VARIoT IoT vulnerabilities database
| VAR-202411-0014 | CVE-2024-10661 | Shenzhen Tenda Technology Co.,Ltd. of AC15 Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been found in Tenda AC15 15.03.05.19 and classified as critical. This vulnerability affects the function SetDlnaCfg of the file /goform/SetDlnaCfg. The manipulation of the argument scanList leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of AC15 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Remote attackers can use this vulnerability to submit special requests, which can cause the application to crash or execute arbitrary code in the context of the application
| VAR-202411-0032 | CVE-2024-51407 | Project Floodlight of Floodlight Vulnerability in |
CVSS V2: - CVSS V3: 6.2 Severity: MEDIUM |
Floodlight SDN OpenFlow Controller v.1.2 has an issue that allows local hosts to construct false broadcast ports causing inter-host communication anomalies. Project Floodlight of Floodlight Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
| VAR-202411-0018 | CVE-2024-10654 | TOTOLINK of lr350 User-controlled key authentication bypass vulnerability in firmware |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: Medium |
A vulnerability has been found in TOTOLINK LR350 up to 9.3.5u.6369 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /formLoginAuth.htm. The manipulation of the argument authCode with the input 1 leads to authorization bypass. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 9.3.5u.6698_B20230810 is able to address this issue. It is recommended to upgrade the affected component. TOTOLINK of lr350 An authentication bypass vulnerability exists in firmware with user-controlled keys.Information may be obtained and information may be tampered with. TOTOLINK LR350 is a wireless router produced by China's TOTOLINK Electronics. No detailed vulnerability details are currently provided
| VAR-202411-3248 | CVE-2024-0106 | NVIDIA BlueField licensing issue vulnerability |
CVSS V2: 6.4 CVSS V3: 8.7 Severity: HIGH |
NVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit (DPU) contains a vulnerability where an attacker may cause an improper handling of insufficient privileges issue. A successful exploit of this vulnerability may lead to denial of service, data tampering, and limited information disclosure. NVIDIA BlueField is a series of data processing units from NVIDIA, an American company
| VAR-202411-0179 | CVE-2024-0105 | NVIDIA ConnectX Permission Issue Vulnerability |
CVSS V2: 7.4 CVSS V3: 8.9 Severity: HIGH |
NVIDIA ConnectX Firmware contains a vulnerability where an attacker may cause an improper handling of insufficient privileges issue. A successful exploit of this vulnerability may lead to denial of service, data tampering, and limited information disclosure. NVIDIA ConnectX is a series of intelligent network interface cards
| VAR-202410-3098 | CVE-2024-51260 | DrayTek Corporation of Vigor3900 Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the acme_process function. DrayTek Corporation of Vigor3900 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202410-3099 | CVE-2024-51255 | DrayTek Corporation of Vigor3900 Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the ruequest_certificate function. DrayTek Corporation of Vigor3900 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202410-2652 | CVE-2024-51259 | DrayTek Corporation of Vigor3900 Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the setup_cacertificate function. DrayTek Corporation of Vigor3900 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202410-2756 | CVE-2024-51254 | DrayTek Corporation of Vigor3900 Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the sign_cacertificate function. DrayTek Corporation of Vigor3900 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202410-2799 | CVE-2024-48272 | D-Link Systems, Inc. of dsl6740c Weak password requirement vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
D-Link DSL6740C v6.TR069.20211230 was discovered to use an insecure default Wifi password, possibly allowing attackers to connect to the device via a bruteforce attack. D-Link Systems, Inc. of dsl6740c A weak password requirement vulnerability exists in the firmware.Information may be obtained. D-Link DSL6740C is a wireless router developed by D-Link.
D-Link DSL6740C has a security vulnerability. Attackers can exploit this vulnerability to gain unauthorized access to the system
| VAR-202410-3480 | CVE-2024-48271 | D-Link Systems, Inc. of dsl6740c Weak password requirement vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
D-Link DSL6740C v6.TR069.20211230 was discovered to use insecure default credentials for Administrator access, possibly allowing attackers to bypass authentication and escalate privileges on the device via a bruteforce attack. D-Link Systems, Inc. of dsl6740c A weak password requirement vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202410-2653 | CVE-2024-51258 | DrayTek Corporation of Vigor3900 Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doSSLTunnel function. DrayTek Corporation of Vigor3900 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202410-3436 | CVE-2024-51301 | DrayTek Corporation of Vigor3900 Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the packet_monitor function. DrayTek Corporation of Vigor3900 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202410-3317 | CVE-2024-51300 | DrayTek Corporation of Vigor3900 Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the get_rrd function. DrayTek Corporation of Vigor3900 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202410-3568 | CVE-2024-51299 | DrayTek Corporation of Vigor3900 Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the dumpSyslog function. DrayTek Corporation of Vigor3900 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202410-2536 | CVE-2024-51298 | DrayTek Corporation of Vigor3900 Code injection vulnerability in firmware |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doGRETunnel function. DrayTek Corporation of Vigor3900 A code injection vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202410-3318 | CVE-2024-51296 | DrayTek Corporation of Vigor3900 Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the pingtrace function. DrayTek Corporation of Vigor3900 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202410-3569 | CVE-2024-51257 | DrayTek Corporation of Vigor3900 Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doCertificate function. DrayTek Corporation of Vigor3900 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202410-2755 | CVE-2024-51304 | DrayTek Corporation of Vigor3900 Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the ldap_search_dn function. DrayTek Corporation of Vigor3900 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202410-3268 | CVE-2024-22066 | plural ZTE In the product Capture-replay Authentication Bypass Vulnerability |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
There is a privilege escalation vulnerability in ZTE ZXR10 ZSR V2 intelligent multi service router . An authenticated attacker could use the vulnerability to obtain sensitive information about the device. ZXR10 1800-2S firmware, zxr10 2800-4 firmware, zxr10 3800-8 firmware etc. ZTE The product has Capture-replay An authentication bypass vulnerability exists.Information may be obtained