VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201709-0586 CVE-2017-14415 D-Link DIR-850L Cross-site scripting vulnerability in device firmware CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/sitesurvey.php. D-Link DIR-850L The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-850LREV.A is a wireless router from D-Link. A remote attacker could exploit the vulnerability to steal authentication cookies by sending an \342\200\230action\342\200\231 parameter to the htdocs/web/wandetect.php file
VAR-201709-0587 CVE-2017-14416 D-Link DIR-850L REV.A Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/wandetect.php. D-Link DIR-850L The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-850LREV.A is a wireless router from D-Link. A remote attacker could exploit the vulnerability to steal authentication cookies by sending an \342\200\230action\342\200\231 parameter to the htdocs/web/wandetect.php file
VAR-201709-0588 CVE-2017-14417 D-Link DIR-850L Vulnerability related to access control in device firmware CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
register_send.php on D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices does not require authentication, which can result in unintended enrollment in mydlink Cloud Services. D-Link DIR-850L There is an access control vulnerability in the device firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.B is a wireless router from D-Link. A security vulnerability exists in the register_send.php file in the D-LinkDIR-850LREV.B device using FW208WWb02 and previous firmware. The vulnerability stems from the program not requiring authentication. An attacker could exploit the vulnerability to gain access
VAR-201709-0589 CVE-2017-14418 D-Link DIR-850L Vulnerabilities related to certificate / password management in device firmware CVSS V2: 4.3
CVSS V3: 8.1
Severity: HIGH
The D-Link NPAPI extension, as used in conjunction with D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices, sends the cleartext admin password over the Internet as part of interaction with mydlink Cloud Services. D-Link DIR-850L The device firmware contains a vulnerability related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.B is a wireless router from D-Link. A security vulnerability exists in the D-Link NPAPI extension used in the D-LinkDIR-850LREV.B device using FW208WWb02 and previous firmware. An attacker could use this vulnerability to retrieve an administrator password
VAR-201709-0590 CVE-2017-14419 D-Link DIR-850L Vulnerability related to certificate validation in device firmware CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, participates in mydlink Cloud Services by establishing a TCP relay service for HTTP, even though a TCP relay service for HTTPS is also established. D-Link DIR-850L There is a certificate validation vulnerability in the device firmware.Information may be obtained. The D-LinkDIR-850L is a wireless router from D-Link. A security vulnerability exists in NPAPIextension in FW114WWb07_h2ab_beta1 and previous versions of D-LinkDIR-850L. A remote attacker can exploit this vulnerability to obtain information
VAR-201709-0599 CVE-2017-14428 D-Link DIR-850L Vulnerabilities related to authorization, authority, and access control in device firmware CVSS V2: 2.1
CVSS V3: 7.8
Severity: HIGH
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/run/hostapd* permissions. D-Link DIR-850L Device firmware contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. A security vulnerability exists in the REV.B device using D-LinkDIR-850LREV.A and FW208WWb02 and previous firmware versions of FW114WWb07_h2ab_beta1 and previous firmware. An attacker could exploit this vulnerability to obtain a wireless password
VAR-201709-0601 CVE-2017-14430 D-Link DIR-850L Vulnerability related to input validation in device firmware CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices allow remote attackers to cause a denial of service (daemon crash) via crafted LAN traffic. D-Link DIR-850L There is an input validation vulnerability in the device firmware.Service operation interruption (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. There are security vulnerabilities in the REV.B devices of the D-LinkDIR-850LREV.A and FW208WWb02 and previous versions of firmware using FW114WWb07_h2ab_beta1 and previous firmware
VAR-201709-0591 CVE-2017-14420 D-Link DIR-850L Vulnerability related to certificate validation in device firmware CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. D-Link DIR-850L There is a certificate validation vulnerability in the device firmware.Information may be obtained. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. A security vulnerability exists in the D-LinkDIR-850LREV.A using FW114WWb07_h2ab_beta1 and previous firmware and the D-LinkNPAPI extension used in the REV.B device using FW208WWb02 and previous firmware. The vulnerability stems from the program failing to verify the X of the SSL server. 509 certificate
