VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202407-0692 CVE-2024-6963 Shenzhen Tenda Technology Co.,Ltd.  of  o3  firmware 1.0.0.10(2478)  Out-of-bounds write vulnerability in CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability, which was classified as critical, has been found in Tenda O3 1.0.0.10. This issue affects the function formexeCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272117 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of o3 firmware 1.0.0.10(2478) Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda O3 is an outdoor wireless bridge from China's Tenda company. No detailed vulnerability details are currently provided
VAR-202407-0735 CVE-2024-6962 Shenzhen Tenda Technology Co.,Ltd.  of  o3  firmware 1.0.0.10(2478)  Out-of-bounds write vulnerability in CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability classified as critical was found in Tenda O3 1.0.0.10. This vulnerability affects the function formQosSet. The manipulation of the argument remark/ipRange/upSpeed/downSpeed/enable leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272116. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of o3 firmware 1.0.0.10(2478) Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda O3 is a wireless bridge device, mainly used to extend and enhance wireless network signals, suitable for home and small business network environments. Attackers can exploit this vulnerability to cause arbitrary code execution, device control, and even cause the device to crash or fail to work properly
VAR-202407-1768 CVE-2024-41492 Shenzhen Tenda Technology Co.,Ltd.  of  ax1806  Stack-based buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A stack overflow in Tenda AX1806 v1.0.0.1 allows attackers to cause a Denial of Service (DoS) via a crafted input. Shenzhen Tenda Technology Co.,Ltd. of ax1806 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The vulnerability is caused by the program failing to properly verify the length of the input data
VAR-202407-0985 CVE-2024-41281 Belkin International, Inc.  of  wrt54g  Stack-based buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
Linksys WRT54G v4.21.5 has a stack overflow vulnerability in get_merge_mac function. Belkin International, Inc. of wrt54g A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Linksys WRT54G is a router from Linksys, an American company. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202407-2076 CVE-2024-39963 Shenzhen Tenda Technology Co.,Ltd.  of  ax9  firmware and  AX12  Command injection vulnerability in firmware CVSS V2: -
CVSS V3: 8.0
Severity: HIGH
AX3000 Dual-Band Gigabit Wi-Fi 6 Router AX9 V22.03.01.46 and AX3000 Dual-Band Gigabit Wi-Fi 6 Router AX12 V1.0 V22.03.01.46 were discovered to contain an authenticated remote command execution (RCE) vulnerability via the macFilterType parameter at /goform/setMacFilterCfg. Shenzhen Tenda Technology Co.,Ltd. of ax9 firmware and AX12 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202407-1942 CVE-2024-39962 D-Link Systems, Inc.  of  DIR-823X  Code injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-823X AX3000 Dual-Band Gigabit Wireless Router v21_D240126 was discovered to contain a remote code execution (RCE) vulnerability in the ntp_zone_val parameter at /goform/set_ntp. This vulnerability is exploited via a crafted HTTP request. D-Link Systems, Inc. of DIR-823X A code injection vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-823X is a wireless router from D-Link of China. Attackers can exploit this vulnerability to cause arbitrary code execution
VAR-202409-0773 CVE-2024-44375 D-Link Systems, Inc.  of  di-8100  Out-of-bounds write vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DI-8100 v16.07.26A1 has a stack overflow vulnerability in the dbsrv_asp function. D-Link Systems, Inc. of di-8100 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. D-Link DI-8100 is a wireless broadband router designed for small and medium-sized network environments by D-Link. The vulnerability is caused by the failure to properly verify the length of the input data in the dbsrv_asp function. Remote attackers can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202407-1154 CVE-2024-40515 Shenzhen Tenda Technology Co.,Ltd.  of  AX2 Pro  Vulnerability in firmware regarding improper validation of the origin of communication channels CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An issue in SHENZHEN TENDA TECHNOLOGY CO.,LTD Tenda AX2pro V16.03.29.48_cn allows a remote attacker to execute arbitrary code via the Routing functionality. Shenzhen Tenda Technology Co.,Ltd. of AX2 Pro The firmware contains a vulnerability related to improper validation of the origin of the communication channel.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AX2 Pro is an entry-level Gigabit Wi-Fi 6 router designed for home users by China's Tenda
VAR-202407-1303 CVE-2024-40503 Shenzhen Tenda Technology Co.,Ltd.  of  AX12  Vulnerability in firmware regarding improper validation of the origin of communication channels CVSS V2: 6.1
CVSS V3: 6.5
Severity: MEDIUM
An issue in Tenda AX12 v.16.03.49.18_cn+ allows a remote attacker to cause a denial of service via the Routing functionality and ICMP packet handling. Shenzhen Tenda Technology Co.,Ltd. of AX12 The firmware contains a vulnerability related to improper validation of the origin of the communication channel.Service operation interruption (DoS) It may be in a state. The Tenda AX12 is a dual-band Gigabit Wi-Fi 6 wireless router designed for home users. It supports dual-band concurrent transmission and achieves speeds of up to 2976 Mbps
