VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201912-2003 No CVE A SQL injection vulnerability exists in the simple forum system of Ainon Network Technology Service Center, Huanggu District, Shenyang 162100 CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The Simple Forum System of Ainong Network Technology Service Center in Huanggu District, Shenyang City is a forum website building system. A SQL injection vulnerability exists in the 162100 Simple Forum system of Ainong Network Technology Service Center, Huanggu District, Shenyang. Attackers can use the vulnerability to obtain sensitive database information.
VAR-201912-2005 No CVE A SQL injection vulnerability exists in the 162100 simple forum system of Ainon Network Technology Service Center, Huanggu District, Shenyang (CNVD-2020-00002) CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The simple forum system of Ainon Network Technology Service Center in Huanggu District, Shenyang City is a forum website building system. A SQL injection vulnerability exists in the 162100 Simple Forum System of Ainong Network Technology Service Center, Huanggu District, Shenyang City. Attackers can use this vulnerability to obtain sensitive database information.
VAR-201912-0714 CVE-2019-20075 Netis DL4323 Device cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
On Netis DL4323 devices, pingrtt_v6.html has XSS (Ping6 Diagnostic). Netis DL4323 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. NETCORE Netis DL4323 is a multifunctional modem of China Netcore Corporation. A cross-site scripting vulnerability exists in the pingrtt_v6.html page in NETCORE Netis DL4323. The vulnerability stems from the lack of proper validation of client data by web applications. An attacker could use this vulnerability to execute client code
VAR-201912-0715 CVE-2019-20076 NETCORE Netis DL4323 Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
On Netis DL4323 devices, XSS exists via the form2Ddns.cgi username parameter (DynDns settings of the Dynamic DNS Configuration). Netis DL4323 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. NETCORE Netis DL4323 is a multifunctional modem from China Netcore Corporation. A cross-site scripting vulnerability exists in NETCORE Netis DL4323. The vulnerability stems from the lack of proper verification of client data by web applications. Attackers can use this vulnerability to execute client code
VAR-201912-0709 CVE-2019-20070 Netis DL4323 Device cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
On Netis DL4323 devices, XSS exists via the urlFQDN parameter to form2url.cgi (aka the Keyword field of the URL Blocking Configuration). Netis DL4323 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. NETCORE Netis DL4323 is a multifunctional modem from China Netcore Corporation. A cross-site scripting vulnerability exists in NETCORE Netis DL4323. The vulnerability stems from the lack of proper verification of client data by web applications. Attackers can use this vulnerability to execute client code
VAR-201912-0710 CVE-2019-20071 Netis DL4323 Device cross-site request forgery vulnerability CVSS V2: 5.8
CVSS V3: 6.5
Severity: MEDIUM
On Netis DL4323 devices, CSRF exists via form2logaction.cgi to delete all logs. Netis DL4323 The device contains a cross-site request forgery vulnerability.Information may be tampered with. NETCORE Netis DL4323 is a multifunctional modem from China Netcore Corporation. The vulnerability stems from a web application's insufficient verification that the request came from a trusted user. An attacker could use this vulnerability to send an unexpected request to the server through an affected client
VAR-201912-0713 CVE-2019-20074 Netis DL4323 Vulnerability related to information leak from cache in device CVSS V2: 4.0
CVSS V3: 8.8
Severity: HIGH
On Netis DL4323 devices, any user role can view sensitive information, such as a user password or the FTP password, via the form2saveConf.cgi page. Netis DL4323 The device contains a vulnerability related to information disclosure from the cache.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. NETCORE Netis DL4323 is a multifunctional modem from China Netcore Corporation. An information disclosure vulnerability exists in NETCORE Netis DL4323
VAR-201912-0712 CVE-2019-20073 Netis DL4323 Device cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
On Netis DL4323 devices, XSS exists via the form2userconfig.cgi username parameter (User Account Configuration). Netis DL4323 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. NETCORE Netis DL4323 is a multifunctional modem from China Netcore Corporation. A cross-site scripting vulnerability exists in NETCORE Netis DL4323. The vulnerability stems from the lack of proper verification of client data by web applications. Attackers can use this vulnerability to execute client code
VAR-201912-0711 CVE-2019-20072 Netis DL4323 Device cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
On Netis DL4323 devices, XSS exists via the form2Ddns.cgi hostname parameter (Dynamic DNS Configuration). Netis DL4323 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. NETCORE Netis DL4323 is a multifunctional modem from China Netcore Corporation. A cross-site scripting vulnerability exists in NETCORE Netis DL4323. The vulnerability stems from the lack of proper verification of client data by web applications. Attackers can use this vulnerability to execute client code
VAR-201912-2002 No CVE Denial of Service Vulnerability in TP-Link AC1900 Router CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
TP-Link AC1900 is a mini wireless router of China TP-Link. TP-Link AC1900 has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-201912-1673 CVE-2014-4558 WordPress for Swipe Checkout for WooCommerce Cross-site scripting vulnerability in plugin CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in test-plugin.php in the Swipe Checkout for WooCommerce plugin 2.7.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter. WordPress is a blogging platform developed by the WordPress Foundation using PHP language. The platform supports setting up personal blog sites on PHP and MySQL servers. Swipe Checkout for WooCommerce is a payment plugin for e-commerce used in it. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-201912-2013 No CVE TL-WR840N Denial of Service Vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
TL-WR840N is a mini wireless router from China TP-Link. TL-WR840N has a denial of service vulnerability. An attacker could exploit this vulnerability to cause a denial of service.