VAR-201709-0593 CVE-2017-14422 D-Link DIR-850L Vulnerabilities related to the use of hard-coded credentials in device firmware CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices use the same hardcoded /etc/stunnel.key private key across different customers' installations, which allows remote attackers to defeat the HTTPS cryptographic protection mechanisms by leveraging knowledge of this key from another installation. D-Link DIR-850L Device firmware contains a vulnerability related to the use of hard-coded credentials.Information may be obtained. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. This vulnerability is caused by different users using the same hard-coded private key during installation ( /etc/stunnel.key). This vulnerability could be exploited by a remote attacker to compromise the HTTPS encryption protection mechanism. key (/etc/stunnel.key)
VAR-201709-0594 CVE-2017-14423 D-Link DIR-850L Vulnerabilities related to security functions in device firmware CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
htdocs/parentalcontrols/bind.php on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices does not prevent unauthenticated nonce-guessing attacks, which makes it easier for remote attackers to change the DNS configuration via a series of requests. D-Link DIR-850L The device firmware contains vulnerabilities related to security functions.Information may be tampered with. D-LinkDIR-850LREV.A is a wireless router from D-Link
VAR-201709-0595 CVE-2017-14424 D-Link DIR-850L Vulnerabilities related to authorization, authority, and access control in device firmware CVSS V2: 2.1
CVSS V3: 7.8
Severity: HIGH
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/passwd permissions. D-Link DIR-850L Device firmware contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. A security vulnerability exists in the REV.B device using D-LinkDIR-850LREV.A and FW208WWb02 and previous firmware versions of FW114WWb07_h2ab_beta1 and previous firmware. An attacker could exploit the vulnerability to obtain a certificate
VAR-201709-0596 CVE-2017-14425 D-Link DIR-850L Vulnerabilities related to authorization, authority, and access control in device firmware CVSS V2: 2.1
CVSS V3: 7.8
Severity: HIGH
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/etc/hnapasswd permissions. D-Link DIR-850L Device firmware contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. A security vulnerability exists in the REV.B device using D-LinkDIR-850LREV.A and FW208WWb02 and previous firmware versions of FW114WWb07_h2ab_beta1 and previous firmware. An attacker could use this vulnerability to retrieve a password
VAR-201709-0597 CVE-2017-14426 D-Link DIR-850L Vulnerabilities related to authorization, authority, and access control in device firmware CVSS V2: 2.1
CVSS V3: 7.8
Severity: HIGH
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0644 /var/etc/shadow (aka the /etc/shadow symlink target) permissions. D-Link DIR-850L Device firmware contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. A security vulnerability exists in the REV.B device using D-LinkDIR-850LREV.A and FW208WWb02 and previous firmware versions of FW114WWb07_h2ab_beta1 and previous firmware. An attacker could exploit this vulnerability to obtain a DES hash of an administrator user
VAR-201709-0598 CVE-2017-14427 D-Link DIR-850L Vulnerabilities related to authorization, authority, and access control in device firmware CVSS V2: 2.1
CVSS V3: 7.8
Severity: HIGH
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/run/storage_account_root permissions. D-Link DIR-850L Device firmware contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. A security vulnerability exists in the REV.B device using D-LinkDIR-850LREV.A and FW208WWb02 and previous firmware versions of FW114WWb07_h2ab_beta1 and previous firmware. An attacker could exploit the vulnerability to obtain a certificate
VAR-201709-0600 CVE-2017-14429 D-Link DIR-850L Command injection vulnerability in device firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
The DHCP client on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices allows unauthenticated remote code execution as root because /etc/services/INET/inet_ipv4.php mishandles shell metacharacters, affecting generated files such as WAN-1-udhcpc.sh. D-Link DIR-850L The device firmware contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. A security vulnerability exists in the DHCP client on the REV.B device using D-LinkDIR-850LREV.A and FW208WWb02 and previous versions of firmware using FW114WWb07_h2ab_beta1 and previous firmware. The vulnerability is due to the /etc/services/INET/inet_ipv4.php file. Handle shell metacharacters correctly. A remote attacker could exploit the vulnerability to execute code with root privileges
