VARIoT IoT vulnerabilities database

VAR-201809-1115 | CVE-2018-7936 | Mate 10 Pro Huawei Vulnerabilities related to security functions in smartphones |
CVSS V2: 4.9 CVSS V3: 4.6 Severity: MEDIUM |
Mate 10 Pro Huawei smart phones with the versions before BLA-L29 8.0.0.148(C432) have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can connect the phone with PC and send special instructions to install third party desktop and disable the boot wizard. As a result, the FRP function is bypassed. Mate 10 Pro Huawei Smartphones have vulnerabilities related to security functions.Information may be tampered with. HuaweiMate10Pro is a smartphone product of China's Huawei company
VAR-201808-0917 | CVE-2018-3895 | Samsung SmartThings Hub STH-ETH-250 Firmware buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An exploitable buffer overflow vulnerability exists in the /cameras/XXXX/clips handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 Firmware version 0.20.17. The strncpy call overflows the destination buffer, which has a size of 52 bytes. An attacker can send an arbitrarily long 'endTime' value in order to exploit this vulnerability. An attacker can send an HTTP request to trigger this vulnerability. Samsung SmartThings Hub STH-ETH-250 The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers
VAR-201808-0894 | CVE-2018-3916 | Samsung SmartThings Hub STH-ETH-250 Firmware buffer error vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 136 bytes. An attacker can send an arbitrarily long 'directory' value in order to exploit this vulnerability. An attacker can send an HTTP request to trigger this vulnerability. Samsung SmartThings Hub STH-ETH-250 The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers
VAR-201808-0206 | CVE-2018-15839 |
D-Link DIR-615 Device buffer error vulnerability
Related entries in the VARIoT exploits database: VAR-E-201809-0198 |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-615 devices have a buffer overflow via a long Authorization HTTP header. D-Link DIR-615 Devices contain a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-615 is a small wireless router product from D-Link. A buffer overflow vulnerability exists in D-LinkDIR-615. An attacker could exploit the vulnerability with a longer Authorization HTTP header to log off the router and cause a network outage
VAR-201808-0273 | CVE-2018-15884 | RICOH MP C4504ex Device cross-site request forgery vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
RICOH MP C4504ex devices allow HTML Injection via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter. RICOH MP C4504ex The device contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. RICOH MP C4504ex is a multi-function printer produced by Ricoh Corporation of Japan. A cross-site request forgery vulnerability exists in RICOH MP C4504ex. A remote attacker could exploit this vulnerability to add an administrator account by sending the 'entryNameIn' parameter to the /web/entry/en/address/adrsSetUserWizard.cgi URL
VAR-201810-0337 | CVE-2018-0464 | Cisco Data Center Network Manager Path traversal vulnerability in software |
CVSS V2: 5.5 CVSS V3: 8.1 Severity: HIGH |
A vulnerability in Cisco Data Center Network Manager software could allow an authenticated, remote attacker to conduct directory traversal attacks and gain access to sensitive files on the targeted system. The vulnerability is due to improper validation of user requests within the management interface. An attacker could exploit this vulnerability by sending malicious requests containing directory traversal character sequences within the management interface. An exploit could allow the attacker to view or create arbitrary files on the targeted system.
This issue is being tracked by Cisco Bug ID CSCvj86072. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-201808-0965 | CVE-2018-7795 | Schneider Electric PowerLogic PM5560 Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A Cross Protocol Injection vulnerability exists in Schneider Electric's PowerLogic (PM5560 prior to FW version 2.5.4) product. The vulnerability makes the product susceptible to cross site scripting attack on its web browser. User inputs can be manipulated to cause execution of java script code. Schneider Electric PowerLogic PM5560 Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. The Schneider Electric PowerLogic PM5560 is a versatile power metering device from Schneider Electric, France. A remote attacker can exploit the vulnerability to manipulate JavaScript code by manipulating input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks
VAR-201808-0397 | CVE-2018-14805 | ABB eSOMS Authentication vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
ABB eSOMS version 6.0.2 may allow unauthorized access to the system when LDAP is set to allow anonymous authentication, and specific key values within the eSOMS web.config file are present. Both conditions are required to exploit this vulnerability. ABB eSOMS Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ABB eSOMS is a set of factory operation management system of Swiss ABB company.
ABB eSOMS 6.0.2 version has an authorization vulnerability. Attackers can use this vulnerability to gain unauthorized access to the system.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks
VAR-201809-1116 | CVE-2018-7937 | Huawei HiRouter-CD20-10 and WS5200-10 Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
In Huawei HiRouter-CD20-10 with the versions before 1.9.6 and WS5200-10 with the versions before 1.9.6, there is a plug-in signature bypass vulnerability due to insufficient plug-in verification. An attacker may tamper with a legitimate plug-in to build a malicious plug-in and trick users into installing it. Successful exploit could allow the attacker to obtain the root permission of the device and take full control over the device. Huawei HiRouter-CD20-10 and WS5200-10 Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei HiRouter-CD20 and WS5200-10 are both home router products released by Huawei
VAR-201809-1117 | CVE-2018-7938 | Huawei P10 Information Disclosure Vulnerability |
CVSS V2: 4.3 CVSS V3: 3.3 Severity: LOW |
P10 Huawei smartphones with the versions before Victoria-AL00AC00B217 have an information leak vulnerability due to the lack of permission validation. An attacker tricks a user into installing a malicious application on the smart phone, and the application can read some hardware serial number, which may cause sensitive information leak. HuaweiP10 is a smartphone product of China's Huawei company
VAR-201808-0962 | CVE-2018-7790 | Schneider Electric Modicon M221 Vulnerability in information management |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An Information Management Error vulnerability exists in Schneider Electric's Modicon M221 product (all references, all versions prior to firmware V1.6.2.0). The vulnerability allows unauthorized users to replay authentication sequences. If an attacker exploits this vulnerability and connects to a Modicon M221, the attacker can upload the original program from the PLC. Schneider Electric Modicon M221 Contains information management vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Modicon M221 is a logic controller from Schneider Electric.
Attackers can exploit these issues to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks
VAR-201808-0961 | CVE-2018-7789 | Schneider Electric Modicon M221 Remote Security Bypass Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
An Improper Check for Unusual or Exceptional Conditions vulnerability exists in Schneider Electric's Modicon M221 product (all references, all versions prior to firmware V1.6.2.0). The vulnerability allows unauthorized users to remotely reboot Modicon M221 using crafted programing protocol frames. Schneider Electric Modicon M221 Contains an exceptional condition check vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Schneider Electric Modicon M221 is a programmable logic controller from Schneider Electric, France. A security vulnerability exists in Schneider Electric Modicon M221 that stems from a program that fails to properly detect anomalies. The vulnerability could be exploited by a remote attacker to restart the Modicon M221.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks
VAR-201808-0275 | CVE-2018-15887 | ASUS DSL-N12E_C1 In OS Command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Main_Analysis_Content.asp in ASUS DSL-N12E_C1 1.1.2.3_345 is prone to Authenticated Remote Command Execution, which allows a remote attacker to execute arbitrary OS commands via service parameters, such as shell metacharacters in the destIP parameter of a cmdMethod=ping request. ASUS DSL-N12E_C1 Is OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUSDSL-N12E_C1 is a wireless router product from ASUS. A remote command execution vulnerability exists in the Main_Analysis_Content.asp file in the ASUSDSL-N12E_C11.1.2.3_345 release
VAR-201808-0238 | CVE-2018-15904 | A10 ACOS Web Application Firewall In SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A10 ACOS Web Application Firewall (WAF) 2.7.1 and 2.7.2 before 2.7.2-P12, 4.1.0 before 4.1.0-P11, 4.1.1 before 4.1.1-P8, and 4.1.2 before 4.1.2-P4 mishandles the configured rules for blocking SQL injection attacks, aka A10-2017-0008. An attacker can exploit this vulnerability to execute arbitrary SQL commands by sending specially crafted SQL statements
VAR-201809-0238 | CVE-2018-1353 | Fortinet FortiManager Vulnerable to information disclosure |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
An information disclosure vulnerability in Fortinet FortiManager 6.0.1 and below versions allows a standard user with adom assignment read the interface settings of vdoms unrelated to the assigned adom. Fortinet FortiManager Contains an information disclosure vulnerability.Information may be obtained. Fortinet FortiManager is prone to an information-disclosure vulnerability.