VAR-202407-2285 CVE-2024-33181 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Stack-based buffer overflow vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnerability via the deviceMac parameter at ip/goform/addWifiMacFilter. Shenzhen Tenda Technology Co.,Ltd. (DoS) It may be in a state
VAR-202407-1753 CVE-2024-6089 Rockwell Automation  of  5015-aenftxt  Firmware vulnerabilities CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
An input validation vulnerability exists in the Rockwell Automation 5015 - AENFTXT when a manipulated PTP packet is sent, causing the secondary adapter to result in a major nonrecoverable fault. If exploited, a power cycle is required to recover the product. Rockwell Automation of 5015-aenftxt There are unspecified vulnerabilities in the firmware.Service operation interruption (DoS) It may be in a state. Rockwell Automation 5015-AENFTXT is a technical data in the specification of a FLEXHA 5000 I/O system of Rockwell Automation, USA
VAR-202407-0779 CVE-2024-35338 Tenda  of  i29  Vulnerability related to use of hardcoded credentials in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda i29V1.0 V1.0.0.5 was discovered to contain a hardcoded password for root. Tenda of i29 A vulnerability exists in the firmware regarding the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda i29 is a wireless router from China's Tenda company. Attackers can exploit this vulnerability to bypass authentication
VAR-202407-0778 CVE-2024-33182 Tenda  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnerability via the deviceId parameter at ip/goform/addWifiMacFilter. Tenda of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC18 is a router from China's Tenda company. No detailed vulnerability details are provided at present
VAR-202407-0745 CVE-2024-33180 Tenda  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnerability via the deviceId parameter at ip/goform/saveParentControlInfo. Tenda of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202407-2296 CVE-2024-22442 hewlett packard enterprise  HPE 3PAR Service Processor  Firmware vulnerabilities CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
The vulnerability could be remotely exploited to bypass authentication. hewlett packard enterprise HPE 3PAR Service Processor There are unspecified vulnerabilities in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202407-1425 CVE-2024-6435 Rockwell Automation Pavilion 8 Privilege Escalation Vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A privilege escalation vulnerability exists in the affected products which could allow a malicious user with basic privileges to access functions which should only be available to users with administrative level privileges. If exploited, an attacker could read sensitive data, and create users. For example, a malicious user with basic privileges could perform critical functions such as creating a user with elevated privileges and reading sensitive information in the “views” section. Rockwell Automation Pavilion8 is a model prediction console of Rockwell Automation
VAR-202407-0863 CVE-2024-40416 Shenzhen Tenda Technology Co.,Ltd.  of  ax1806  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in /goform/SetVirtualServerCfg in the sub_6320C function in Tenda AX1806 1.0.0.1 firmware leads to stack-based buffer overflow. Shenzhen Tenda Technology Co.,Ltd. of ax1806 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by /goform/SetVirtualServerCfg failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202407-1939 CVE-2024-40415 Shenzhen Tenda Technology Co.,Ltd.  of  ax1806  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in /goform/SetStaticRouteCfg in the sub_519F4 function in Tenda AX1806 1.0.0.1 firmware leads to stack-based buffer overflow. Shenzhen Tenda Technology Co.,Ltd. of ax1806 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by /goform/SetStaticRouteCfg failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202407-1304 CVE-2024-40414 Shenzhen Tenda Technology Co.,Ltd.  of  ax1806  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in /goform/SetNetControlList in the sub_656BC function in Tenda AX1806 1.0.0.1 firmware leads to stack-based buffer overflow. Shenzhen Tenda Technology Co.,Ltd. of ax1806 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by /goform/SetNetControlList failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202407-0346 CVE-2024-6528 plural  Schneider Electric  Cross-site scripting vulnerability in the product CVSS V2: 3.6
CVSS V3: 6.1
Severity: MEDIUM
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists that could cause a vulnerability leading to a cross-site scripting condition where attackers can have a victim’s browser run arbitrary JavaScript when they visit a page containing the injected payload. Modicon M241 firmware, Modicon M251 firmware, Modicon M258 firmware etc. Schneider Electric A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with. Schneider Electric (China) Co., Ltd. is a global electrical company and an expert in global energy efficiency management and automation. Schneider Electric (China) Co., Ltd. TM241CE24T_U has an XSS vulnerability, which can be exploited by attackers to obtain sensitive information such as user cookies