VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202410-2938 CVE-2024-45656 CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
IBM Flexible Service Processor (FSP) FW860.00 through FW860.B3, FW950.00 through FW950.C0, FW1030.00 through FW1030.61, FW1050.00 through FW1050.21, and FW1060.00 through FW1060.10 has static credentials which may allow network users to gain service privileges to the FSP.
VAR-202410-2677 CVE-2024-48826 Shenzhen Tenda Technology Co.,Ltd.  of  AC7  in the firmware  OS  Command injection vulnerability CVSS V2: 7.7
CVSS V3: 8.8
Severity: HIGH
Tenda AC7 v.15.03.06.44 ate_iwpriv_set has pre-authentication command injection allowing remote attackers to execute arbitrary code. Shenzhen Tenda Technology Co.,Ltd. of AC7 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC7 has a command injection vulnerability, which is caused by ate_iwpriv_set failing to properly filter special characters and commands in constructing commands
VAR-202410-3361 CVE-2024-48825 Shenzhen Tenda Technology Co.,Ltd.  of  AC7  in the firmware  OS  Command injection vulnerability CVSS V2: 7.7
CVSS V3: 8.8
Severity: HIGH
Tenda AC7 v.15.03.06.44 ate_ifconfig_set has pre-authentication command injection allowing remote attackers to execute arbitrary code. Shenzhen Tenda Technology Co.,Ltd. of AC7 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC7 has a command injection vulnerability, which is caused by ate_ifconfig_set failing to properly filter special characters and commands in constructing commands
VAR-202410-3028 CVE-2024-48074 DrayTek Corporation  of  Vigor2960  in the firmware  OS  Command injection vulnerability CVSS V2: -
CVSS V3: 8.0
Severity: HIGH
An authorized RCE vulnerability exists in the DrayTek Vigor2960 router version 1.4.4, where an attacker can place a malicious command into the table parameter of the doPPPoE function in the cgi-bin/mainfunction.cgi route, and finally the command is executed by the system function. DrayTek Corporation of Vigor2960 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202410-1948 CVE-2024-10434 Shenzhen Tenda Technology Co.,Ltd.  of  ac1206  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in Tenda AC1206 up to 20241027. It has been classified as critical. This affects the function ate_Tenda_mfg_check_usb/ate_Tenda_mfg_check_usb3 of the file /goform/ate. The manipulation of the argument arg leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. of ac1206 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter arg of the function ate_Tenda_mfg_check_usb/ate_Tenda_mfg_check_usb3 in the file /goform/ate failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202410-3651 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR2500D-E has a command execution vulnerability (CNVD-2024-45058) CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
‌NBR2500D-E is a community smart router launched by Ruijie Networks, mainly used in scenarios such as corporate Internet cafes. Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR2500D-E has a command execution vulnerability, which can be exploited by attackers to gain control of the server.
VAR-202410-3611 CVE-2024-48459 Tenda AX2 Pro Operating System Command Injection Vulnerability CVSS V2: 7.7
CVSS V3: 7.3
Severity: HIGH
A command execution vulnerability exists in the AX2 Pro home router produced by Shenzhen Tenda Technology Co., Ltd. (Jixiang Tenda) v.DI_7003G-19.12.24A1V16.03.29.50;V16.03.29.50;V16.03.29.50. An attacker can exploit this vulnerability by constructing a malicious payload to execute commands and further obtain shell access to the router's file system with the highest privileges
VAR-202410-2617 CVE-2024-10387 Rockwell Automation  of  thinmanager  Vulnerability in CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
CVE-2024-10387 IMPACT A Denial-of-Service vulnerability exists in the affected product. The vulnerability could allow a threat actor with network access to send crafted messages to the device, potentially resulting in Denial-of-Service. Rockwell Automation of thinmanager Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Rockwell Automation ThinManager is a thin client management software from Rockwell Automation, USA. It allows thin clients to be assigned to multiple remote desktop servers at the same time. Rockwell Automation ThinManager has a denial of service vulnerability
VAR-202410-3402 CVE-2024-10386 Rockwell Automation  of  thinmanager  Vulnerability in CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
CVE-2024-10386 IMPACT An authentication vulnerability exists in the affected product. The vulnerability could allow a threat actor with network access to send crafted messages to the device, potentially resulting in database manipulation. Rockwell Automation of thinmanager Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation ThinManager is a thin client management software from Rockwell Automation, USA. It allows thin clients to be assigned to multiple remote desktop servers at the same time
