VARIoT IoT vulnerabilities database
| VAR-202412-0587 | CVE-2024-37606 | D-Link Systems, Inc. of DCS-932L Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 6.5 Severity: MEDIUM |
A Stack overflow vulnerability in D-Link DCS-932L REVB_FIRMWARE_2.18.01 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request. D-Link Systems, Inc. of DCS-932L Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. D-Link DCS-932L is a network surveillance camera from D-Link, a Chinese company. It is used for security and monitoring.
D-Link DCS-932L REVB_FIRMWARE_2.18.01 version has a denial of service vulnerability, which is caused by null pointer dereference
| VAR-202412-0606 | CVE-2024-37605 | D-Link Systems, Inc. of DIR-860L in the firmware NULL Pointer dereference vulnerability |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
A NULL pointer dereference in D-Link DIR-860L REVB_FIRMWARE_2.04.B04_ic5b allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request. D-Link Systems, Inc. of DIR-860L The firmware has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. D-Link DIR-860L is a wireless router from D-Link, a Chinese company. An attacker can exploit this vulnerability to cause a denial of service
| VAR-202412-0623 | CVE-2024-36832 | D-Link Systems, Inc. of DAP-1513 in the firmware NULL Pointer dereference vulnerability |
CVSS V2: 7.6 CVSS V3: 7.5 Severity: HIGH |
A NULL pointer dereference in D-Link DAP-1513 REVA_FIRMWARE_1.01 allows attackers to cause a Denial of Service (DoS) via a crafted web request without authentication. The vulnerability occurs in the /bin/webs binary of the firmware. When /bin/webs receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference, leading to a denial of service attack to the device. D-Link Systems, Inc. of DAP-1513 The firmware has NULL There is a vulnerability in pointer dereference.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DAP-1513 is a wireless bridge produced by D-Link of China. Attackers can exploit this vulnerability to cause a denial of service
| VAR-202412-0630 | CVE-2024-36831 | D-Link Systems, Inc. of D-Link DAP-1520 in the firmware NULL Pointer dereference vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A NULL pointer dereference in the plugins_call_handle_uri_clean function of D-Link DAP-1520 REVA_FIRMWARE_1.10B04_BETA02_HOTFIX allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request without authentication. D-Link Systems, Inc. of D-Link DAP-1520 The firmware has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. D-Link DAP-1520 is a wireless access point product of D-Link, a Chinese company. Attackers can exploit this vulnerability to cause a denial of service
| VAR-202412-0834 | No CVE | Siemens SIMATIC PCS neo Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
SIMATIC PCS neo is a fully web-based process control system.
Siemens SIMATIC PCS neo has a buffer overflow vulnerability that can be exploited by unauthenticated remote attackers to execute arbitrary code.
| VAR-202412-3346 | No CVE | Siemens Opcenter RDL Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
The Opcenter Research Development & Laboratory (RD&L) series of software products can simplify, optimize and adjust the formulation product development, improve the innovation efficiency of fast-moving consumer goods, and optimize the data management of fast-moving consumer goods.
Siemens Opcenter RDL has a buffer overflow vulnerability, which can be exploited by unauthenticated remote attackers to execute arbitrary code.
| VAR-202412-3345 | No CVE | Siemens Opcenter Quality Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Opcenter Quality is a closed-loop quality management system (QMS) product series launched by Siemens, which aims to ensure that products meet requirements and promote continuous improvement, thereby providing high-quality products.
Siemens Opcenter Quality has a buffer overflow vulnerability, which can be exploited by unauthenticated remote attackers to execute arbitrary code.
| VAR-202412-3098 | No CVE | Siemens SINEC NMS Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
SINEC NMS is a network management system (NMS) that can scale to handle network structures of all sizes in an increasingly digital world. The system can be used to centrally monitor, manage and configure industrial networks covering tens of thousands of devices around the clock, including safety-related areas.
A buffer overflow vulnerability exists in Siemens SINEC NMS that can be exploited by an unauthenticated remote attacker to execute arbitrary code.
| VAR-202412-0653 | No CVE | Siemens Opcenter Execution Foundation Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Opcenter Execution Foundation is a manufacturing execution system (MES) software launched by Siemens, which is mainly used to monitor and synchronize the manufacturing activities of all factories around the world. The software implements low-code personalization through embedded Mendix technology, allowing users to customize and develop systems suitable for specific production scenarios according to their own needs.
Siemens Opcenter Execution Foundation has a buffer overflow vulnerability, which can be exploited by unauthenticated remote attackers to execute arbitrary code.
| VAR-202412-3430 | No CVE | Taiwan Sharp Corporation SHARP-MX-2630N has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
SHARP-MX-2630N is a multi-function color digital MFP.
SHARP-MX-2630N of Taiwan Sharp Corporation has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202412-3429 | No CVE | Samsung (China) Investment Co., Ltd. C145x-Series has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Samsung (China) Investment Co., Ltd. is an enterprise mainly engaged in business services.
Samsung (China) Investment Co., Ltd. C145x-Series has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202412-3428 | No CVE | Epson (China) Co., Ltd. L15160 Series has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The L15160 Series is a multi-function printer designed for small and medium-sized office groups.