Attackers can exploit this issue to obtain sensitive information that may aid in further attacks.
Versions prior to FortiManager 6.0.1 are vulnerable. Fortinet FortiManager is a centralized network security management platform developed by Fortinet. The platform supports centralized management of any number of Fortinet devices, and can group devices into different management domains (ADOMs) to further simplify multi-device security deployment and management
VAR-201808-0226 | CVE-2018-15602 | Zyxel VMG3312 B10B Device cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Zyxel VMG3312 B10B devices are affected by a persistent XSS vulnerability via the pages/connectionStatus/connectionStatus-hostEntry.cmd hostname parameter. Zyxel VMG3312 B10B The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. ZyxelVMG3312B10B is an Internet access gateway device from ZyXEL Technology. A cross-site scripting vulnerability exists in ZyxelVMG3312B10B. A remote attacker could exploit this vulnerability to inject arbitrary web scripts or HTML by sending a \342\200\230hostname\342\200\231 parameter to pages/connectionStatus/connectionStatus-hostEntry.cmdURL
VAR-201808-0217 | CVE-2018-15852 | Technicolor TC7200.20 Vulnerabilities related to security functions in devices |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
Technicolor TC7200.20 devices allow remote attackers to cause a denial of service (networking outage) via a flood of random MAC addresses, as demonstrated by macof. NOTE: Technicolor denies that the described behavior is a vulnerability and states that Wi-Fi traffic is slowed or stopped only while the devices are exposed to a MAC flooding attack. This has been confirmed through testing against official up-to-date versions. ** Unsettled ** This case has not been confirmed as a vulnerability. Technicolor TC7200.20 The device contains vulnerabilities related to security functions. The vendor has disputed this vulnerability. For details, see NVD of Current Description Please Confirm. https://nvd.nist.gov/vuln/detail/CVE-2018-15852Service operation interruption (DoS) There is a possibility of being put into a state. TechnicolorTC7200.20 is a modem device from Technicolor, India. A buffer overflow vulnerability exists in TechnicolorTC7200.20
VAR-201808-0266 | CVE-2018-15874 | D-Link DIR-615 Router cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability on D-Link DIR-615 routers 20.07 allows an attacker to inject JavaScript into the "Status -> Active Client Table" page via the hostname field in a DHCP request. D-Link DIR-615 The router contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-615 is a small wireless router product from D-Link. A cross-site scripting vulnerability exists in D-LinkDIR-61520.07
VAR-201808-0267 | CVE-2018-15875 | D-Link DIR-615 Router cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability on D-Link DIR-615 routers 20.07 allows attackers to inject JavaScript into the router's admin UPnP page via the description field in an AddPortMapping UPnP SOAP request. D-Link DIR-615 The router contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-615 is a small wireless router product from D-Link. A cross-site scripting vulnerability exists in D-LinkDIR-61520.07
VAR-201808-0573 | CVE-2018-11653 | Netwave IP camera Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
Information disclosure in Netwave IP camera at //etc/RT2870STA.dat (via HTTP on port 8000) allows an unauthenticated attacker to exfiltrate sensitive information about the network configuration like the network SSID and password. Netwave IP camera Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. NetwaveIPcamera is a network camera produced by Netwave Systems B.V. of the Netherlands. An information disclosure vulnerability exists in the /etc/RT2870STA.dat file in the NetwaveIP camera