VARIoT IoT vulnerabilities database
| VAR-202410-2938 | CVE-2024-45656 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
IBM Flexible Service Processor (FSP) FW860.00 through FW860.B3, FW950.00 through FW950.C0, FW1030.00 through FW1030.61, FW1050.00 through FW1050.21, and FW1060.00 through FW1060.10 has static credentials which may allow network users to gain service privileges to the FSP.
| VAR-202410-2677 | CVE-2024-48826 | Shenzhen Tenda Technology Co.,Ltd. of AC7 in the firmware OS Command injection vulnerability |
CVSS V2: 7.7 CVSS V3: 8.8 Severity: HIGH |
Tenda AC7 v.15.03.06.44 ate_iwpriv_set has pre-authentication command injection allowing remote attackers to execute arbitrary code. Shenzhen Tenda Technology Co.,Ltd. of AC7 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state.
Tenda AC7 has a command injection vulnerability, which is caused by ate_iwpriv_set failing to properly filter special characters and commands in constructing commands
| VAR-202410-3361 | CVE-2024-48825 | Shenzhen Tenda Technology Co.,Ltd. of AC7 in the firmware OS Command injection vulnerability |
CVSS V2: 7.7 CVSS V3: 8.8 Severity: HIGH |
Tenda AC7 v.15.03.06.44 ate_ifconfig_set has pre-authentication command injection allowing remote attackers to execute arbitrary code. Shenzhen Tenda Technology Co.,Ltd. of AC7 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state.
Tenda AC7 has a command injection vulnerability, which is caused by ate_ifconfig_set failing to properly filter special characters and commands in constructing commands
| VAR-202410-3028 | CVE-2024-48074 | DrayTek Corporation of Vigor2960 in the firmware OS Command injection vulnerability |
CVSS V2: - CVSS V3: 8.0 Severity: HIGH |
An authorized RCE vulnerability exists in the DrayTek Vigor2960 router version 1.4.4, where an attacker can place a malicious command into the table parameter of the doPPPoE function in the cgi-bin/mainfunction.cgi route, and finally the command is executed by the system function. DrayTek Corporation of Vigor2960 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202410-1948 | CVE-2024-10434 | Shenzhen Tenda Technology Co.,Ltd. of ac1206 Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in Tenda AC1206 up to 20241027. It has been classified as critical. This affects the function ate_Tenda_mfg_check_usb/ate_Tenda_mfg_check_usb3 of the file /goform/ate. The manipulation of the argument arg leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. of ac1206 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter arg of the function ate_Tenda_mfg_check_usb/ate_Tenda_mfg_check_usb3 in the file /goform/ate failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
| VAR-202410-3651 | No CVE | Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR2500D-E has a command execution vulnerability (CNVD-2024-45058) |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
NBR2500D-E is a community smart router launched by Ruijie Networks, mainly used in scenarios such as corporate Internet cafes.
Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR2500D-E has a command execution vulnerability, which can be exploited by attackers to gain control of the server.
| VAR-202410-3611 | CVE-2024-48459 | Tenda AX2 Pro Operating System Command Injection Vulnerability |
CVSS V2: 7.7 CVSS V3: 7.3 Severity: HIGH |
A command execution vulnerability exists in the AX2 Pro home router produced by Shenzhen Tenda Technology Co., Ltd. (Jixiang Tenda) v.DI_7003G-19.12.24A1V16.03.29.50;V16.03.29.50;V16.03.29.50. An attacker can exploit this vulnerability by constructing a malicious payload to execute commands and further obtain shell access to the router's file system with the highest privileges
| VAR-202410-2617 | CVE-2024-10387 | Rockwell Automation of thinmanager Vulnerability in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
CVE-2024-10387 IMPACT
A Denial-of-Service
vulnerability exists in the affected product. The vulnerability could allow a
threat actor with network access to send crafted messages to the device,
potentially resulting in Denial-of-Service. Rockwell Automation of thinmanager Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Rockwell Automation ThinManager is a thin client management software from Rockwell Automation, USA. It allows thin clients to be assigned to multiple remote desktop servers at the same time.
Rockwell Automation ThinManager has a denial of service vulnerability
| VAR-202410-3402 | CVE-2024-10386 | Rockwell Automation of thinmanager Vulnerability in |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
CVE-2024-10386 IMPACT
An authentication
vulnerability exists in the affected product. The vulnerability could allow a
threat actor with network access to send crafted messages to the device, potentially
resulting in database manipulation. Rockwell Automation of thinmanager Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation ThinManager is a thin client management software from Rockwell Automation, USA. It allows thin clients to be assigned to multiple remote desktop servers at the same time
| VAR-202410-3624 | CVE-2024-47041 | Google of Android Out-of-bounds read vulnerability in |
CVSS V2: 9.0 CVSS V3: 7.8 Severity: HIGH |
In valid_address of syscall.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States.
Google Pixel has a buffer overflow vulnerability, which is caused by incorrect boundary checking in valid_address of syscall.c. Attackers can exploit this vulnerability to cause out-of-bounds reading
| VAR-202410-2097 | CVE-2024-47034 | Google of Android Out-of-bounds read vulnerability in |
CVSS V2: 4.6 CVSS V3: 5.5 Severity: MEDIUM |
there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information may be obtained. Google Pixel is a smartphone produced by Google in the United States. The vulnerability is caused by the lack of boundary checking. Attackers can use this vulnerability to read local information out of bounds
| VAR-202410-1997 | CVE-2024-47033 | Google of Android Vulnerability in using free memory in |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
In lwis_allocator_free of lwis_allocator.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google Inc.
Google Pixel has a memory misreference vulnerability. The vulnerability is caused by a use-after-free in lwis_allocator_free in lwis_allocator.c
| VAR-202410-2257 | CVE-2024-47029 | Google of Android Out-of-bounds read vulnerability in |
CVSS V2: 4.6 CVSS V3: 5.5 Severity: MEDIUM |
In TrustySharedMemoryManager::GetSharedMemory of ondevice/trusty/trusty_shared_memory_manager.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information may be obtained. Google Pixel is a smartphone from Google Inc.
There is a buffer overflow vulnerability in Google Pixel. Attackers can exploit this vulnerability to cause out-of-bounds reading
| VAR-202410-2333 | CVE-2024-47028 | Google of Android Integer overflow vulnerability in |
CVSS V2: 4.6 CVSS V3: 4.4 Severity: MEDIUM |
In ffu_flash_pack of ffu.c, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an integer overflow vulnerability.Information may be obtained. Google Pixel is a smartphone produced by Google in the United States. Attackers can exploit this vulnerability to cause out-of-bounds reading
| VAR-202410-2074 | CVE-2024-47027 | Google of Android Vulnerability in |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
In sm_mem_compat_get_vmm_obj of lib/sm/shared_mem.c, there is a possible arbitrary physical memory access due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States. Attackers can exploit this vulnerability to cause memory access
| VAR-202410-2073 | CVE-2024-47026 | Google of Android Out-of-bounds read vulnerability in |
CVSS V2: 4.6 CVSS V3: 5.5 Severity: MEDIUM |
In gsc_gsa_rescue of gsc_gsa.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information may be obtained. Google Pixel is a smartphone from Google Inc.
There is a buffer overflow vulnerability in Google Pixel. The vulnerability is caused by incorrect boundary checking in gsc_gsa_rescue of gsc_gsa.c. Attackers can exploit this vulnerability to cause out-of-bounds reading
| VAR-202410-2125 | CVE-2024-47024 | Google of Android Integer overflow vulnerability in |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
In vring_size of external/headers/include/virtio/virtio_ring.h, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States. Attackers can exploit this vulnerability to cause out-of-bounds write
| VAR-202410-2328 | CVE-2024-47021 | Google of Android Out-of-bounds read vulnerability in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
In sms_ExtractCbLanguage of sms_CellBroadcast.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information may be obtained. Google Pixel is a smartphone produced by Google in the United States.
There is a buffer overflow vulnerability in Google Pixel. The vulnerability is caused by the lack of boundary check in sms_ExtractCbLanguage of sms_CellBroadcast.c. Attackers can exploit this vulnerability to cause out-of-bounds reading
| VAR-202410-2058 | CVE-2024-47019 | Google of Android Out-of-bounds read vulnerability in |
CVSS V2: 4.6 CVSS V3: 5.5 Severity: MEDIUM |
In ProtocolEmbmsSaiListAdapter::Init() of protocolembmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information may be obtained. Google Pixel is a smartphone produced by Google in the United States.
There is a buffer overflow vulnerability in Google Pixel. The vulnerability is caused by the lack of boundary check in ProtocolEmbmsSaiListAdapter::Init of protocolembmsadapter.cpp. Attackers can exploit this vulnerability to cause out-of-bounds reading
| VAR-202410-2092 | CVE-2024-47018 | Google of Android Out-of-bounds read vulnerability in |
CVSS V2: 4.6 CVSS V3: 5.5 Severity: MEDIUM |
In pmucal_rae_handle_seq_int of flexpmu_cal_rae.c, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information may be obtained. Google Pixel is a smartphone produced by Google in the United States. The vulnerability is caused by the lack of boundary check in pmucal_rae_handle_seq_int of flexpmu_cal_rae.c. Attackers can exploit this vulnerability to cause out-of-bounds reading