VARIoT IoT vulnerabilities database

VAR-201711-0807 | CVE-2017-2912 | Circle with Disney Firmware vulnerabilities in certificate validation due to host mismatch |
CVSS V2: 2.6 CVSS V3: 5.9 Severity: MEDIUM |
An exploitable vulnerability exists in the remote control functionality of Circle with Disney running firmware 2.0.1. SSL certificates for specific domain names can cause the goclient daemon to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior
VAR-201805-0114 | CVE-2014-10066 | Fancy-server path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Versions less than 0.1.4 of the static file server module fancy-server are vulnerable to directory traversal. An attacker can provide input such as `../` to read files outside of the served directory. fancy-server Contains a path traversal vulnerability.Information may be obtained
VAR-201711-0788 | CVE-2017-2864 | Circle with Disney Vulnerabilities related to authentication in firmware |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An exploitable vulnerability exists in the generation of authentication token functionality of Circle with Disney. Specially crafted network packets can cause a valid authentication token to be returned to the attacker resulting in authentication bypass. An attacker can send a series of packets to trigger this vulnerability. Circle with Disney Authentication firmware contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior
VAR-201711-0781 | CVE-2017-16249 | Brother DCP-J132W Access control vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
The Debut embedded http server contains a remotely exploitable denial of service where a single malformed HTTP POST request can cause the server to hang until eventually replying (~300 seconds) with an HTTP 500 error. While the server is hung, print jobs over the network are blocked and the web interface is inaccessible. An attacker can continuously send this malformed request to keep the device inaccessible to legitimate traffic. Brother DCP-J132W Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Debutembeddedhttpserver is an embedded HTTP server. A security vulnerability exists in the Debutembeddedhttpserver1.20 release
VAR-201711-0140 | CVE-2017-12083 | Circle with Disney Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
An exploitable information disclosure vulnerability exists in the apid daemon of the Circle with Disney running firmware 2.0.1. A specially crafted set of packets can make the Disney Circle dump strings from an internal database into an HTTP response. An attacker needs network connectivity to the Internet to trigger this vulnerability. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior
VAR-201711-0141 | CVE-2017-12084 | Circle with Disney Vulnerabilities related to authorization, authority, and access control in firmware |
CVSS V2: 6.0 CVSS V3: 6.6 Severity: MEDIUM |
A backdoor vulnerability exists in remote control functionality of Circle with Disney running firmware 2.0.1. A specific set of network packets can remotely start an SSH server on the device, resulting in a persistent backdoor. An attacker can send an API call to enable the SSH server. Circle with Disney Vulnerabilities related to authorization, permissions and access control exist in the firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior
VAR-201711-0142 | CVE-2017-12085 | Circle with Disney Vulnerabilities related to security functions in firmware |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An exploitable routing vulnerability exists in the Circle with Disney cloud infrastructure. A specially crafted packet can make the Circle cloud route a packet to any arbitrary Circle device. An attacker needs network connectivity to the Internet to trigger this vulnerability. Circle with Disney Vulnerabilities related to security functions exist in the firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior. There is a routing vulnerability in cloudinfrastructure in CirclewithDisney 2.0.1
VAR-201711-0143 | CVE-2017-12094 | Circle with Disney Command injection vulnerability in some firmware |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
An exploitable vulnerability exists in the WiFi Channel parsing of Circle with Disney running firmware 2.0.1. A specially crafted SSID can cause the device to execute arbitrary sed commands. An attacker needs to setup an access point reachable by the device to trigger this vulnerability. Circle with Disney Has a command injection vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior. A command injection vulnerability exists in the WiFiChannel resolution in the CirclewithDisney 2.0.1 release
VAR-201711-0144 | CVE-2017-12096 | Circle with Disney Access Control Error Vulnerability |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
An exploitable vulnerability exists in the WiFi management of Circle with Disney. A crafted Access Point with the same name as the legitimate one can be used to make Circle connect to an untrusted network. An attacker needs to setup an Access Point reachable by the device and to send a series of spoofed "deauth" packets to trigger this vulnerability. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior. WiFimanagement is one of the WiFi management components
VAR-201711-0789 | CVE-2017-2865 | Circle with Disney Command injection vulnerability in some firmware |
CVSS V2: 7.9 CVSS V3: 7.5 Severity: HIGH |
An exploitable vulnerability exists in the firmware update functionality of Circle with Disney. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability. Circle with Disney Has a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior. There is a command injection vulnerability in CirclewithDisney
VAR-201711-0790 | CVE-2017-2866 | Circle with Disney In OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An exploitable vulnerability exists in the /api/CONFIG/backup functionality of Circle with Disney. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request to trigger this vulnerability. Circle with Disney Is OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior
VAR-201711-0791 | CVE-2017-2881 | Circle with Disney Input vulnerability in Windows firmware |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
An exploitable vulnerability exists in the torlist update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability. Circle with Disney Contains an input validation vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior
VAR-201711-0792 | CVE-2017-2882 | Circle with Disney Vulnerabilities related to input validation in firmware |
CVSS V2: 6.8 CVSS V3: 8.1 Severity: HIGH |
An exploitable vulnerability exists in the servers update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the device to overwrite sensitive files, resulting in code execution. An attacker needs to impersonate a remote server in order to trigger this vulnerability. Circle with Disney Contains a vulnerability related to input validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior
VAR-201711-0793 | CVE-2017-2883 | Circle with Disney , Authorization, Access Control Vulnerabilities in Firmware |
CVSS V2: 9.3 CVSS V3: 8.1 Severity: HIGH |
An exploitable vulnerability exists in the database update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the device to execute arbitrary code. An attacker needs to impersonate a remote server in order to trigger this vulnerability. Circle with Disney Contains firmware, authorization, authority, and access control vulnerabilities.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior
VAR-201711-0794 | CVE-2017-2884 | Circle with Disney Vulnerabilities related to resource depletion in Japanese firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
An exploitable vulnerability exists in the user photo update functionality of Circle with Disney running firmware 2.0.1. A repeated set of specially crafted API calls can cause the device to corrupt essential memory, resulting in a bricked device. An attacker needs network connectivity to the device to trigger this vulnerability. Circle with Disney Vulnerabilities exist in vulnerabilities related to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior
VAR-201711-0795 | CVE-2017-2889 | Circle with Disney Vulnerabilities related to resource depletion in Japanese firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
An exploitable Denial of Service vulnerability exists in the API daemon of Circle with Disney running firmware 2.0.1. A large amount of simultaneous TCP connections causes the APID daemon to repeatedly fork, causing the daemon to run out of memory and trigger a device reboot. An attacker needs network connectivity to the device to trigger this vulnerability. Circle with Disney Vulnerabilities exist in vulnerabilities related to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior
VAR-201711-0796 | CVE-2017-2890 | Circle with Disney In the firmware OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An exploitable vulnerability exists in the /api/CONFIG/restore functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request trigger this vulnerability. Circle with Disney The firmware of OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior. A command injection vulnerability exists in the /api/CONFIG/restore function in the CirclewithDisney 2.0.1 release
VAR-201711-0804 | CVE-2017-2898 | Circle with Disney Vulnerabilities related to race conditions in firmware |
CVSS V2: 8.5 CVSS V3: 7.5 Severity: HIGH |
An exploitable vulnerability exists in the signature verification of the firmware update functionality of Circle with Disney. Specially crafted network packets can cause an unsigned firmware to be installed in the device resulting in arbitrary code execution. An attacker can send a series of packets to trigger this vulnerability. Circle with Disney There is a race condition vulnerability in the firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior
VAR-201711-0806 | CVE-2017-2911 | Circle with Disney Vulnerabilities related to certificate verification due to host mismatch |
CVSS V2: 2.6 CVSS V3: 5.9 Severity: MEDIUM |
An exploitable vulnerability exists in the remote control functionality of Circle with Disney running firmware 2.0.1. SSL certificates for specific domain names can cause the rclient daemon to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior
VAR-201711-0808 | CVE-2017-2913 | Circle with Disney Vulnerabilities related to certificate verification due to host mismatch |
CVSS V2: 2.6 CVSS V3: 5.9 Severity: MEDIUM |
An exploitable vulnerability exists in the filtering functionality of Circle with Disney. SSL certificates for specific domain names can cause the Bluecoat library to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior