VARIoT IoT vulnerabilities database

VAR-202406-1934 | No CVE | KingH5Stream of Beijing Yakong Technology Development Co., Ltd. has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Beijing Yakong Technology Development Co., Ltd., referred to as "Yakong Technology", is a high-tech enterprise of industrial automation and information software platform established in 1997.
KingH5Stream of Beijing Yakong Technology Development Co., Ltd. has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202406-2134 | CVE-2024-5990 | Rockwell Automation of thinmanager and thinserver Vulnerability in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to a monitor thread within Rockwell Automation ThinServer™ and cause a denial-of-service condition on the affected device. Rockwell Automation of thinmanager and thinserver Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Rockwell Automation ThinManager is a thin client management software from Rockwell Automation, USA. It allows thin clients to be assigned to multiple remote desktop servers at the same time
VAR-202406-2530 | CVE-2024-5989 | Rockwell Automation of thinmanager and thinserver Vulnerability in |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke SQL injection into the program and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™. Rockwell Automation of thinmanager and thinserver Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation ThinManager is a thin client management software from Rockwell Automation, USA. It allows thin clients to be assigned to multiple remote desktop servers at the same time
VAR-202406-0976 | CVE-2024-5988 | Rockwell Automation of thinmanager and thinserver Vulnerability in |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke a local or remote executable and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™. Rockwell Automation of thinmanager and thinserver Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation ThinManager is a thin client management software from Rockwell Automation, USA. It allows thin clients to be assigned to multiple remote desktop servers at the same time
VAR-202406-0858 | CVE-2024-21827 | TP-LINK Technologies of er7206 Active state debug code vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A leftover debug code vulnerability exists in the cli_server debug functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.4.1 Build 20240117 Rel.57421. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability. TP-LINK Technologies of er7206 An active debug code vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK ER7206 is a multi-function gigabit router from China's TP-LINK company. The vulnerability is caused by the presence of residual debugging code
VAR-202406-1771 | CVE-2024-4641 | plural Moxa Inc. Product Format String Vulnerability |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: MEDIUM |
OnCell G3470A-LTE Series firmware versions v1.7.7 and prior have been identified as vulnerable due to accepting a format string from an external source as an argument. An attacker could modify an externally controlled format string to cause a memory leak and denial of service. ONCELLG3470A-LTE-EU-T firmware, ONCELLG3470A-LTE-EU firmware, OnCellG3470A-LTE-US-T firmware etc. Moxa Inc. The product contains a vulnerability in format strings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. MOXA OnCell G3470A-LTE is a series of cellular gateways/routers from China's MOXA company.
MOXA OnCell G3470A-LTE v1.7.7 and earlier firmware versions have a security vulnerability
VAR-202406-2348 | CVE-2024-4640 | plural Moxa Inc. Classic buffer overflow vulnerability in the product |
CVSS V2: 7.5 CVSS V3: 7.1 Severity: HIGH |
OnCell G3470A-LTE Series firmware versions v1.7.7 and prior have been identified as vulnerable due to missing bounds checking on buffer operations. An attacker could write past the boundaries of allocated buffer regions in memory, causing a program crash. ONCELLG3470A-LTE-EU-T firmware, ONCELLG3470A-LTE-EU firmware, OnCellG3470A-LTE-US-T firmware etc. Moxa Inc. The product contains a classic buffer overflow vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be in a state. MOXA OnCell G3470A-LTE is a series of cellular gateways/routers from China's MOXA company.
MOXA OnCell G3470A-LTE v1.7.7 and earlier firmware versions have a buffer overflow vulnerability. The vulnerability is caused by the lack of boundary checks on buffer operations
VAR-202406-2773 | CVE-2024-4639 | plural Moxa Inc. Command injection vulnerabilities in the product |
CVSS V2: 7.5 CVSS V3: 7.1 Severity: HIGH |
OnCell G3470A-LTE Series firmware versions v1.7.7 and prior have been identified as vulnerable due to a lack of neutralized inputs in IPSec configuration. An attacker could modify the intended commands sent to target functions, which could cause malicious users to execute unauthorized commands. ONCELLG3470A-LTE-EU-T firmware, ONCELLG3470A-LTE-EU firmware, OnCellG3470A-LTE-US-T firmware etc. Moxa Inc. The product contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. MOXA OnCell G3470A-LTE is a series of cellular gateways/routers from China's MOXA company.
MOXA OnCell G3470A-LTE v1.7.7 and earlier firmware versions have a command injection vulnerability
VAR-202406-1003 | CVE-2024-4638 | plural Moxa Inc. Command injection vulnerabilities in the product |
CVSS V2: 7.5 CVSS V3: 7.1 Severity: HIGH |
OnCell G3470A-LTE Series firmware versions v1.7.7 and prior have been identified as vulnerable due to a lack of neutralized inputs in the web key upload function. An attacker could modify the intended commands sent to target functions, which could cause malicious users to execute unauthorized commands. ONCELLG3470A-LTE-EU-T firmware, ONCELLG3470A-LTE-EU firmware, OnCellG3470A-LTE-US firmware etc. Moxa Inc. The product contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. MOXA OnCell G3470A-LTE is a series of cellular gateways/routers from China's MOXA company.
