VARIoT IoT vulnerabilities database

VAR-202405-0458 | CVE-2024-3661 |
CVSS V2: - CVSS V3: 7.6 Severity: HIGH |
DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
VAR-202405-0806 | CVE-2024-33113 | D-Link Systems, Inc. of dir-845l Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
D-LINK DIR-845L <=v1.01KRb03 is vulnerable to Information disclosurey via bsc_sms_inbox.php. D-Link Systems, Inc. of dir-845l The firmware contains command injection and cross-site scripting vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202405-0699 | CVE-2024-33112 | D-Link Systems, Inc. of dir-845l in the firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 7.5 Severity: HIGH |
D-Link DIR-845L router v1.01KRb03 and before is vulnerable to Command injection via the hnap_main()func. D-Link Systems, Inc. D-Link DIR-845L is a wireless router from D-Link, a Chinese company.
D-Link DIR-845L has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands on the system by sending specially crafted requests
VAR-202405-1111 | CVE-2024-33111 | D-Link Systems, Inc. of dir-845l Cross-site scripting vulnerability in firmware |
CVSS V2: 6.4 CVSS V3: 5.4 Severity: MEDIUM |
D-Link DIR-845L router <=v1.01KRb03 is vulnerable to Cross Site Scripting (XSS) via /htdocs/webinc/js/bsc_sms_inbox.php. D-Link Systems, Inc. of dir-845l Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. D-Link DIR-845L is a wireless router from D-Link, a Chinese company.
D-Link DIR-845L v1.01KRb03 and earlier versions have a cross-site scripting vulnerability, which can be exploited by attackers to execute scripts in the victim's web browser using specially crafted URLs
VAR-202405-1258 | CVE-2024-33110 | D-Link Systems, Inc. of dir-845l Authentication vulnerability in firmware |
CVSS V2: 9.4 CVSS V3: 9.1 Severity: CRITICAL |
D-Link DIR-845L router v1.01KRb03 and before is vulnerable to Permission Bypass via the getcfg.php component. D-Link Systems, Inc. of dir-845l An authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. The D-Link DIR-845L is a wireless router from D-Link, a Chinese company.
D-Link DIR-845L versions v1.01KRb03 and earlier contain an authorization vulnerability. An attacker could exploit this vulnerability to cause unauthorized operations
VAR-202405-1658 | CVE-2023-43528 | Out-of-bounds read vulnerability in multiple Qualcomm products |
CVSS V2: - CVSS V3: 6.1 Severity: MEDIUM |
Information disclosure when the ADSP payload size received in HLOS in response to Audio Stream Manager matrix session is less than this expected size. AR8035 firmware, c-v2x 9150 firmware, CSRB31024 Multiple Qualcomm products, such as firmware, contain an out-of-bounds read vulnerability.Information may be obtained
VAR-202405-0029 | CVE-2024-4549 | Delta Electronics, INC. of DIAEnergie Resource exhaustion vulnerability in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A denial of service vulnerability exists in Delta Electronics DIAEnergie v1.10.1.8610 and prior. When processing an 'ICS Restart!' message, CEBC.exe restarts the system. Delta Electronics, INC. of DIAEnergie Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202405-0030 | CVE-2024-4548 | Delta Electronics, INC. of DIAEnergie In SQL Injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
An SQLi vulnerability exists in Delta Electronics DIAEnergie v1.10.1.8610 and prior when CEBC.exe processes a 'RecalculateHDMWYC' message, which is split into 4 fields using the '~' character as the separator. An unauthenticated remote attacker can perform SQLi via the fourth field. Delta Electronics, INC. of DIAEnergie for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Delta Electronics DIAEnergie is an industrial energy management system from Delta Electronics, a Taiwanese company, used to monitor and analyze energy consumption in real time, calculate energy consumption and load characteristics, optimize equipment performance, improve production processes, and maximize energy efficiency.