VAR-201709-0592 CVE-2017-14421 D-Link DIR-850L Vulnerabilities related to the use of hard-coded credentials in device firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices have a hardcoded password of wrgac25_dlink.2013gui_dir850l for the Alphanetworks account upon device reset, which allows remote attackers to obtain root access via a TELNET session. D-Link DIR-850L Device firmware contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.B is a wireless router from D-Link. A security vulnerability exists in D-LinkDIR-850LREV.B using FW208WWb02 and previous firmware. This vulnerability is due to the hard-coded password used by the Alphanetworks account. A remote attacker can exploit this vulnerability to gain root privileges with a TELNET session
VAR-201712-0186 CVE-2017-14386 Dell 2335DN and 2355DN Multi-site laser printer firmware cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
The web user interface of Dell 2335dn and 2355dn Multifunction Laser Printers, firmware versions prior to V2.70.06.26 A13 and V2.70.45.34 A10 respectively, are affected by a cross-site scripting vulnerability. Attackers could potentially exploit this vulnerability to execute arbitrary HTML or JavaScript code in the user's browser session in the context of the affected website. The Dell2335dn and 2355dn are Dell's versatile laser printers
VAR-201803-0135 CVE-2017-14384 Dell Storage Manager Path traversal vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
In Dell Storage Manager versions earlier than 16.3.20, the EMConfigMigration service is affected by a directory traversal vulnerability. A remote malicious user could potentially exploit this vulnerability to read unauthorized files by supplying specially crafted strings in input parameters of the application. A malicious user cannot delete or modify any files via this vulnerability. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Dell EMC Storage Manager. Authentication is not required to exploit this vulnerability.The specific flaw exists within the EmConfigMigration servlet, which listens on TCP port 3033 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. Remote attackers may use a specially crafted request with directory-traversal sequences ('../') to retrieve sensitive information. This may aid in further attacks
VAR-201709-0206 CVE-2017-10701 SAP Enterprise Portal Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross site scripting (XSS) vulnerability in SAP Enterprise Portal 7.50 allows remote attackers to inject arbitrary web script or HTML, aka SAP Security Notes 2469860, 2471209, and 2488516. Vendors have confirmed this vulnerability SAP Security Note 2469860 , 2471209 , 2488516 It is released as.Information may be obtained and information may be altered. Remote attackers can exploit this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. A remote user can conduct cross-site scripting attacks. The software does not properly filter HTML code from user-supplied input before displaying the input. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. *Impact:* A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the SAP Enterprise Portal, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. *Link to remedies:* Web Dynpro Java - https://launchpad.support.sap.com/#/notes/2469860 SAPGUI for HTML- https://launchpad.support.sap.com/#/notes/2471209 Web Dynpro ABAP -https://launchpad.support.sap.com/#/notes/2488516 *Credits:* Imran Khan @Netizen01k reported this vulnerability
VAR-201804-0781 CVE-2017-9658 Philips IntelliVue MX40 Data processing vulnerability CVSS V2: 6.1
CVSS V3: 6.5
Severity: MEDIUM
Certain 802.11 network management messages have been determined to invoke wireless access point blacklisting security defenses when not required, which can necessitate intervention by hospital staff to reset the device and reestablish a network connection to the Wi-Fi access point. During this state, the Philips IntelliVue MX40 Version B.06.18 can either connect to an alternative access point within signal range for association to a central monitoring station, or it can remain in local monitoring mode until the device is reset by hospital staff. CVSS v3 base score: 6.5, CVSS vector string: AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. Philips has released software update, Version B.06.18, to fix the improper cleanup on thrown exception vulnerability, and implement mitigations to reduce the risk associated with the improper handling of exceptional conditions vulnerability. The software update implements messaging and alarming on the MX40 and at the central monitoring station, when the MX40 disconnects from the access point. Philips IntelliVue MX40 Contains a data processing vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The MX40 Patient Worn Monitor is primarily used as a traditional telemetry medical device as part of a surveillance and alarm system. Philips IntelliView MX40 Patient Worn Monitor is prone to multiple denial-of-service vulnerabilities. Successful exploits may allow attackers to crash the affected application, resulting in denial-of-service conditions. Versions prior to Philips IntelliView MX40 Patient Worn Monitor B.06.18 are vulnerable