VAR-201912-0003 CVE-2007-0158 thttpd Vulnerable to out-of-bounds writing CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
thttpd 2007 has buffer underflow. thttpd Contains an out-of-bounds write vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. thttpd is a lightweight open source web server from ACME Labs. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
VAR-201912-1595 CVE-2013-4743 Static HTTP Server Vulnerable to classical buffer overflow CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Static HTTP Server 1.0 has a Local Overflow. Static HTTP Server Contains a classic buffer overflow vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
VAR-201912-1674 CVE-2014-4559 WordPress for Swipe Checkout for WP e-Commerce Plug-in vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in test-plugin.php in the Swipe Checkout for WP e-Commerce plugin 3.1.0 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) api_key, (2) payment_page_url, (3) merchant_id, (4) api_url, or (5) currency parameter. WordPress is a blogging platform developed by the WordPress Foundation using PHP language. The platform supports setting up personal blog sites on PHP and MySQL servers. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-201912-2007 No CVE Communication key leak vulnerability in JD Xiaojingyu smart platform CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Xiaojingyu Intelligent Platform integrates the original Jingdong Alpha platform and introduces Jingdong's artificial intelligence and big data capabilities. It not only focuses on the original smart hardware, smart home, and smart travel solutions, but also extends its IoT capabilities to Multiple scenes. Jingdong Xiaojingyu Intelligent Platform has a communication key leakage vulnerability. An attacker can use this information to construct device instructions to control device behavior.
VAR-201912-0975 CVE-2019-16327 D-Link DIR-601 Authentication vulnerabilities in devices CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product. D-Link DIR-601 The device contains an authentication vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-601 B1 is a wireless router from Taiwan D-Link. The D-Link DIR-601 B1 2.00NA version has an authentication bypass vulnerability, which originates from the fact that the program is only on the client and fails to authenticate on the server. An attacker could use this vulnerability to bypass authentication and perform arbitrary actions
VAR-201912-2010 No CVE Denial of service vulnerability in ZLAN5102 and ZLAN5103 network cards CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
ZLAN5102 serial server is a protocol converter between RS232 / 485 and TCP / IP developed by Shanghai Zhuolan Information Technology Co., Ltd. The serial server can conveniently connect serial devices to Ethernet and the Internet, and realize the network upgrade of serial devices. ZLAN5103 is a new generation high-performance serial server developed by Shanghai Zhuolan based on ZLAN1003. The ZLAN5102 and ZLAN5103 network cards have a denial of service vulnerability. Sending only three-way TCP handshake packets to port 80 of the device and no other packets will cause the device's network card to restart abnormally. An attacker could use the vulnerability to launch a denial of service attack.
VAR-201912-2011 No CVE ZLAN network card has a denial of service vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
ZLAN5103 can realize transparent data forwarding between RS232 / 485/422 and TCP / IP. Conveniently make serial devices connect to Ethernet and Internet, and realize the network upgrade of serial devices. There is a denial of service vulnerability in ZLAN. Sending malformed RST packets to ZLAN5103 TCP 4196 port will cause denial of service on ZLAN5103 TCP 4196 and TCP 80 ports. The device needs to be powered off and restarted to recover. An attacker can use the vulnerability to launch a denial of service attack.
VAR-201912-1062 CVE-2019-19996 Intelbras IWR 3000N Device input validation vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
An issue was discovered on Intelbras IWR 3000N 1.8.7 devices. A malformed login request allows remote attackers to cause a denial of service (reboot), as demonstrated by JSON misparsing of the \""} string to v1/system/login. Intelbras IWR 3000N The device contains an input validation vulnerability.Denial of service (DoS) May be in a state. Intelbras IWR 3000N is a wireless router from Intelbras in Poland. There are security vulnerabilities in Intelbras IWR 3000N 1.8.7