VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201904-0603 CVE-2018-13288 Synology File Station Vulnerable to information disclosure CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Information exposure vulnerability in SYNO.FolderSharing.List in Synology File Station before 1.2.3-0252 and before 1.1.5-0125 allows remote attackers to obtain sensitive information via the (1) folder_path or (2) real_path parameter. This tool enables users to access files on Synology NAS devices via the web. Synology File Station versions earlier than 1.2.3-0252 and versions earlier than 1.1.5-0125 have an information disclosure vulnerability in SYNO.FolderSharing.List, which is caused by errors in network system or product configuration during operation
VAR-201904-0601 CVE-2018-13286 Synology Diskstation Manager Vulnerable to information disclosure CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Incorrect default permissions vulnerability in synouser.conf in Synology Diskstation Manager (DSM) before 6.2-23739-1 allows remote authenticated users to obtain sensitive information via the world readable configuration. Synology Diskstation Manager (DSM) Contains an information disclosure vulnerability.Information may be obtained. Synology DiskStation Manager (DSM) is an operating system for network storage servers (NAS) developed by Synology, Taiwan. The operating system can manage data, documents, photos, music and other information. This vulnerability stems from configuration errors in network systems or products during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components
VAR-201904-0599 CVE-2018-13284 Synology Diskstation Manager In OS Command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Command injection vulnerability in ftpd in Synology Diskstation Manager (DSM) before 6.2-23739-1 allows remote authenticated users to execute arbitrary OS commands via the (1) MKD or (2) RMD command. Synology DiskStation Manager (DSM) is an operating system for network storage servers (NAS) developed by Synology, Taiwan. The operating system can manage data, documents, photos, music and other information. The vulnerability comes from the fact that the network system or product does not correctly filter special elements in the process of constructing executable commands from external input data. Attackers can exploit this vulnerability to execute illegal commands
VAR-201904-0598 CVE-2018-13283 Synology SSL VPN Client Vulnerabilities related to authorization, permissions, and access control CVSS V2: 5.8
CVSS V3: 7.4
Severity: HIGH
Lack of administrator control over security vulnerability in client.cgi in Synology SSL VPN Client before 1.2.5-0226 allows remote attackers to conduct man-in-the-middle attacks via the (1) command, (2) hostname, or (3) port parameter. Synology SSL VPN Client Contains vulnerabilities related to authorization, permissions, and access control.Information may be obtained and information may be altered. Synology SSL VPN Client is a VPN client software developed by Synology Corporation of Taiwan, China for securely connecting to Synology NAS. The vulnerability stems from the lack of effective permissions and access control measures in network systems or products
VAR-201904-0595 CVE-2018-13378 Fortinet FortiSIEM Vulnerable to information disclosure CVSS V2: 4.0
CVSS V3: 7.2
Severity: HIGH
An information disclosure vulnerability in Fortinet FortiSIEM 5.2.0 and below versions exposes the LDAP server plaintext password via the HTML source code. Fortinet FortiSIEM Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Fortinet Security Information & Event Management System (FortiSIEM) is a set of security information and event management system of Fortinet Corporation. Security event management of assets such as the system's infrastructure, applications, and virtual machines. The admin portal in Fortinet FortiSIEM 5.2.0 and earlier versions has an information disclosure vulnerability, which is caused by a configuration error in the network system or product during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components
VAR-201904-0610 CVE-2018-13295 Synology Application Service Vulnerable to information disclosure CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Information exposure vulnerability in SYNO.Personal.Application.Info in Synology Application Service before 1.5.4-0320 allows remote authenticated users to obtain sensitive system information via the version parameter. Synology Application Service is a Synology NAS (Network Storage Server) function extension framework developed by China Taiwan Synology Corporation
VAR-201903-1735 No CVE WSD-T13 Cloud Storage Camera (Android Client) Has Unauthorized Access Vulnerability (CNVD-2019-06647) CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
Shenzhen Woshida Technology Co., Ltd. is an enterprise specializing in the development, production, sales and service of security monitoring products. The WSD-T13 cloud storage camera (Android client) has an unauthorized access vulnerability. The vulnerability is caused by the server's weak check of the client's request data. An attacker could use the vulnerability to modify the login password of other accounts.