Epson (China) Co., Ltd. L15160 Series has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202412-3099 | No CVE | Siemens Totally Integrated Automation Portal (TIA Portal) Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Totally Integrated Automation Portal (TIA Portal) is an integrated automation platform that provides a full range of digital automation services from digital planning to integrated engineering and transparent operation. TIA Portal is designed to shorten time to market, improve factory production efficiency, and increase system flexibility. It includes innovative simulation tools, seamlessly integrated engineering functions, and transparent operation management, and is particularly suitable for system integrators, machine manufacturers, and factory operators.
Siemens Totally Integrated Automation Portal (TIA Portal) has a buffer overflow vulnerability that can be exploited by unauthenticated remote attackers to execute arbitrary code.
| VAR-202412-2941 | No CVE | Siemens Opcenter Intelligence Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Opcenter Intelligence is a manufacturing intelligence solution launched by Siemens, which aims to improve the efficiency and quality of the manufacturing process through big data analysis. The solution provides a variety of products and services to meet the needs of different users.
Siemens Opcenter Intelligence has a buffer overflow vulnerability, which can be exploited by unauthenticated remote attackers to execute arbitrary code.
| VAR-202412-2239 | CVE-2024-47238 | Vulnerabilities in multiple Dell products |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution. Embedded Box PC 3000 firmware, Dell Edge Gateway 3001 firmware, Dell Edge Gateway 3002 Unspecified vulnerabilities exist in multiple Dell products, including firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202412-1095 | CVE-2024-46341 | TP-LINK Technologies of TL-WR845N Insufficient Credential Protection Vulnerability in Firmware |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
TP-Link TL-WR845N(UN)_V4_190219 was discovered to transmit credentials in base64 encoded form, which can be easily decoded by an attacker executing a man-in-the-middle attack. TP-LINK Technologies of TL-WR845N A firmware vulnerability related to insufficient protection of credentials exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK WR845N is a wireless router from China's TP-LINK company
| VAR-202412-0457 | CVE-2024-53832 | Siemens SICAM A8000 CP-8031 and CP-8050 Firmware Decryption Vulnerability |
CVSS V2: 6.1 CVSS V3: 4.6 Severity: Medium |
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V05.30). The affected devices contain a secure element which is connected via an unencrypted SPI bus. This could allow an attacker with physical access to the SPI bus to observe the password used for the secure element authentication, and then use the secure element as an oracle to decrypt all encrypted update files. SICAM A8000 RTU (Remote Terminal Unit) is a modular device for remote control and automation applications in all energy supply sectors
| VAR-202412-0349 | CVE-2024-53242 | Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Out-of-bounds read vulnerability in |
CVSS V2: 6.0 CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.
This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25206). Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files in the wrltojt module. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production throughput and improve manufacturing system performance
| VAR-202412-0348 | CVE-2024-53041 | Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Stack-based buffer overflow vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain a stack based overflow vulnerability while parsing specially crafted WRL files.
This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25000). Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files in the wrltojt module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume and improve manufacturing system performance
| VAR-202412-0387 | CVE-2024-52051 | Siemens Engineering Platforms Local Arbitrary Code Execution Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.3 Severity: High |
A vulnerability has been identified in SIMATIC S7-PLCSIM V17 (All versions), SIMATIC S7-PLCSIM V18 (All versions), SIMATIC STEP 7 Safety V17 (All versions < V17 Update 9), SIMATIC STEP 7 Safety V18 (All versions), SIMATIC STEP 7 Safety V19 (All versions < V19 Update 4), SIMATIC STEP 7 V17 (All versions < V17 Update 9), SIMATIC STEP 7 V18 (All versions), SIMATIC STEP 7 V19 (All versions < V19 Update 4), SIMATIC WinCC Unified PC Runtime V18 (All versions), SIMATIC WinCC Unified PC Runtime V19 (All versions < V19 Update 4), SIMATIC WinCC Unified V17 (All versions < V17 Update 9), SIMATIC WinCC Unified V18 (All versions), SIMATIC WinCC Unified V19 (All versions < V19 Update 4), SIMATIC WinCC V17 (All versions < V17 Update 9), SIMATIC WinCC V18 (All versions), SIMATIC WinCC V19 (All versions < V19 Update 4), SIMOCODE ES V17 (All versions), SIMOCODE ES V18 (All versions), SIMOCODE ES V19 (All versions), SIMOTION SCOUT TIA V5.4 (All versions), SIMOTION SCOUT TIA V5.5 (All versions), SIMOTION SCOUT TIA V5.6 (All versions < V5.6 SP1 HF7), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SINAMICS Startdrive V19 (All versions), SIRIUS Safety ES V17 (TIA Portal) (All versions), SIRIUS Safety ES V18 (TIA Portal) (All versions), SIRIUS Safety ES V19 (TIA Portal) (All versions), SIRIUS Soft Starter ES V17 (TIA Portal) (All versions), SIRIUS Soft Starter ES V18 (TIA Portal) (All versions), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions), TIA Portal Cloud V17 (All versions), TIA Portal Cloud V18 (All versions), TIA Portal Cloud V19 (All versions < V5.2.1.1). The affected devices do not properly sanitize user-controllable input when parsing user settings. This could allow an attacker to locally execute arbitrary commands in the host operating system with the privileges of the user. Totally Integrated Automation Portal (TIA Portal) is a PC software that provides the full range of Siemens digital automation services, from digital planning, integrated engineering to transparent operation