VAR-202410-3624 CVE-2024-47041 Google  of  Android  Out-of-bounds read vulnerability in CVSS V2: 9.0
CVSS V3: 7.8
Severity: HIGH
In valid_address of syscall.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States. Google Pixel has a buffer overflow vulnerability, which is caused by incorrect boundary checking in valid_address of syscall.c. Attackers can exploit this vulnerability to cause out-of-bounds reading
VAR-202410-2097 CVE-2024-47034 Google  of  Android  Out-of-bounds read vulnerability in CVSS V2: 4.6
CVSS V3: 5.5
Severity: MEDIUM
there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information may be obtained. Google Pixel is a smartphone produced by Google in the United States. The vulnerability is caused by the lack of boundary checking. Attackers can use this vulnerability to read local information out of bounds
VAR-202410-1997 CVE-2024-47033 Google  of  Android  Vulnerability in using free memory in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
In lwis_allocator_free of lwis_allocator.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google Inc. Google Pixel has a memory misreference vulnerability. The vulnerability is caused by a use-after-free in lwis_allocator_free in lwis_allocator.c
VAR-202410-2257 CVE-2024-47029 Google  of  Android  Out-of-bounds read vulnerability in CVSS V2: 4.6
CVSS V3: 5.5
Severity: MEDIUM
In TrustySharedMemoryManager::GetSharedMemory of ondevice/trusty/trusty_shared_memory_manager.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information may be obtained. Google Pixel is a smartphone from Google Inc. There is a buffer overflow vulnerability in Google Pixel. Attackers can exploit this vulnerability to cause out-of-bounds reading
VAR-202410-2333 CVE-2024-47028 Google  of  Android  Integer overflow vulnerability in CVSS V2: 4.6
CVSS V3: 4.4
Severity: MEDIUM
In ffu_flash_pack of ffu.c, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an integer overflow vulnerability.Information may be obtained. Google Pixel is a smartphone produced by Google in the United States. Attackers can exploit this vulnerability to cause out-of-bounds reading
VAR-202410-2074 CVE-2024-47027 Google  of  Android  Vulnerability in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
In sm_mem_compat_get_vmm_obj of lib/sm/shared_mem.c, there is a possible arbitrary physical memory access due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States. Attackers can exploit this vulnerability to cause memory access
VAR-202410-2073 CVE-2024-47026 Google  of  Android  Out-of-bounds read vulnerability in CVSS V2: 4.6
CVSS V3: 5.5
Severity: MEDIUM
In gsc_gsa_rescue of gsc_gsa.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information may be obtained. Google Pixel is a smartphone from Google Inc. There is a buffer overflow vulnerability in Google Pixel. The vulnerability is caused by incorrect boundary checking in gsc_gsa_rescue of gsc_gsa.c. Attackers can exploit this vulnerability to cause out-of-bounds reading
VAR-202410-2125 CVE-2024-47024 Google  of  Android  Integer overflow vulnerability in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
In vring_size of external/headers/include/virtio/virtio_ring.h, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States. Attackers can exploit this vulnerability to cause out-of-bounds write
VAR-202410-2328 CVE-2024-47021 Google  of  Android  Out-of-bounds read vulnerability in CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
In sms_ExtractCbLanguage of sms_CellBroadcast.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information may be obtained. Google Pixel is a smartphone produced by Google in the United States. There is a buffer overflow vulnerability in Google Pixel. The vulnerability is caused by the lack of boundary check in sms_ExtractCbLanguage of sms_CellBroadcast.c. Attackers can exploit this vulnerability to cause out-of-bounds reading
VAR-202410-2058 CVE-2024-47019 Google  of  Android  Out-of-bounds read vulnerability in CVSS V2: 4.6
CVSS V3: 5.5
Severity: MEDIUM
In ProtocolEmbmsSaiListAdapter::Init() of protocolembmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information may be obtained. Google Pixel is a smartphone produced by Google in the United States. There is a buffer overflow vulnerability in Google Pixel. The vulnerability is caused by the lack of boundary check in ProtocolEmbmsSaiListAdapter::Init of protocolembmsadapter.cpp. Attackers can exploit this vulnerability to cause out-of-bounds reading
VAR-202410-2092 CVE-2024-47018 Google  of  Android  Out-of-bounds read vulnerability in CVSS V2: 4.6
CVSS V3: 5.5
Severity: MEDIUM
In pmucal_rae_handle_seq_int of flexpmu_cal_rae.c, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information may be obtained. Google Pixel is a smartphone produced by Google in the United States. The vulnerability is caused by the lack of boundary check in pmucal_rae_handle_seq_int of flexpmu_cal_rae.c. Attackers can exploit this vulnerability to cause out-of-bounds reading