VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201809-0821 CVE-2018-17005 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for firewall dmz enable. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0824 CVE-2018-17008 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wireless wlan_host_2g power. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0827 CVE-2018-17011 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for hosts_info para sun. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0820 CVE-2018-17004 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wlan_access name. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0837 CVE-2018-17020 ASUS GT-AC5300 Vulnerability related to input validation on devices CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
ASUS GT-AC5300 devices with firmware through 3.0.0.4.384_32738 allow remote attackers to cause a denial of service via a single "GET / HTTP/1.1\r\n" line. ASUS GT-AC5300 The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The ASUSGT-AC5300 is a wireless router from ASUS. A security vulnerability exists in ASUSGT-AC5300 using 3.0.0.4.384_32738 and previous firmware. An attacker could exploit the vulnerability by sending \342\200\230GET/HTTP/1.1\\r\\n\342\200\231 to cause a denial of service
VAR-201809-0831 CVE-2018-17015 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for ddns phddns username. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0833 CVE-2018-17017 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for dhcpd udhcpd enable. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0834 CVE-2018-17018 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for time_switch name. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0830 CVE-2018-17014 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for ip_mac_bind name. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-1342 No CVE NSG 9000-6G has arbitrary file reading vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The NSG ™ 9000-6G high-density universal edgeQAM system is a highly integrated digital video solution for multiplexing on-demand video content over IP networks. NSG 9000-6G has an arbitrary file reading vulnerability, which can be used by an attacker to read sensitive files.
VAR-201809-1336 No CVE Information disclosure vulnerability exists in NSG 9000-6G CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The NSG ™ 9000-6G high-density universal edgeQAM system is a highly integrated digital video solution for multiplexing on-demand video content over IP networks. There is an information disclosure vulnerability in NSG 9000-6G, which can be used by attackers to obtain system sensitive information.
VAR-201809-1338 No CVE Command execution vulnerability in Lenovo M7650DNF printer CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Lenovo M7650DNF is a black and white laser all-in-one machine that is targeted at individual users, SOHO offices and small and medium-sized enterprises with copy / scan / fax requirements. The Lenovo M7650DNF printer has a command execution vulnerability that could allow an attacker to execute commands remotely.
VAR-201809-1152 CVE-2018-7991 Huawei smartphone Mate10 Vulnerabilities related to security functions CVSS V2: 2.1
CVSS V3: 4.6
Severity: MEDIUM
Huawei smartphones Mate10 with versions earlier before ALP-AL00B 8.0.0.110(C00) have a Factory Reset Protection (FRP) bypass vulnerability. The system does not sufficiently verify the permission, an attacker uses a data cable to connect the smartphone to the computer and then perform some specific operations. Successful exploit could allow the attacker bypass the FRP protection to access the system setting page. Huawei smartphone Mate10 Contains vulnerabilities related to security features.Information may be tampered with. HuaweiMate10 is a smartphone product. HuaweiMate10 has an FRP bypass vulnerability
VAR-201809-0829 CVE-2018-17013 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for protocol wan wan_rate. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-0832 CVE-2018-17016 TP-Link TL-WR886N Vulnerability related to input validation on devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for reboot_timer name. TP-Link TL-WR886N The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WR886N is a wireless router product of China TP-LINK. There are security vulnerabilities in TP-LinkTL-WR886N6.02.3.4 and 7.01.1.0. A security vulnerability exists in TP-Link TL-WR886N 6.0 2.3.4 version and 7.0 1.1.0 version
VAR-201809-1170 CVE-2018-5549 BIG-IP APM Input validation vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
On BIG-IP APM 11.6.0-11.6.3.1, 12.1.0-12.1.3.3, 13.0.0, and 13.1.0-13.1.0.3, APMD may core when processing SAML Assertion or response containing certain elements. BIG-IP APM Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5 BIG-IP APM is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. BIG-IP APM 14.0.0, 13.1.0, 13.0.0, 12.1.0 through 12.1.3, and 11.6.1 through 11.6.3 are vulnerable. F5 BIG-IP Access Policy Manager (APM) is a set of access and security solutions from F5 Corporation of the United States. The solution provides unified access to business-critical applications and networks. The following versions are affected: F5 BIG-IP APM version 11.6.0 to 11.6.3.1, 12.1.0 to 12.1.3.3, 13.0.0, 13.1.0 to 13.1.0.3
VAR-201809-1168 CVE-2018-5545 F5 WebSafe Alert Server Input validation vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
On F5 WebSafe Alert Server 1.0.0-4.2.6, a malicious, authenticated user can execute code on the alert server by using a maliciously crafted payload. F5 WebSafe Alert Server Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Successfully exploiting this issue may allow an attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts may cause a denial-of-service condition. F5 WebSafe is a set of network fraud protection solutions from F5 Corporation of the United States. The solution provides malware and fraud detection, client mobile threat protection, and more
VAR-201809-0464 CVE-2018-15310 BIG-IP APM portal access Vulnerable to information disclosure CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
A vulnerability in BIG-IP APM portal access 11.5.1-11.5.7, 11.6.0-11.6.3, and 12.1.0-12.1.3 discloses the BIG-IP software version in rewritten pages. F5 BIG-IP Access Policy Manager (APM) is a set of access and security solutions from F5 Corporation of the United States. The solution provides unified access to business-critical applications and networks. portal access is one of the portal access components
VAR-201809-0814 CVE-2018-16752 LINK-NET LW-N605R Vulnerability related to input validation in device firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
LINK-NET LW-N605R devices with firmware 12.20.2.1486 allow Remote Code Execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases. LINK-NET LW-N605R There is an input validation vulnerability in the device firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The LW-N605R is a network product launched by LINK-NET. A security vulnerability exists in LINK-NET LW-N605R using firmware version 12.20.2.1486
VAR-201809-1103 CVE-2018-3643 Intel Converged Security and Management Engine and Server Platform Services Firmware vulnerabilities related to authorization, authority, and access control CVSS V2: 4.6
CVSS V3: 8.2
Severity: HIGH
A vulnerability in Power Management Controller firmware in systems using specific Intel(R) Converged Security and Management Engine (CSME) before version 11.8.55, 11.11.55, 11.21.55, 12.0.6 or Intel(R) Server Platform Services firmware before version 4.x.04 may allow an attacker with administrative privileges to uncover certain platform secrets via local access or to potentially execute arbitrary code. Intel Atom Processor C3000 Series Platform and other products are processor products of Intel Corporation of the United States. The Intel Power Management Controller is one of the power management controllers. A security vulnerability exists in the Intel Power Management Controller. A local attacker could exploit this vulnerability to escalate permissions or reveal information