VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202209-2068 CVE-2022-40475 TOTOLINK A860R Security hole CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A860R V4.1.2cu.5182_B20201027 was discovered to contain a command injection via the component /cgi-bin/downloadFile.cgi
VAR-202209-1914 CVE-2022-20775 Cisco SD-WAN Security hole CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user
VAR-202209-1970 CVE-2022-20818 Cisco SD-WAN Security hole CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user
VAR-202209-2051 CVE-2022-40942 Tenda TX3 has unknown vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda TX3 US_TX3V1.0br_V16.03.13.11 is vulnerable to stack overflow via compare_parentcontrol_time. The Tenda TX3 is a wireless router from the Chinese company Tenda. No detailed vulnerability details are currently available
VAR-202209-1913 CVE-2022-22387 IBM Application Gateway Cross-Site Scripting Vulnerability CVSS V2: 5.5
CVSS V3: 5.4
Severity: MEDIUM
IBM Application Gateway is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 221965. Provides a containerized secure web reverse proxy designed to sit in front of your application to seamlessly add authentication and authorization protection to your application
VAR-202209-1780 CVE-2022-38335 Vtiger CRM Cross-site scripting vulnerability CVSS V2: -
CVSS V3: 5.4
Severity: MEDIUM
Vtiger CRM v7.4.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the e-mail template modules.
VAR-202209-1775 CVE-2022-34326 Realtek RTL8195AM Security hole CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
On Realtek RTL8195AM devices before 284241d70308ff2519e40afd7b284ba892c730a3, the timer task can be locked when there are frequent and continuous Wi-Fi connection failures for the Soft AP mode. The Realtek RTL8195AM is an IoT microcontroller from China's Realtek Corporation. Realtek RTL8195AM 284241d70308ff2519e40afd7b284ba892c730a3 has a security vulnerability
VAR-202209-1731 CVE-2022-20728 Cisco Access Points Access control error vulnerability CVSS V2: -
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability in the client forwarding code of multiple Cisco Access Points (APs) could allow an unauthenticated, adjacent attacker to inject packets from the native VLAN to clients within nonnative VLANs on an affected device. This vulnerability is due to a logic error on the AP that forwards packets that are destined to a wireless client if they are received on the native VLAN. An attacker could exploit this vulnerability by obtaining access to the native VLAN and directing traffic directly to the client through their MAC/IP combination. A successful exploit could allow the attacker to bypass VLAN separation and potentially also bypass any Layer 3 protection mechanisms that are deployed
VAR-202209-1859 CVE-2021-27853 L2 network security controls can be bypassed using VLAN 0 stacking and/or 802.3 headers CVSS V2: -
CVSS V3: 4.7
Severity: MEDIUM
Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers. Layer-2 (L2) network security controls provided by various devices, such as switches, routers, and operating systems, can be bypassed by stacking Ethernet protocol headers. An attacker can send crafted packets through vulnerable devices to cause Denial-of-service (DoS) or to perform a man-in-the-middle (MitM) attack against a target network.CVE-2021-27853 Affected CVE-2021-27854 Affected CVE-2021-27861 Affected CVE-2021-27862 AffectedCVE-2021-27853 Affected CVE-2021-27854 Affected CVE-2021-27861 Affected CVE-2021-27862 Affected
VAR-202209-1749 CVE-2022-3323 Advantech iView SQL Injection vulnerability CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
An SQL injection vulnerability in Advantech iView 5.7.04.6469. The specific flaw exists within the ConfigurationServlet endpoint, which listens on TCP port 8080 by default. An unauthenticated remote attacker can craft a special column_value parameter in the setConfiguration action to bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform SQL injection. For example, the attacker can exploit the vulnerability to retrieve the iView admin password.
VAR-202208-1474 CVE-2021-41437 ASUS RT-AX88U Security hole CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
An HTTP response splitting attack in web application in ASUS RT-AX88U before v3.0.0.4.388.20558 allows an attacker to craft a specific URL that if an authenticated victim visits it, the URL will give access to the cloud storage of the attacker.
VAR-202209-1679 CVE-2022-37232 NETGEAR N300 Buffer error vulnerability CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Netgear N300 wireless router wnr2000v4-V1.0.0.70 is vulnerable to Buffer Overflow via uhttpd. There is a stack overflow vulnerability caused by strcpy.
VAR-202209-1717 CVE-2022-37235 NETGEAR R7000 Buffer error vulnerability CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Netgear Nighthawk AC1900 Smart WiFi Dual Band Gigabit Router R7000-V1.0.11.134_10.2.119 is vulnerable to Buffer Overflow via the wl binary in firmware. There is a stack overflow vulnerability caused by strncat
VAR-202209-1585 CVE-2022-31937 NETGEAR N300 Buffer error vulnerability CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Netgear N300 wireless router wnr2000v4-V1.0.0.70 was discovered to contain a stack overflow via strcpy in uhttpd.
VAR-202209-1894 CVE-2022-37234 NETGEAR R7000 Buffer error vulnerability CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Netgear Nighthawk AC1900 Smart WiFi Dual Band Gigabit Router R7000-V1.0.11.134_10.2.119 is vulnerable to Buffer Overflow via the wl binary in firmware. There is a stack overflow vulnerability caused by strncpy.
VAR-202209-1475 CVE-2022-37395 Huawei CV81-WDM FW Input validation error vulnerability CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
A Huawei device has an input verification vulnerability. Successful exploitation of this vulnerability may lead to DoS attacks.Affected product versions include:CV81-WDM FW versions 01.70.49.29.46.
VAR-202209-1118 CVE-2022-38826 TOTOLINK T6 Command injection vulnerability CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
In TOTOLINK T6 V4.1.5cu.709_B20210518, there is an execute arbitrary command in cstecgi.cgi.
VAR-202209-1165 CVE-2022-38828 TOTOLINK T6 Command injection vulnerability CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK T6 V4.1.5cu.709_B20210518 is vulnerable to command injection via cstecgi.cgi
VAR-202209-1549 CVE-2022-38823 TOTOLINK T6 Trust Management Issue Vulnerability CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
In TOTOLINK T6 V4.1.5cu.709_B20210518, there is a hard coded password for root in /etc/shadow.sample.
VAR-202209-1164 CVE-2022-38827 TOTOLINK T6 Command injection vulnerability CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK T6 V4.1.5cu.709_B20210518 is vulnerable to Buffer Overflow via cstecgi.cgi