MOXA OnCell G3470A-LTE v1.7.7 and earlier firmware versions have a command injection vulnerability
VAR-202406-1180 | No CVE | Zhejiang Dahua Technology Co., Ltd. Digital Surveillance System has a file upload vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Zhejiang Dahua Technology Co., Ltd. is a global leading video-centric smart IoT solution provider and operation service provider.
Zhejiang Dahua Technology Co., Ltd. Digital Surveillance System has a file upload vulnerability, which can be exploited by attackers to upload malicious files.
VAR-202406-1413 | CVE-2024-38902 | H3C of Magic R230 Hardcoded password usage vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
H3C Magic R230 V100R002 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. H3C of Magic R230 A vulnerability exists in the firmware related to the use of hardcoded passwords.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Magic R230 is a wireless router from H3C, a Chinese company.
H3C Technologies Co., Ltd
VAR-202406-1019 | CVE-2024-38897 | WAVLINK of wn551k1 Firmware vulnerability regarding disclosure of important information from data queries |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
WAVLINK WN551K1'live_check.shtml enables attackers to obtain sensitive router information. WAVLINK of wn551k1 The firmware contains a vulnerability that could lead to the disclosure of sensitive information through data queries.Information may be obtained. WAVLINK WN551K1 is a wireless router from WAVLINK, a Chinese company.
WAVLINK WN551K1 has an information leakage vulnerability. The vulnerability is caused by improper authorization in the live_check.shtml interface
VAR-202406-1207 | CVE-2024-38896 | WAVLINK of WL-WN551K1 Command injection vulnerability in firmware |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
WAVLINK WN551K1 found a command injection vulnerability through the start_hour parameter of /cgi-bin/nightled.cgi. WAVLINK WN551K1 is a wireless router from WAVLINK, a Chinese company. No detailed vulnerability details are currently available
VAR-202406-2575 | CVE-2024-38895 | WAVLINK of WL-WN551K1 Firmware vulnerability regarding disclosure of important information from data queries |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
WAVLINK WN551K1'live_mfg.shtml enables attackers to obtain sensitive router information. WAVLINK of WL-WN551K1 The firmware contains a vulnerability that could lead to the disclosure of sensitive information through data queries.Information may be obtained. WAVLINK WN551K1 is a wireless router from WAVLINK, a Chinese company.
WAVLINK WN551K1 has an information leakage vulnerability. The vulnerability is caused by improper authorization in the live_mfg.shtml interface
VAR-202406-1781 | CVE-2024-38894 | WAVLINK of WL-WN551K1 Command injection vulnerability in firmware |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
WAVLINK WN551K1 found a command injection vulnerability through the IP parameter of /cgi-bin/touchlist_sync.cgi. WAVLINK WN551K1 is a wireless router from WAVLINK, a Chinese company. No detailed vulnerability details are currently available
VAR-202406-1782 | CVE-2024-38892 | WAVLINK of WL-WN551K1 Firmware vulnerability regarding disclosure of important information from data queries |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
An issue in Wavlink WN551K1 allows a remote attacker to obtain sensitive information via the ExportAllSettings.sh component. WAVLINK of WL-WN551K1 The firmware contains a vulnerability that could lead to the disclosure of sensitive information through data queries.Information may be obtained. WAVLINK WN551K1 is a wireless router from WAVLINK, a Chinese company.
WAVLINK WN551K1 has an information leakage vulnerability
VAR-202406-2036 | CVE-2024-33278 | ASUS RT-AX88U Buffer Overflow Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Buffer Overflow vulnerability in ASUS router RT-AX88U with firmware versions v3.0.0.4.388_24198 allows a remote attacker to execute arbitrary code via the connection_state_machine due to improper length validation for the cookie field. ASUS RT-AX88U is a wireless router from ASUS, a Chinese company.
ASUS RT-AX88U v3.0.0.4.388_24198 has a buffer overflow vulnerability, which is caused by a boundary error when the application processes untrusted input
VAR-202406-0928 | CVE-2024-23972 | Sony Corporation's xav-ax5500 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
Sony XAV-AX5500 USB Configuration Descriptor Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the USB host driver. A crafted USB configuration descriptor can trigger an overflow of a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
Was ZDI-CAN-23185. Sony Corporation's xav-ax5500 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SONY XAV-AX5500 is a 7-inch in-vehicle central control device with multiple functions and advanced technical features
VAR-202406-0828 | CVE-2024-23934 | (Pwn2Own) Sony XAV-AX5500 WMV/ASF Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: HIGH |
Sony XAV-AX5500 WMV/ASF Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of WMV/ASF files. A crafted Extended Content Description Object in a WMV media file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-22994. SONY XAV-AX5500 is a 7-inch in-vehicle central control device with multiple functions and advanced technical features
VAR-202406-0827 | CVE-2024-23933 | (Pwn2Own) Sony XAV-AX5500 CarPlay TLV Stack-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
Sony XAV-AX5500 CarPlay TLV Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the implementation of the Apple CarPlay protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
Was ZDI-CAN-23238. SONY XAV-AX5500 is a 7-inch in-vehicle central control device with multiple functions and advanced technical features