries in the VARIoT vulnerabilities database: VAR-201405-0527, VAR-201405-0528
No EDB ID
D-Link DAP-1150 is prone to a cross-site scripting vulnerability and multiple cross-site request-forgery vulnerabilities. An attacker may exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, perform unauthorized actions, and disclose or modify sensitive information. Other attacks may also be possible. D-Link DAP-1150 firmware version 1.2.94 is vulnerable; other versions may also be affected.
VAR-E-201404-0249 CVE-2014-2268
Vtiger - 'Install' Remote Command Execution (Metasploit) - PHP remote Exploit

Related entries in the VARIoT vulnerabilities database: VAR-201411-0075
EDB ID: 32794
Vtiger - 'Install' Remote Command Execution (Metasploit). CVE-2014-2268CVE-105641 . remote exploit for PHP platform
VAR-E-201404-0108 CVE-2014-0160
CVE-2014-0346
OpenSSL 1.0.1f TLS Heartbeat Extension - 'Heartbleed' Memory Disclosure (Multiple SSL/TLS Versions) - Multiple remote Exploit

Related entries in the VARIoT vulnerabilities database: VAR-201404-0592
EDB ID: 32764
Bleed Out is a command line tool written in C# for targeting instances of OpenSSL made vulnerable by the prolific "Heartbleed" bug. The tool aggressively exploits the OpenSSL vulnerability, dumping both ASCII and binary data to files. It also checks the uniqueness of each chunk before persisting it, to ensure that duplicate chunks are not saved.
VAR-E-201404-0107 CVE-2014-0160
CVE-2014-0346
OpenSSL TLS Heartbeat Extension - 'Heartbleed' Memory Disclosure - Multiple remote Exploit

Related entries in the VARIoT vulnerabilities database: VAR-201404-0592
EDB ID: 32745
Bleed Out is a command line tool written in C# for targeting instances of OpenSSL made vulnerable by the prolific "Heartbleed" bug. The tool aggressively exploits the OpenSSL vulnerability, dumping both ASCII and binary data to files. It also checks the uniqueness of each chunk before persisting it, to ensure that duplicate chunks are not saved.
VAR-E-201404-0109 CVE-2014-0160
CVE-2014-0346
OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (1) - Multiple remote Exploit

Related entries in the VARIoT vulnerabilities database: VAR-201404-0592
EDB ID: 32791
Bleed Out is a command line tool written in C# for targeting instances of OpenSSL made vulnerable by the prolific "Heartbleed" bug. The tool aggressively exploits the OpenSSL vulnerability, dumping both ASCII and binary data to files. It also checks the uniqueness of each chunk before persisting it, to ensure that duplicate chunks are not saved.
VAR-E-201404-0110 CVE-2014-0160
CVE-2014-0346
OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (2) (DTLS Support) - Multiple remote Exploit

Related entries in the VARIoT vulnerabilities database: VAR-201404-0592
EDB ID: 32998
Bleed Out is a command line tool written in C# for targeting instances of OpenSSL made vulnerable by the prolific "Heartbleed" bug. The tool aggressively exploits the OpenSSL vulnerability, dumping both ASCII and binary data to files. It also checks the uniqueness of each chunk before persisting it, to ensure that duplicate chunks are not saved.
VAR-E-201404-0526 No CVE ASUS RT-AC68U Cross Site Scripting No EDB ID
ASUS RT-AC68U web management interface suffers from a reflective cross site scripting vulnerability.