VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202406-1372 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR6210-E has a command execution vulnerability (CNVD-2024-24564) CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Beijing StarNet Ruijie Network Technology Co., Ltd. NBR6210-E is a router product. Beijing StarNet Ruijie Network Technology Co., Ltd. NBR6210-E has a command execution vulnerability, which can be exploited by attackers to gain control of the server.
VAR-202406-0928 CVE-2024-23972 Sony Corporation's  xav-ax5500  Classic buffer overflow vulnerability in firmware CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
Sony XAV-AX5500 USB Configuration Descriptor Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the USB host driver. A crafted USB configuration descriptor can trigger an overflow of a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23185. Sony Corporation's xav-ax5500 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SONY XAV-AX5500 is a 7-inch in-vehicle central control device with multiple functions and advanced technical features
VAR-202406-2739 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. RG-UAC 6000-E20C has a command execution vulnerability (CNVD-2024-24567) CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
RG-UAC 6000-E20C is an Internet behavior management and auditing product. RG-UAC 6000-E20C of Beijing Xingwang Ruijie Network Technology Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to obtain server permissions.
VAR-202406-2188 CVE-2024-37626 TOTOLINK  of  a6000r  in the firmware  OS  Command injection vulnerability CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
A command injection issue in TOTOLINK A6000R V1.0.1-B20201211.2000 firmware allows a remote attacker to execute arbitrary code via the iface parameter in the vif_enable function. TOTOLINK of a6000r The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A6000R is a wireless router from China's TOTOLINK Electronics. No detailed vulnerability details are currently available
VAR-202406-0720 CVE-2024-6189 Tenda  of  a301  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in Tenda A301 15.13.08.12. It has been classified as critical. Affected is the function fromSetWirelessRepeat of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269160. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of a301 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202406-0749 CVE-2023-25646 ZTE  of  ZXHN H388X  Firmware Improper Permission Retention Vulnerability CVSS V2: 6.8
CVSS V3: 7.1
Severity: HIGH
There is an unauthorized access vulnerability in ZTE H388X. If H388X is caused by brute-force serial port cracking,attackers with common user permissions can use this vulnerability to obtain elevated permissions on the affected device by performing specific operations. ZTE of ZXHN H388X A vulnerability exists in the firmware related to improperly preserving permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. ZTE ZXHN H388X is a router produced by ZTE
VAR-202406-1806 CVE-2024-37661 TP-LINK Technologies  of  TL-7DR5130  Same-origin policy violation vulnerability in firmware CVSS V2: 6.7
CVSS V3: 6.3
Severity: MEDIUM
TP-LINK TL-7DR5130 v1.0.23 is vulnerable to forged ICMP redirect message attacks. An attacker in the same WLAN as the victim can hijack the traffic between the victim and any remote server by sending out forged ICMP redirect messages. TP-LINK Technologies of TL-7DR5130 The firmware contains a vulnerability related to violation of the same origin policy.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-Link TL-7DR5130 is a wireless router from China's TP-LINK company
VAR-202406-1440 CVE-2024-37369 Rockwell Automation  of  FactoryTalk View  Vulnerability in improper permission assignment for critical resources in CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
A privilege escalation vulnerability exists in the affected product. The vulnerability allows low-privilege users to edit scripts, bypassing Access Control Lists, and potentially gaining further access within the system. Rockwell Automation of FactoryTalk View Contains a vulnerability in improper permission assignment for critical resources.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation FactoryTalk View SE is an industrial automation system view interface from Rockwell Automation of the United States
VAR-202406-2600 CVE-2024-37645 TRENDnet  of  TEW-814DAP  Stack-based buffer overflow vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a stack overflow vulnerability via the submit-url parameter at /formSysLog . TRENDnet of TEW-814DAP A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TRENDnet TEW-814DAP is a wireless access point from the US company TRENDnet. This vulnerability stems from the failure to properly validate the length of input data in the submit-url parameter at /formSysLog
VAR-202406-1234 CVE-2024-37643 TRENDnet  of  TEW-814DAP  Stack-based buffer overflow vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a stack overflow vulnerability via the submit-url parameter at /formPasswordAuth . TRENDnet of TEW-814DAP A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TRENDnet TEW-814DAP is a wireless access point from the US company TRENDnet. This vulnerability stems from the failure to properly validate the length of input data in the submit-url parameter at /formPasswordAuth
VAR-202406-1621 CVE-2024-37368 Rockwell Automation  of  FactoryTalk View  Vulnerability regarding lack of authentication for critical features in CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. Due to the lack of proper authentication, this action is allowed without proper authentication verification
VAR-202406-1047 CVE-2024-37367 Rockwell Automation  of  FactoryTalk View  Authentication vulnerability in CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE v12. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. This action is allowed without proper authentication verification
VAR-202406-1044 CVE-2024-37640 TOTOLINK  of  a3700r  Stack-based buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid5g in the function setWiFiEasyGuestCfg. TOTOLINK of a3700r A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3700R is a wireless router produced by China's TOTOLINK Electronics. TOTOLINK A3700R has a buffer overflow vulnerability. The vulnerability is caused by the failure of ssid5g to correctly verify the length of the input data in the setWiFiEasyGuestCfg function. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202406-1994 CVE-2024-37639 TOTOLINK  of  a3700r  Stack-based buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via eport in the function setIpPortFilterRules. TOTOLINK of a3700r A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3700R is a wireless router from China's TOTOLINK Electronics. There is a buffer overflow vulnerability in the TOTOLINK A3700R V9.1.2u.6165_20211012 version. The vulnerability is caused by the failure of eport to correctly verify the length of the input data in the function setIpPortFilterRules. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202406-2395 CVE-2024-37637 TOTOLINK  of  a3700r  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid5g in the function setWizardCfg. TOTOLINK of a3700r Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3700R is a wireless router produced by China's TOTOLINK Electronics. TOTOLINK A3700R has a buffer overflow vulnerability. The vulnerability is caused by the failure of ssid5g to correctly verify the length of the input data in the setWizardCfg function. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202406-2601 CVE-2024-37641 TRENDnet  of  TEW-814DAP  Stack-based buffer overflow vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a stack overflow via the submit-url parameter at /formNewSchedule. TRENDnet of TEW-814DAP A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TRENDnet TEW-814DAP is a wireless access point from the US company TRENDnet. This vulnerability stems from the failure to properly validate the length of input data in the submit-url parameter at /formNewSchedule. An attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service
VAR-202406-1807 CVE-2024-37635 TOTOLINK  of  a3700r  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid in the function setWiFiBasicCfg. TOTOLINK of a3700r Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3700R is a wireless router produced by China's TOTOLINK Electronics. TOTOLINK A3700R has a buffer overflow vulnerability. The vulnerability is caused by the ssid in the setWiFiBasicCfg function failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202406-1045 CVE-2024-37634 TOTOLINK  of  a3700r  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid in the function setWiFiEasyCfg. TOTOLINK of a3700r A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3700R is a wireless router produced by China's TOTOLINK Electronics. TOTOLINK A3700R has a buffer overflow vulnerability. The vulnerability is caused by the ssid in the setWiFiEasyCfg function failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202406-2804 CVE-2024-37633 TOTOLINK  of  a3700r  Stack-based buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid in the function setWiFiGuestCfg. TOTOLINK of a3700r A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3700R is a wireless router produced by China's TOTOLINK Electronics. TOTOLINK A3700R has a stack buffer overflow vulnerability. The vulnerability is caused by the ssid in the setWiFiGuestCfg function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202406-1438 CVE-2024-37632 TOTOLINK  of  a3700r  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via the password parameter in function loginAuth . TOTOLINK of a3700r Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3700R is a wireless router produced by China's TOTOLINK Electronics. TOTOLINK A3700R has a buffer overflow vulnerability. The vulnerability is caused by the password parameter in the loginAuth function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service