VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201809-0840 CVE-2018-17023 ASUS GT-AC5300 Cross-Site Request Forgery Vulnerability CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
Cross-site request forgery (CSRF) vulnerability on ASUS GT-AC5300 routers with firmware through 3.0.0.4.384_32738 allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via a request to start_apply.htm. ASUS GT-AC5300 The router contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The ASUSGT-AC5300 is a wireless router from ASUS
VAR-201809-0838 CVE-2018-17021 ASUS GT-AC5300 Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability on ASUS GT-AC5300 devices with firmware through 3.0.0.4.384_32738 allows remote attackers to inject arbitrary web script or HTML via the appGet.cgi hook parameter. ASUS GT-AC5300 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. The ASUSGT-AC5300 is a wireless router from ASUS. A cross-site scripting vulnerability exists in ASUSGT-AC5300 with 3.0.0.4.384_32738 and previous firmware
VAR-201809-0823 CVE-2018-17007 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wireless wlan_wds_2g ssid. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0821 CVE-2018-17005 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for firewall dmz enable. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0824 CVE-2018-17008 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wireless wlan_host_2g power. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0827 CVE-2018-17011 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for hosts_info para sun. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0820 CVE-2018-17004 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wlan_access name. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0837 CVE-2018-17020 ASUS GT-AC5300 Vulnerability related to input validation on devices CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
ASUS GT-AC5300 devices with firmware through 3.0.0.4.384_32738 allow remote attackers to cause a denial of service via a single "GET / HTTP/1.1\r\n" line. ASUS GT-AC5300 The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The ASUSGT-AC5300 is a wireless router from ASUS. A security vulnerability exists in ASUSGT-AC5300 using 3.0.0.4.384_32738 and previous firmware. An attacker could exploit the vulnerability by sending \342\200\230GET/HTTP/1.1\\r\\n\342\200\231 to cause a denial of service
VAR-201809-0831 CVE-2018-17015 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for ddns phddns username. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0833 CVE-2018-17017 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for dhcpd udhcpd enable. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0834 CVE-2018-17018 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for time_switch name. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0830 CVE-2018-17014 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for ip_mac_bind name. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-1342 No CVE NSG 9000-6G has arbitrary file reading vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The NSG ™ 9000-6G high-density universal edgeQAM system is a highly integrated digital video solution for multiplexing on-demand video content over IP networks. NSG 9000-6G has an arbitrary file reading vulnerability, which can be used by an attacker to read sensitive files.
VAR-201809-1336 No CVE Information disclosure vulnerability exists in NSG 9000-6G CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The NSG ™ 9000-6G high-density universal edgeQAM system is a highly integrated digital video solution for multiplexing on-demand video content over IP networks. There is an information disclosure vulnerability in NSG 9000-6G, which can be used by attackers to obtain system sensitive information.
VAR-201809-1338 No CVE Command execution vulnerability in Lenovo M7650DNF printer CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Lenovo M7650DNF is a black and white laser all-in-one machine that is targeted at individual users, SOHO offices and small and medium-sized enterprises with copy / scan / fax requirements. The Lenovo M7650DNF printer has a command execution vulnerability that could allow an attacker to execute commands remotely.
VAR-201809-1152 CVE-2018-7991 Huawei smartphone Mate10 Vulnerabilities related to security functions CVSS V2: 2.1
CVSS V3: 4.6
Severity: MEDIUM
Huawei smartphones Mate10 with versions earlier before ALP-AL00B 8.0.0.110(C00) have a Factory Reset Protection (FRP) bypass vulnerability. The system does not sufficiently verify the permission, an attacker uses a data cable to connect the smartphone to the computer and then perform some specific operations. Successful exploit could allow the attacker bypass the FRP protection to access the system setting page. Huawei smartphone Mate10 Contains vulnerabilities related to security features.Information may be tampered with. HuaweiMate10 is a smartphone product. HuaweiMate10 has an FRP bypass vulnerability
VAR-201809-0829 CVE-2018-17013 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for protocol wan wan_rate. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0832 CVE-2018-17016 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for reboot_timer name. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-1170 CVE-2018-5549 BIG-IP APM Input validation vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
On BIG-IP APM 11.6.0-11.6.3.1, 12.1.0-12.1.3.3, 13.0.0, and 13.1.0-13.1.0.3, APMD may core when processing SAML Assertion or response containing certain elements. BIG-IP APM Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5 BIG-IP APM is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. BIG-IP APM 14.0.0, 13.1.0, 13.0.0, 12.1.0 through 12.1.3, and 11.6.1 through 11.6.3 are vulnerable. F5 BIG-IP Access Policy Manager (APM) is a set of access and security solutions from F5 Corporation of the United States. The solution provides unified access to business-critical applications and networks. The following versions are affected: F5 BIG-IP APM version 11.6.0 to 11.6.3.1, 12.1.0 to 12.1.3.3, 13.0.0, 13.1.0 to 13.1.0.3
VAR-201809-1168 CVE-2018-5545 F5 WebSafe Alert Server Input validation vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
On F5 WebSafe Alert Server 1.0.0-4.2.6, a malicious, authenticated user can execute code on the alert server by using a maliciously crafted payload. F5 WebSafe Alert Server Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Successfully exploiting this issue may allow an attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts may cause a denial-of-service condition. F5 WebSafe is a set of network fraud protection solutions from F5 Corporation of the United States. The solution provides malware and fraud detection, client mobile threat protection, and more