VAR-201903-1737 No CVE WSD-T13 Cloud Storage Camera Has Unauthorized Addition Vulnerability CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
Shenzhen Woshida Technology Co., Ltd. is an enterprise specializing in the development, production, sales and service of security monitoring products. The WSD-T13 cloud storage camera has an unauthorized addition vulnerability. The vulnerability is due to the manufacturer's use of default passwords. Allows attackers to use vulnerabilities to add camera accounts and control other people's devices.
VAR-201903-1741 No CVE WSD-T13 cloud storage camera (Android client) has unauthorized access vulnerability CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
Shenzhen Woshida Technology Co., Ltd. is an enterprise specializing in the development, production, sales and service of security monitoring products. The WSD-T13 cloud storage camera (Android client) has an unauthorized access vulnerability. The vulnerability is caused by the server's inadequate verification of client request data. An attacker could use the vulnerability to query the account information of other users.
VAR-201903-1407 CVE-2019-10664 Domoticz SQL Injection Vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Domoticz before 4.10578 allows SQL Injection via the idx parameter in CWebServer::GetFloorplanImage in WebServer.cpp. Domoticz Is SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Domoticz is an open source smart home system. The system supports the monitoring and control of a variety of smart home devices. A SQL injection vulnerability exists in versions prior to Domoticz 4.10578 that stems from the lack of validation of externally-entered SQL statements for database-based applications. An attacker could exploit this vulnerability to execute an illegal SQL command
VAR-201903-1398 CVE-2019-10655 plural Grandstream Product buffer error vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Grandstream GAC2500 1.0.3.35, GXP2200 1.0.3.27, GVC3202 1.0.3.51, GXV3275 before 1.0.3.219 Beta, and GXV3240 before 1.0.3.219 Beta devices allow unauthenticated remote code execution via shell metacharacters in a /manager?action=getlogcat priority field, in conjunction with a buffer overflow (via the phonecookie cookie) to overwrite a data structure and consequently bypass authentication. This can be exploited remotely or via CSRF because the cookie can be placed in an Accept HTTP header in an XMLHttpRequest call to lighttpd. plural Grandstream The product contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Grandstream GAC2500, etc. are all products of the American trend network (Grandstream). Grandstream GAC2500 is a business conference phone device based on Android platform. Grandstream GXP2200 is an IP phone. Grandstream GVC3202 is a full HD video conferencing device. A buffer error vulnerability exists in several Grandstream products. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. The following products and versions are affected: Grandstream GAC2500 version 1.0.3.35; GXP2200 version 1.0.3.27; GVC3202 version 1.0.3.51; GXV3275 version before 1.0.3.219 Beta; GXV3240 version before 1.0.3.219 Beta
VAR-201903-1740 No CVE SQL Injection Vulnerability in Shandong Zhixin Information Technology Co., Ltd. Website Construction System CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Shandong Zhixin Information Technology Co., Ltd. is a comprehensive high-tech enterprise integrating software research and development, system integration, Internet of Things, virtual reality, big data, cloud computing, artificial intelligence and Internet services. There is a SQL injection vulnerability in the website construction system of Shandong Zhixin Information Technology Co., Ltd. An attacker could use the vulnerability to obtain sensitive database information.
