VARIoT IoT vulnerabilities database
| VAR-201903-0363 | CVE-2019-3919 | Alcatel Lucent I-240W-Q GPON ONT Command injection vulnerability in some firmware |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
The Alcatel Lucent I-240W-Q GPON ONT using firmware version 3FE54567BOZJ19 is vulnerable to command injection via crafted HTTP request sent by a remote, authenticated attacker to /GponForm/usb_restore_Form?script/. Alcatel Lucent I-240W-Q GPON ONT Has a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. GPON (Gigabit-CapablePON) technology is the latest generation of broadband passive optical integrated access standard based on ITU-TG.984.x standard. It has many advantages such as high bandwidth, high efficiency, large coverage, rich user interface, etc. Operators are regarded as the ideal technology to realize broadband and integrated transformation of access network services. GPONHomeGateway is a router provided by ISPs for users. A remote command execution vulnerability exists in the GPON router that an attacker can use to execute arbitrary commands. Nokia Alcatel Lucent I-240W-Q GPON ONT is an optical network interruption device of Nokia Corporation of Finland
| VAR-201903-0364 | CVE-2019-3920 | Alcatel Lucent I-240W-Q GPON ONT Command injection vulnerability in some firmware |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
The Alcatel Lucent I-240W-Q GPON ONT using firmware version 3FE54567BOZJ19 is vulnerable to authenticated command injection via crafted HTTP request sent by a remote, authenticated attacker to /GponForm/device_Form?script/. Alcatel Lucent I-240W-Q GPON ONT Has a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. GPON (Gigabit-CapablePON) technology is the latest generation of broadband passive optical integrated access standard based on ITU-TG.984.x standard. It has many advantages such as high bandwidth, high efficiency, large coverage, rich user interface, etc. Operators are regarded as the ideal technology to realize broadband and integrated transformation of access network services. GPONHomeGateway is a router provided by ISPs for users. A remote command execution vulnerability exists in the GPON router that an attacker can use to execute arbitrary commands. Nokia Alcatel Lucent I-240W-Q GPON ONT is an optical network interruption device of Nokia Corporation of Finland
| VAR-201903-0365 | CVE-2019-3921 | Alcatel Lucent I-240W-Q GPON ONT Buffer error vulnerability in some firmware |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
The Alcatel Lucent I-240W-Q GPON ONT using firmware version 3FE54567BOZJ19 is vulnerable to a stack buffer overflow via crafted HTTP POST request sent by a remote, authenticated attacker to /GponForm/usb_Form?script/. An attacker can leverage this vulnerability to potentially execute arbitrary code. Alcatel Lucent I-240W-Q GPON ONT Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. GPON (Gigabit-CapablePON) technology is the latest generation of broadband passive optical integrated access standard based on ITU-TG.984.x standard. It has many advantages such as high bandwidth, high efficiency, large coverage, rich user interface, etc. Operators are regarded as the ideal technology to realize broadband and integrated transformation of access network services. GPONHomeGateway is a router provided by ISPs for users. There is an authentication stack overflow vulnerability in the GPON router, which can be exploited by an attacker to cause the server to crash. Nokia Alcatel Lucent I-240W-Q GPON ONT is an optical network interruption device of Nokia Corporation of Finland
| VAR-201903-0366 | CVE-2019-3922 | Alcatel Lucent I-240W-Q GPON ONT Buffer error vulnerability in some firmware |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
The Alcatel Lucent I-240W-Q GPON ONT using firmware version 3FE54567BOZJ19 is vulnerable to a stack buffer overflow via crafted HTTP POST request sent by a remote, unauthenticated attacker to /GponForm/fsetup_Form. An attacker can leverage this vulnerability to potentially execute arbitrary code. Alcatel Lucent I-240W-Q GPON ONT Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. GPON (Gigabit-CapablePON) technology is the latest generation of broadband passive optical integrated access standard based on ITU-TG.984.x standard. It has many advantages such as high bandwidth, high efficiency, large coverage, rich user interface, etc. Operators are regarded as the ideal technology to realize broadband and integrated transformation of access network services. GPONHomeGateway is a router provided by ISPs for users. An unauthenticated stack overflow vulnerability exists in a GPON router that an attacker can exploit to cause a server crash. Nokia Alcatel Lucent I-240W-Q GPON ONT is an optical network interruption device of Nokia Corporation of Finland
