VARIoT IoT vulnerabilities database

VAR-202410-1687 | CVE-2024-48632 | D-Link Systems, Inc. of DIR-882 firmware and DIR-878 in the firmware OS Command injection vulnerability |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain multiple command injection vulnerabilities via the LocalIPAddress, TCPPorts, and UDPPorts parameters in the SetPortForwardingSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link Systems, Inc. of DIR-882 firmware and DIR-878 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1718 | CVE-2024-48631 | D-Link Systems, Inc. of DIR-882 firmware and DIR-878 in the firmware OS Command injection vulnerability |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the SSID parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link Systems, Inc. of DIR-882 firmware and DIR-878 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1717 | CVE-2024-48630 | D-Link Systems, Inc. of DIR-882 firmware and DIR-878 in the firmware OS Command injection vulnerability |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the MacAddress parameter in the SetMACFilters2 function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link Systems, Inc. of DIR-882 firmware and DIR-878 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1735 | CVE-2024-48629 | D-Link Systems, Inc. of DIR-882 firmware and DIR-878 in the firmware OS Command injection vulnerability |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the IPAddress parameter in the SetGuestZoneRouterSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link Systems, Inc. of DIR-882 firmware and DIR-878 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1445 | CVE-2024-49399 | Elvaco M-Bus Metering Gateway CMe3100 Access Control Error Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: High |
The affected product is vulnerable to an attacker being able to use commands without providing a password which may allow an attacker to leak information. Elvaco M-Bus Metering Gateway CMe3100 is an M-Bus metering gateway for fixed networks from Elvaco.
There is an access control error vulnerability in the 1.12.1 version of Elvaco M-Bus Metering Gateway CMe3100
VAR-202410-1442 | CVE-2024-49398 | Elvaco M-Bus Metering Gateway CMe3100 File Upload Vulnerability |
CVSS V2: 9.4 CVSS V3: - Severity: High |
The affected product is vulnerable to unrestricted file uploads, which may allow an attacker to remotely execute code. Elvaco M-Bus Metering Gateway CMe3100 is an M-Bus metering gateway for fixed networks from Elvaco
VAR-202410-1444 | CVE-2024-49397 | Elvaco M-Bus Metering Gateway CMe3100 Cross-Site Scripting Vulnerability |
CVSS V2: 7.6 CVSS V3: - Severity: Critical |
The affected product is vulnerable to a cross-site scripting attack which may allow an attacker to bypass authentication and takeover admin accounts. Elvaco M-Bus Metering Gateway CMe3100 is an M-Bus metering gateway for fixed networks from Elvaco
VAR-202410-1443 | CVE-2024-49396 | Elvaco M-Bus Metering Gateway CMe3100 has an unspecified vulnerability |
CVSS V2: 9.4 CVSS V3: - Severity: High |
The affected product is vulnerable due to insufficiently protected credentials, which may allow an attacker to impersonate Elvaco and send false information. Elvaco M-Bus Metering Gateway CMe3100 is an M-Bus metering gateway for fixed networks from Elvaco.
There is a security vulnerability in the 1.12.1 version of Elvaco M-Bus Metering Gateway CMe3100. The vulnerability is caused by insufficient credential protection
VAR-202410-3371 | CVE-2024-48192 | Shenzhen Tenda Technology Co.,Ltd. of G3 Vulnerability related to use of hardcoded credentials in firmware |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
Tenda G3 v15.01.0.5(2848_755)_EN was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root. Shenzhen Tenda Technology Co.,Ltd. of G3 A vulnerability exists in the firmware regarding the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda G3 is a QosVpn router from China's Tenda company
VAR-202410-3650 | No CVE | Mitsubishi Electric Mitsubishi PLC FX5UJ has a buffer overflow vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Mitsubishi PLC FX5UJ is a micro programmable controller.
Mitsubishi Electric Mitsubishi PLC FX5UJ has a buffer overflow vulnerability. Attackers can exploit this vulnerability to modify the length field of the transmission control program data packet, causing the workstation to be unable to read the control program content.