Delta Electronics DIAEnergie v1.10.1.8610 and earlier versions have a SQL injection vulnerability
VAR-202405-0028 | CVE-2024-4547 | Delta Electronics, INC. of DIAEnergie In SQL Injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A SQLi vulnerability exists in Delta Electronics DIAEnergie v1.10.1.8610 and prior when CEBC.exe processes a 'RecalculateScript' message, which is splitted into 4 fields using the '~' character as the separator. An unauthenticated remote attacker can perform SQLi via the fourth field. Delta Electronics, INC. of DIAEnergie for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker can use this vulnerability to view, add, modify, or delete information in the backend database
VAR-202405-1410 | CVE-2024-33788 | Linksys of E5600 Command injection vulnerability in firmware |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability via the PinCode parameter at /API/info form endpoint. Linksys of E5600 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Linksys E5600 is a powerful, compact and reliable WiFi 5 router from Linksys of the United States. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202405-0129 | CVE-2024-4497 | Shenzhen Tenda Technology Co.,Ltd. of i21 Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been declared as critical. This vulnerability affects the function formexeCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-263086 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of i21 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter cmdinput of the function formexeCommand failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202405-0066 | CVE-2024-4496 | Shenzhen Tenda Technology Co.,Ltd. of i21 Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been classified as critical. This affects the function formWifiMacFilterSet. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263085 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of i21 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter ssidIndex of the function formWifiMacFilterSet failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202405-0120 | CVE-2024-4495 | Shenzhen Tenda Technology Co.,Ltd. of i21 Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability was found in Tenda i21 1.0.0.14(4656) and classified as critical. Affected by this issue is the function formWifiMacFilterGet. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263084. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of i21 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter index of the function formWifiMacFilterGet failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202405-0092 | CVE-2024-4494 | Shenzhen Tenda Technology Co.,Ltd. of i21 Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability has been found in Tenda i21 1.0.0.14(4656) and classified as critical. Affected by this vulnerability is the function formSetUplinkInfo of the file /goform/setUplinkInfo. The manipulation of the argument pingHostIp2 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263083. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of i21 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter pingHostIp2 of the file /goform/setUplinkInfo failing to correctly verify the length of the input data. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202405-0133 | CVE-2024-4493 | Shenzhen Tenda Technology Co.,Ltd. of i21 Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability, which was classified as critical, was found in Tenda i21 1.0.0.14(4656). Affected is the function formSetAutoPing. The manipulation of the argument ping1/ping2 leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-263082 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of i21 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the failure of the parameter ping1/ping2 of the function formSetAutoPing to correctly verify the length of the input data. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202405-0137 | CVE-2024-4492 | Shenzhen Tenda Technology Co.,Ltd. of i21 Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability, which was classified as critical, has been found in Tenda i21 1.0.0.14(4656). This issue affects the function formOfflineSet of the file /goform/setStaOffline. The manipulation of the argument GO/ssidIndex leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263081 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of i21 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter GO/ssidIndex of the file/goform/setStaOffline failing to correctly verify the length of the input data. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202405-0051 | CVE-2024-4491 | Shenzhen Tenda Technology Co.,Ltd. of i21 Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability classified as critical was found in Tenda i21 1.0.0.14(4656). This vulnerability affects the function formGetDiagnoseInfo. The manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263080. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of i21 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter cmdinput of the function formGetDiagnoseInfo failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202405-0365 | CVE-2024-33789 | Linksys of E5600 Command injection vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability via the ipurl parameter at /API/info form endpoint. (DoS) It may be in a state. Linksys E5600 is a powerful, compact and reliable WiFi 5 router from Linksys of the United States. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202405-1101 | CVE-2024-33844 | Parrot of ANAFI Firmware vulnerabilities |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
The 'control' in Parrot ANAFI USA firmware 1.10.4 does not check the MAV_MISSION_TYPE(0, 1, 2, 255), which allows attacker to cut off the connection between a controller and the drone by sending MAVLink MISSION_COUNT command with a wrong MAV_MISSION_TYPE. Parrot of ANAFI There are unspecified vulnerabilities in the firmware.Service operation interruption (DoS) It may be in a state
VAR-202405-0107 | CVE-2024-34033 | Delta Electronics, INC. of DIAEnergie Past traversal vulnerability in |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Delta Electronics DIAEnergie has insufficient input validation which makes it possible to perform a path traversal attack and write outside of the intended directory. If a file name is specified that already exists on the file system, then the original file will be overwritten. Delta Electronics, INC. of DIAEnergie Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state