VAR-201903-1401 CVE-2019-10658 Grandstream GWN7610 Command injection vulnerability in devices CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Grandstream GWN7610 before 1.0.8.18 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the filename in a /ubus/controller.icc.update_nds_webroot_from_tmp update_nds_webroot_from_tmp API call. Grandstream GWN7610 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Grandstream GWN7610 is a wireless access point device from Grandstream. There are security vulnerabilities in Grandstream GWN7610 versions prior to 1.0.8.18. An attacker could use this vulnerability to execute an illegal command
VAR-201903-1405 CVE-2019-10662 Grandstream UCM6204 Command injection vulnerability in devices CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Grandstream UCM6204 before 1.0.19.20 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the backupUCMConfig file-backup parameter to the /cgi? URI. Grandstream UCM6204 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Grandstream UCM6204 is an IP PBX (Private Branch eXchange) device from Grandstream. There are security vulnerabilities in Grandstream UCM6204 versions prior to 1.0.19.20. An attacker could use this vulnerability to execute an illegal command
VAR-201903-1402 CVE-2019-10659 Grandstream GXV3370 and WP820 Command injection vulnerability in devices CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Grandstream GXV3370 before 1.0.1.41 and WP820 before 1.0.3.6 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in a /manager?action=getlogcat priority field. Grandstream GXV3370 and WP820 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Both Grandstream GXV3370 and Grandstream WP820 are products of Grandstream. Grandstream GXV3370 is an IP video phone device. Grandstream WP820 is a portable business WiFi phone. There are security vulnerabilities in Grandstream GXV3370 versions before 1.0.1.41 and WP820 versions before 1.0.3.6. An attacker could use this vulnerability to execute an illegal command
VAR-201903-1400 CVE-2019-10657 Grandstream GWN7000 and GWN7610 Information disclosure vulnerability in devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Grandstream GWN7000 before 1.0.6.32 and GWN7610 before 1.0.8.18 devices allow remote authenticated users to discover passwords via a /ubus/uci.apply config request. Grandstream GWN7000 and GWN7610 The device contains an information disclosure vulnerability.Information may be obtained. Both Grandstream GWN7610 and Grandstream GWN7000 are products of Grandstream. Grandstream GWN7610 is a wireless access point device. Grandstream GWN7000 is an enterprise VPN router. The vulnerability stems from configuration errors during the operation of the network system or product. An unauthorized attacker could use the vulnerability to obtain sensitive information about the affected component
VAR-201903-1403 CVE-2019-10660 Grandstream GXV3611IR_HD Command injection vulnerability in devices CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Grandstream GXV3611IR_HD before 1.0.3.23 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the /goform/systemlog?cmd=set logserver field. Grandstream GXV3611IR_HD The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Grandstream GXV3611IR_HD is a webcam from Grandstream. There are security vulnerabilities in Grandstream GXV3611IR_HD versions before 1.0.3.23. An attacker could use this vulnerability to execute an illegal command
VAR-201903-1399 CVE-2019-10656 Grandstream GWN7000 Command injection vulnerability in devices CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Grandstream GWN7000 before 1.0.6.32 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the filename in a /ubus/uci.apply update_nds_webroot_from_tmp API call. Grandstream GWN7000 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Grandstream GWN7000 is an enterprise VPN router from Grandstream. There are security vulnerabilities in Grandstream GWN7000 versions prior to 1.0.6.32. An attacker could use this vulnerability to execute an illegal command
VAR-201903-1406 CVE-2019-10663 Grandstream UCM6204 SQL Injection Vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Grandstream UCM6204 before 1.0.19.20 devices allow remote authenticated users to conduct SQL injection attacks via the sord parameter in a listCodeblueGroup API call to the /cgi? URI. Grandstream UCM6204 The device includes SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The GrandstreamUCM6204 is an IPPBX (PrivateBrancheXchange, dedicated switch) device from Grandstream. A SQL injection vulnerability exists in versions prior to GrandstreamUCM62041.0.19.20. This vulnerability stems from the lack of validation of external input SQL statements for database-based applications. An attacker could exploit this vulnerability to execute an illegal SQL command
VAR-201903-1404 CVE-2019-10661 Grandstream GXV3611IR_HD Vulnerabilities related to certificate and password management in devices CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
On Grandstream GXV3611IR_HD before 1.0.3.23 devices, the root account lacks a password. Grandstream GXV3611IR_HD The device contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Grandstream GXV3611IR_HD is a webcam from Grandstream. There are security vulnerabilities in Grandstream GXV3611IR_HD versions before 1.0.3.23. Attackers can use default passwords, hard-coded passwords, hard-coded certificates, etc. to attack affected components