VAR-202410-3656 | No CVE | D-LINK DAR-7000-20 Internet Behavior Audit Gateway of D-Link Electronic Equipment (Shanghai) Co., Ltd. has a command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The D-LINK DAR-7000-20 Internet Behavior Audit Gateway is a network behavior management and audit device for enterprise network environments.
The D-LINK DAR-7000-20 Internet Behavior Audit Gateway of D-Link Electronics (Shanghai) Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to obtain server permissions.
VAR-202410-3364 | CVE-2024-48714 | TP-LINK Technologies of TL-WDR7660 Classic buffer overflow vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
In TP-Link TL-WDR7660 v1.0, the guestRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities. TP-LINK Technologies of TL-WDR7660 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. TP-LINK TL-WDR7660 is a Gigabit router from TP-LINK of China.
TP-LINK TL-WDR7660 version 1.0 has a buffer overflow vulnerability. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202410-3122 | CVE-2024-48713 | TP-LINK Technologies of TL-WDR7660 Classic buffer overflow vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
In TP-Link TL-WDR7660 1.0, the wacWhitelistJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities. TP-LINK Technologies of TL-WDR7660 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. TP-LINK TL-WDR7660 is a Gigabit router from TP-LINK of China.
TP-LINK TL-WDR7660 version 1.0 has a buffer overflow vulnerability. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202410-3229 | CVE-2024-48712 | TP-LINK Technologies of TL-WDR7660 Classic buffer overflow vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
In TP-Link TL-WDR7660 1.0, the rtRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities. TP-LINK Technologies of TL-WDR7660 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. TP-LINK TL-WDR7660 is a Gigabit router from TP-LINK of China.
TP-LINK TL-WDR7660 version 1.0 has a buffer overflow vulnerability. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202410-0405 | CVE-2024-45273 | MB CONNECT LINE of mbnet.mini Vulnerabilities related to cryptographic strength in products from multiple vendors such as firmware |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used. MB CONNECT LINE of mbnet.mini Products from multiple vendors, such as firmware, have vulnerabilities related to encryption strength.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202410-0404 | CVE-2024-45272 | helmholz of myrex24 v2 virtual server Vulnerabilities in products from multiple vendors such as |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost. helmholz of myrex24 v2 virtual server Unspecified vulnerabilities exist in products from multiple vendors.Service operation interruption (DoS) It may be in a state
VAR-202410-1349 | CVE-2024-35520 | of netgear R7000 Command injection vulnerability in firmware |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
Netgear R7000 1.0.11.136 is vulnerable to Command Injection in RMT_invite.cgi via device_name2 parameter. of netgear R7000 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR R7000 is a wireless router from NETGEAR. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202410-1222 | CVE-2024-35519 | Command injection vulnerability in multiple Netgear products |
CVSS V2: - CVSS V3: 8.4 Severity: HIGH |
Netgear EX6120 v1.0.0.68, Netgear EX6100 v1.0.2.28, and Netgear EX3700 v1.0.0.96 are vulnerable to command injection in operating_mode.cgi via the ap_mode parameter. of netgear EX3700 firmware, EX6100 firmware, EX6120 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202410-1113 | CVE-2024-35518 | of netgear EX6120 Command injection vulnerability in firmware |
CVSS V2: 7.2 CVSS V3: 8.4 Severity: HIGH |
Netgear EX6120 v1.0.0.68 is vulnerable to Command Injection in genie_fix2.cgi via the wan_dns1_pri parameter. of netgear EX6120 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR EX6120 is a wireless extender from NETGEAR. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202410-1606 | CVE-2024-48168 | D-Link Systems, Inc. of DCS-960L Code injection vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A stack overflow vulnerability exists in the sub_402280 function of the HNAP service of D-Link DCS-960L 1.09, allowing an attacker to execute arbitrary code. D-Link Systems, Inc. (DoS) It may be in a state. D-Link DCS-960L is a network camera product of China's D-Link company.
D-Link DCS-960L version 1.09 has a buffer overflow vulnerability, which is caused by a boundary error in the sub_402280 function when processing untrusted input