VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202408-0558 CVE-2024-42944 Shenzhen Tenda Technology Co.,Ltd.  of  fh1201  Out-of-bounds write vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromNatlimit function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. Shenzhen Tenda Technology Co.,Ltd. of fh1201 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state
VAR-202408-0744 CVE-2024-42943 Shenzhen Tenda Technology Co.,Ltd.  of  fh1201  Out-of-bounds write vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the PPPOEPassword parameter in the fromAdvSetWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. Shenzhen Tenda Technology Co.,Ltd. of fh1201 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. No detailed vulnerability details are currently available
VAR-202408-0699 CVE-2024-42942 Tenda  of  fh1201  Out-of-bounds write vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the frmL7ImForm function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. Tenda of fh1201 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. Tenda FH1201 is a wireless router from China's Tenda company. Attackers can exploit this vulnerability to consume server resources to destroy service availability
VAR-202408-0645 CVE-2024-42941 Shenzhen Tenda Technology Co.,Ltd.  of  fh1201  Out-of-bounds write vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the wanmode parameter in the fromAdvSetWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. Shenzhen Tenda Technology Co.,Ltd. of fh1201 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. No detailed vulnerability details are provided at this time
VAR-202408-0860 CVE-2024-42940 Shenzhen Tenda Technology Co.,Ltd.  of  fh1201  Out-of-bounds write vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromP2pListFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. Shenzhen Tenda Technology Co.,Ltd. of fh1201 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. No detailed vulnerability details are provided at this time
VAR-202408-0405 CVE-2024-7833 D-Link Systems, Inc.  of  di-8100  Command injection vulnerability in firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Medium
A vulnerability was found in D-Link DI-8100 16.07. It has been classified as critical. This affects the function upgrade_filter_asp of the file upgrade_filter.asp. The manipulation of the argument path leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of di-8100 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DI-8100 is a wireless broadband router designed for small and medium-sized network environments by China's D-Link Company. No detailed vulnerability details are provided at present
VAR-202408-0373 CVE-2024-7832 plural  D-Link Systems, Inc.  Classic buffer overflow vulnerability in the product CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this issue is the function cgi_get_fullscreen_photos of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument user leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. dns-120 firmware, dnr-202l firmware, dns-315l firmware etc. D-Link Systems, Inc. The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202408-0370 CVE-2024-7831 plural  D-Link Systems, Inc.  Classic buffer overflow vulnerability in the product CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this vulnerability is the function cgi_get_cooliris of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument path leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. dns-120 firmware, dnr-202l firmware, dns-315l firmware etc. D-Link Systems, Inc. The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202408-0372 CVE-2024-7830 plural  D-Link Systems, Inc.  Classic buffer overflow vulnerability in the product CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected is the function cgi_move_photo of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument photo_name leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. dns-120 firmware, dnr-202l firmware, dns-315l firmware etc. D-Link Systems, Inc. The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202408-0374 CVE-2024-7829 plural  D-Link Systems, Inc.  Classic buffer overflow vulnerability in the product CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. This issue affects the function cgi_del_photo of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument current_path leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. dns-120 firmware, dnr-202l firmware, dns-315l firmware etc. D-Link Systems, Inc. The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202408-0371 CVE-2024-7828 plural  D-Link Systems, Inc.  Classic buffer overflow vulnerability in the product CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. This vulnerability affects the function cgi_set_cover of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument album_name leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. dns-120 firmware, dnr-202l firmware, dns-315l firmware etc. D-Link Systems, Inc. The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202408-2038 CVE-2024-7513 Rockwell Automation  of  FactoryTalk View  Vulnerability in improper permission assignment for critical resources in CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
CVE-2024-7513 IMPACT A code execution vulnerability exists in the affected product. The vulnerability occurs due to improper default file permissions allowing any user to edit or replace files, which are executed by account with elevated permissions. Rockwell Automation of FactoryTalk View Contains a vulnerability in improper permission assignment for critical resources.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation FactoryTalk View SE is an industrial automation system view interface from Rockwell Automation of the United States
VAR-202408-1532 CVE-2024-40620 Rockwell Automation  of  Pavilion8  Vulnerability regarding lack of encryption of critical data in CVSS V2: 6.5
CVSS V3: 7.5
Severity: HIGH
CVE-2024-40620 IMPACT A vulnerability exists in the affected product due to lack of encryption of sensitive information. The vulnerability results in data being sent between the Console and the Dashboard without encryption, which can be seen in the logs of proxy servers, potentially impacting the data's confidentiality. Rockwell Automation Pavilion8 is a model prediction console from Rockwell Automation of the United States
VAR-202408-1824 CVE-2024-40619 Rockwell Automation  of  ControlLogix 5580  Controller Firmware and  GuardLogix 5580  Controller firmware exception condition check vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
CVE-2024-40619 IMPACT A denial-of-service vulnerability exists in the affected products. The vulnerability occurs when a malformed CIP packet is sent over the network to the device and results in a major nonrecoverable fault causing a denial-of-service. Rockwell Automation of ControlLogix 5580 Controller Firmware and GuardLogix 5580 The controller firmware contains a vulnerability in checking exceptional conditions.Service operation interruption (DoS) It may be in a state. Rockwell Automation ControlLogix and Rockwell Automation GuardLogix are both products of Rockwell Automation. Rockwell Automation ControlLogix is a controller. Rockwell Automation GuardLogix is a series of controllers
VAR-202408-1859 CVE-2024-20082 Buffer error vulnerability in multiple MediaTek products CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
In Modem, there is a possible memory corruption due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01182594; Issue ID: MSV-1529. media tech's NR15 , nr16 , NR17 Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202408-1102 CVE-2024-7567 Rockwell Automation Micro850/870 Denial of Service Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: Medium
A denial-of-service vulnerability exists via the CIP/Modbus port in the Rockwell Automation Micro850/870 (2080 -L50E/2080 -L70E). If exploited, the CIP/Modbus communication may be disrupted for short duration. Rockwell Automation Micro850/870 v20.011 has a denial of service vulnerability, which can be exploited by attackers to cause CIP/Modbus communication to be interrupted for a short period of time
VAR-202408-1016 CVE-2024-42740 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setLedCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands. (DoS) It may be in a state. TOTOLINK X5000R is a router of China's TOTOLINK Electronics. The vulnerability is caused by the setLedCfg function of the file /cgi-bin/cstecgi.cgi failing to properly filter special characters and commands in the constructed command
VAR-202408-0747 CVE-2024-42739 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setAccessDeviceCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands. (DoS) It may be in a state. TOTOLINK X5000r is a wireless router produced by TOTOLINK. The vulnerability is caused by the setAccessDeviceCfg function in the /cgi-bin/cstecgi.cgi file failing to properly validate or sanitize user-supplied input
VAR-202408-0563 CVE-2024-42738 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setDmzCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics
VAR-202408-0390 CVE-2024-42737 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in delBlacklist. Authenticated Attackers can send malicious packet to execute arbitrary commands. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics