VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202501-2809 CVE-2024-46450 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Lack of Authentication Vulnerability in Firmware CVSS V2: 9.4
CVSS V3: 8.1
Severity: HIGH
Incorrect access control in Tenda AC1200 Smart Dual-Band WiFi Router Model AC6 v2.0 Firmware v15.03.06.50 allows attackers to bypass authentication via a crafted web request. Shenzhen Tenda Technology Co.,Ltd. of AC6 A lack of authentication vulnerability exists in the firmware.Information may be obtained and information may be tampered with. Tenda AC1200 has an access control error vulnerability, which is caused by incorrect access control. No detailed vulnerability details are currently provided
VAR-202501-1595 CVE-2024-57583 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC18 V15.03.05.19 was discovered to contain a command injection vulnerability via the usbName parameter in the formSetSambaConf function. Shenzhen Tenda Technology Co.,Ltd. of AC18 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker can exploit this vulnerability to cause arbitrary command execution
VAR-202501-3185 CVE-2024-57582 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the startIP parameter in the formSetPPTPServer function. Shenzhen Tenda Technology Co.,Ltd. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC18 has a buffer overflow vulnerability. The vulnerability is caused by the startIP parameter of the formSetPPTPServer function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1975 CVE-2024-57581 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the firewallEn parameter in the formSetFirewallCfg function. Shenzhen Tenda Technology Co.,Ltd. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC18 has a buffer overflow vulnerability. The vulnerability is caused by the firewallEn parameter of the formSetFirewallCfg function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-3379 CVE-2024-57580 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the devName parameter in the formSetDeviceName function. Shenzhen Tenda Technology Co.,Ltd. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC18 has a buffer overflow vulnerability. The vulnerability is caused by the devName parameter of the formSetDeviceName function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-3590 CVE-2024-57579 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the limitSpeedUp parameter in the formSetClientState function. Shenzhen Tenda Technology Co.,Ltd. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC18 has a buffer overflow vulnerability. The vulnerability is caused by the limitSpeedUp parameter of the formSetClientState function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-2776 CVE-2024-57578 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 5.5
CVSS V3: 8.8
Severity: HIGH
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the funcpara1 parameter in the formSetCfm function. Shenzhen Tenda Technology Co.,Ltd. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. There is a buffer overflow vulnerability in the Tenda AC18 15.03.05.19 version. The vulnerability is caused by the fact that the funcpara1 parameter of the formSetCfm function fails to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code or cause a denial of service
VAR-202501-2561 CVE-2024-57577 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 5.5
CVSS V3: 5.7
Severity: MEDIUM
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the speed_dir parameter in the formSetSpeedWan function. Shenzhen Tenda Technology Co.,Ltd. of AC18 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. Tenda AC18 has a buffer overflow vulnerability. The vulnerability is caused by the speed_dir parameter of the formSetSpeedWan function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1596 CVE-2024-57575 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function. Shenzhen Tenda Technology Co.,Ltd. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC18 has a buffer overflow vulnerability. The vulnerability is caused by the ssid parameter of the form_fast_setting_wifi_set function failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-2157 CVE-2024-57684 D-Link Systems, Inc.  of  DIR-816  Improper default permissions vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An access control issue in the component formDMZ.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the DMZ service of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 A firmware vulnerability related to improper default permissions exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-816A2 is a router from D-Link, a Chinese company. D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the formDMZ.cgi component
VAR-202501-3371 CVE-2024-57683 D-Link Systems, Inc.  of  DIR-816  Fraudulent Authentication Vulnerability in Firmware CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
An access control issue in the component websURLFilterAddDel of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the filter settings of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 An incorrect authentication vulnerability exists in firmware.Information may be obtained. D-Link DIR-816A2 is a router from D-Link, a Chinese company. D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the websURLFilterAddDel component
VAR-202501-1968 CVE-2024-57682 D-Link Systems, Inc.  of  DIR-816  Lack of Authentication Vulnerability in Firmware CVSS V2: 6.8
CVSS V3: 6.5
Severity: MEDIUM
An information disclosure vulnerability in the component d_status.asp of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to access sensitive information via a crafted POST request. D-Link Systems, Inc. of DIR-816 A lack of authentication vulnerability exists in the firmware.Information may be obtained. D-Link DIR-816A2 is a router from D-Link, a Chinese company. D-Link DIR-816A2 has an information leakage vulnerability
VAR-202501-3179 CVE-2024-57681 D-Link Systems, Inc.  of  DIR-816  Fraudulent Authentication Vulnerability in Firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
An access control issue in the component form2alg.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the agl service of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 An incorrect authentication vulnerability exists in firmware.Information may be obtained. D-Link DIR-816A2 is a router from D-Link, a Chinese company. D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the form2alg.cgi component
VAR-202501-1781 CVE-2024-57680 D-Link Systems, Inc.  of  DIR-816  Fraudulent Authentication Vulnerability in Firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
An access control issue in the component form2PortriggerRule.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the port trigger of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 An incorrect authentication vulnerability exists in firmware.Information may be obtained. D-Link DIR-816A2 is a router from D-Link, a Chinese company. D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the form2PortriggerRule.cgi component
VAR-202501-2357 CVE-2024-57679 D-Link Systems, Inc.  of  DIR-816  Fraudulent Authentication Vulnerability in Firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
An access control issue in the component form2RepeaterSetup.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G repeater service of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 An incorrect authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. D-Link DIR-816A2 is a router from D-Link, a Chinese company. D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the form2RepeaterSetup.cgi component
VAR-202501-2556 CVE-2024-57678 D-Link Systems, Inc.  of  DIR-816  Fraudulent Authentication Vulnerability in Firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
An access control issue in the component form2WlAc.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G mac access control list of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 An incorrect authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. D-Link DIR-816A2 is a router from D-Link, a Chinese company. D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the form2WlAc.cgi component
VAR-202501-2770 CVE-2024-57677 D-Link Systems, Inc.  of  DIR-816  Fraudulent Authentication Vulnerability in Firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
An access control issue in the component form2Wan.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the wan service of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 An incorrect authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. D-Link DIR-816A2 is a router from D-Link, a Chinese company. D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the form2Wan.cgi component
VAR-202501-2978 CVE-2024-57676 D-Link Systems, Inc.  of  DIR-816  Fraudulent Authentication Vulnerability in Firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
An access control issue in the component form2WlanBasicSetup.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G wlan service of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 An incorrect authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. D-Link DIR-816A2 is a router from D-Link, a Chinese company. D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the form2WlanBasicSetup.cgi component
VAR-202501-1996 CVE-2024-48885 Path traversal vulnerability in multiple Fortinet products CVSS V2: -
CVSS V3: 5.3
Severity: MEDIUM
A improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiRecorder 7.2.0 through 7.2.1, FortiRecorder 7.0.0 through 7.0.4, FortiVoice 7.0.0 through 7.0.4, FortiVoice 6.4.0 through 6.4.9, FortiVoice 6.0 all versions, FortiWeb 7.6.0, FortiWeb 7.4.0 through 7.4.4, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions, FortiWeb 6.4 all versions allows attacker to escalate privilege via specially crafted packets. FortiManager , FortiManager Cloud , FortiProxy There is a path traversal vulnerability in several Fortinet products, including:Information is tampered with and service operation is interrupted (DoS) It may be in a state
VAR-202501-4394 No CVE Netgear EX6120 WiFi Range Extender has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Netgear EX6120 WiFi Range Extender‌ is a dual-band 1200Mbps WiFi range extender. Netgear EX6120 WiFi Range Extender has a weak password vulnerability that can be exploited by attackers to obtain sensitive information.