| VAR-201903-0361 | CVE-2019-3917 | Alcatel Lucent I-240W-Q GPON ONT Vulnerabilities related to access control in firmware |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The Alcatel Lucent I-240W-Q GPON ONT using firmware version 3FE54567BOZJ19 allows a remote, unauthenticated attacker to enable telnetd on the router via a crafted HTTP request. Alcatel Lucent I-240W-Q GPON ONT There is an access control vulnerability in the firmware.Information may be tampered with. GPON (Gigabit-CapablePON) technology is the latest generation of broadband passive optical integrated access standard based on ITU-TG.984.x standard. It has many advantages such as high bandwidth, high efficiency, large coverage, rich user interface, etc. Operators are regarded as the ideal technology to realize broadband and integrated transformation of access network services. GPONHomeGateway is a router provided by ISPs for users. The GPON router has a remote unauthenticated enable/disable Telnet service vulnerability that can be exploited by an attacker to enable/disable the Telnet service without authentication. Nokia Alcatel Lucent I-240W-Q GPON ONT is an optical network interruption device of Nokia Corporation of Finland. A security vulnerability exists in Nokia Alcatel Lucent I-240W-Q GPON ONTs using firmware version 3FE54567BOZJ19
| VAR-201912-0653 | CVE-2019-9556 |
FiberHome an5506-04-f Cross-site scripting vulnerability in devices
Related entries in the VARIoT exploits database: VAR-E-201903-0075 |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
FiberHome an5506-04-f RP2669 devices have XSS. FiberHome an5506-04-f The device contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. FiberHomeFiberhomeAN5506-04-F is a router from China FiberHome. A cross-site scripting vulnerability exists in the FiberhomeAN5506-04-FRP2669 release that caused the program to fail to properly filter user input. A remote attacker could exploit this vulnerability to run malicious data with Web application privileges
| VAR-201910-1493 | CVE-2018-16417 | Aruba Instant Injection vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Aruba Instant 4.x prior to 6.4.4.8-4.2.4.12, 6.5.x prior to 6.5.4.11, 8.3.x prior to 8.3.0.6, and 8.4.x prior to 8.4.0.1 allows Command injection. Aruba Instant Contains an injection vulnerability.Information may be obtained. ALEAlcatelOmniAccessWirelessAccessPoint is a wireless access point device from ALE France. A security vulnerability exists in ALEAlcatelOmniAccessWirelessAccessPoint. An attacker could exploit the vulnerability to view configuration commands by sending a specially crafted URL. Siemens SCALANCE W1750D is prone to following security vulnerabilities:
1. Multiple information disclosure vulnerabilities
2. Multiple remote command injection vulnerabilities
Attackers can exploit these issues to obtain sensitive information, or execute arbitrary commands or arbitrary HTML or script code in the browser of an unsuspecting user within the context of the affected application. This can allow the attacker to steal cookie-based authentication credentials and aid in further attacks.
Versions prior to SCALANCE W1750D 8.4.0.1 are vulnerable
| VAR-201905-0987 | CVE-2018-7084 | Aruba Instant Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: Critical |
A command injection vulnerability is present that permits an unauthenticated user with access to the Aruba Instant web interface to execute arbitrary system commands within the underlying operating system. An attacker could use this ability to copy files, read configuration, write files, delete files, or reboot the device. Workaround: Block access to the Aruba Instant web interface from all untrusted users. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.1. Aruba Instant Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Siemens SCALANCE W1750D is prone to following security vulnerabilities:
1. Multiple information disclosure vulnerabilities
2. A cross-site-scripting vulnerability
3. This can allow the attacker to steal cookie-based authentication credentials and aid in further attacks.
Versions prior to SCALANCE W1750D 8.4.0.1 are vulnerable
| VAR-201905-0986 | CVE-2018-7083 | Aruba Instant Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: High |
If a process running within Aruba Instant crashes, it may leave behind a "core dump", which contains the memory contents of the process at the time it crashed. It was discovered that core dumps are stored in a way that unauthenticated users can access them through the Aruba Instant web interface. Core dumps could contain sensitive information such as keys and passwords. Workaround: Block access to the Aruba Instant web interface from all untrusted users. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.0. Siemens SCALANCE W1750D is prone to following security vulnerabilities:
1. Multiple information disclosure vulnerabilities
2. A cross-site-scripting vulnerability
3. Multiple remote command injection vulnerabilities
Attackers can exploit these issues to obtain sensitive information, or execute arbitrary commands or arbitrary HTML or script code in the browser of an unsuspecting user within the context of the affected application. This can allow the attacker to steal cookie-based authentication credentials and aid in further attacks.
Versions prior to SCALANCE W1750D 8.4.0.1 are vulnerable
| VAR-201905-0988 | CVE-2018-7064 | Aruba Instant Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: Medium |
A reflected cross-site scripting (XSS) vulnerability is present in an unauthenticated Aruba Instant web interface. An attacker could use this vulnerability to trick an IAP administrator into clicking a link which could then take administrative actions on the Instant cluster, or expose the session cookie for an administrative session. Workaround: Administrators should make sure they log out of the Aruba Instant UI when not actively managing the system, and should use caution clicking links from external sources while logged into the IAP administrative interface. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.0. Siemens SCALANCE W1750D is prone to following security vulnerabilities:
1. Multiple information disclosure vulnerabilities
2. A cross-site-scripting vulnerability
3. Multiple remote command injection vulnerabilities
Attackers can exploit these issues to obtain sensitive information, or execute arbitrary commands or arbitrary HTML or script code in the browser of an unsuspecting user within the context of the affected application. This can allow the attacker to steal cookie-based authentication credentials and aid in further attacks.
Versions prior to SCALANCE W1750D 8.4.0.1 are vulnerable
| VAR-201903-0362 | CVE-2019-3918 | Alcatel Lucent I-240W-Q GPON ONT Vulnerabilities related to the use of hard-coded credentials in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
The Alcatel Lucent I-240W-Q GPON ONT using firmware version 3FE54567BOZJ19 contains multiple hard coded credentials for the Telnet and SSH interfaces. Alcatel Lucent I-240W-Q GPON ONT Firmware contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. GPON (Gigabit-CapablePON) technology is the latest generation of broadband passive optical integrated access standard based on ITU-TG.984.x standard. It has many advantages such as high bandwidth, high efficiency, large coverage, rich user interface, etc. Operators are regarded as the ideal technology to realize broadband and integrated transformation of access network services. GPONHomeGateway is a router provided by ISPs for users. A GPON router has a hard-coded vulnerabilities vulnerability that an attacker can use to obtain a login account password. Nokia Alcatel Lucent I-240W-Q GPON ONT is an optical network interruption device of Nokia Corporation of Finland. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
| VAR-201905-0985 | CVE-2018-7082 | Aruba Instant Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
A command injection vulnerability is present in Aruba Instant that permits an authenticated administrative user to execute arbitrary commands on the underlying operating system. A malicious administrator could use this ability to install backdoors or change system configuration in a way that would not be logged. Workaround: None. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.0. ALEAlcatelOmniAccessWirelessAccessPoint is a wireless access point device from ALE France. A command injection vulnerability exists in ALEAlcatelOmniAccessWirelessAccessPoint. The vulnerability stems from the fact that external input data constructs executable commands, and the network system or product does not properly filter the special elements. An attacker could exploit the vulnerability to execute an illegal command. Siemens SCALANCE W1750D is prone to following security vulnerabilities:
1. Multiple information disclosure vulnerabilities
2. A cross-site-scripting vulnerability
3. This can allow the attacker to steal cookie-based authentication credentials and aid in further attacks.
Versions prior to SCALANCE W1750D 8.4.0.1 are vulnerable
| VAR-202108-0228 | CVE-2018-17865 | SAP J2EE Engine Cross-site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A cross-site scripting (XSS) vulnerability in SAP J2EE Engine 7.01 allows remote attackers to inject arbitrary web script via the wsdlPath parameter to /ctcprotocol/Protocol. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site and to steal cookie-based authentication credentials
| VAR-202108-0227 | CVE-2018-17862 | SAP J2EE Engine Cross-site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A cross-site scripting (XSS) vulnerability in SAP J2EE Engine/7.01/Fiori allows remote attackers to inject arbitrary web script via the sys_jdbc parameter to /TestJDBC_Web/test2. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site and to steal cookie-based authentication credentials
| VAR-201903-1738 | No CVE | Command execution vulnerability in Philips smart wireless speaker web service formPlayURL network interface |
CVSS V2: 8.3 CVSS V3: - Severity: HIGH |
Philips Smart Wireless Speaker is an artificial intelligence-based music player that can be networked.
A command execution vulnerability exists in the formPlayURL network interface of the Philips Smart Wireless Speaker web service. Attackers can use this vulnerability to execute commands.
| VAR-201903-1734 | No CVE | Command execution vulnerability in Philips smart wireless speaker web service formUpgradeURL network interface |
CVSS V2: 8.3 CVSS V3: - Severity: HIGH |
Philips Smart Wireless Speaker is an artificial intelligence-based music player that can be networked.
There is a command execution vulnerability in the formUpgradeURL network interface of the Philips Smart Wireless Speaker web service. An attacker could use this vulnerability to execute a command.
| VAR-201903-0536 | CVE-2019-9483 | Amazon Ring Doorbell Vulnerabilities related to cryptographic strength |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
Amazon Ring Doorbell before 3.4.7 mishandles encryption, which allows attackers to obtain audio and video data, or insert spoofed video that does not correspond to the actual person at the door. Amazon Ring Doorbell Contains a cryptographic strength vulnerability.Information may be obtained and information may be altered
| VAR-201903-1454 | CVE-2018-8790 | Check Point ZoneAlarm Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Check Point ZoneAlarm version 15.3.064.17729 and below expose a WCF service that can allow a local low privileged user to execute arbitrary code as SYSTEM. Check Point ZoneAlarm Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Check Point ZoneAlarm is prone to a local arbitrary code-execution vulnerability.
ZoneAlarm version 15.3.064.17729 and prior are vulnerable. Check Point ZoneAlarm is a network firewall program of Israel Check Point Company
| VAR-201902-0946 | No CVE | (0Day) Advantech WebAccess Node tv_enua Stack-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within tv_enua.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.
| VAR-201903-0179 | CVE-2019-6528 | plural PSI GridConnect GmbH Input validation vulnerabilities in products |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
PSI GridConnect GmbH Telecontrol Gateway and Smart Telecontrol Unit family, IEC104 Security Proxy versions Telecontrol Gateway 3G Versions 4.2.21, 5.0.27, 5.1.19, 6.0.16 and prior, and Telecontrol Gateway XS-MU Versions 4.2.21, 5.0.27, 5.1.19, 6.0.16 and prior, and Telecontrol Gateway VM Versions 4.2.21, 5.0.27, 5.1.19, 6.0.16 and prior, and Smart Telecontrol Unit TCG Versions 5.0.27, 5.1.19, 6.0.16 and prior, and IEC104 Security Proxy Version 2.2.10 and prior The web application browser interprets input as active HTML, JavaScript, or VBScript, which could allow an attacker to execute arbitrary code. Multiple PSI GridConnect GmbH Products are prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. A remote attacker could exploit this vulnerability to execute arbitrary scripts