VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202404-0370 CVE-2024-4064 Shenzhen Tenda Technology Co.,Ltd.  of  AC8  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability was found in Tenda AC8 16.03.34.09. It has been declared as critical. This vulnerability affects the function R7WebsSecurityHandler of the file /goform/execCommand. The manipulation of the argument password leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-261790 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of AC8 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. AC8 is a wireless router device that provides network connection and wireless management functions. The vulnerability is caused by improper processing of password parameters. Attackers can exploit this vulnerability to remotely control the device
VAR-202404-1912 CVE-2024-33217 Shenzhen Tenda Technology Co.,Ltd.  of  fh1206  Stack-based buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the page parameter in ip/goform/addressNat. Shenzhen Tenda Technology Co.,Ltd. No detailed vulnerability details are currently provided
VAR-202404-2082 CVE-2024-33215 Shenzhen Tenda Technology Co.,Ltd.  of  fh1206  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the mitInterface parameter in ip/goform/addressNat. Shenzhen Tenda Technology Co.,Ltd. (DoS) It may be in a state. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202404-1559 CVE-2024-33214 Shenzhen Tenda Technology Co.,Ltd.  of  fh1206  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the entrys parameter in ip/goform/RouteStatic. Shenzhen Tenda Technology Co.,Ltd. of fh1206 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Attackers can exploit this vulnerability to cause a denial of service
VAR-202404-1373 CVE-2024-33213 Shenzhen Tenda Technology Co.,Ltd.  of  fh1206  Stack-based buffer overflow vulnerability in firmware CVSS V2: 6.1
CVSS V3: 6.5
Severity: MEDIUM
Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the mitInterface parameter in ip/goform/RouteStatic. Shenzhen Tenda Technology Co.,Ltd. Attackers can exploit this vulnerability to cause a denial of service
VAR-202404-1726 CVE-2024-33212 Shenzhen Tenda Technology Co.,Ltd.  of  fh1206  Stack-based buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the funcpara1 parameter in ip/goform/setcfm. Shenzhen Tenda Technology Co.,Ltd. (DoS) It may be in a state. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202404-1374 CVE-2024-33211 Shenzhen Tenda Technology Co.,Ltd.  of  fh1206  Stack-based buffer overflow vulnerability in firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: HIGH
Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the PPPOEPassword parameter in ip/goform/QuickIndex. Shenzhen Tenda Technology Co.,Ltd. (DoS) It may be in a state. The vulnerability is caused by the PPPOEPassword parameter in ip/goform/QuickIndex failing to properly verify the length of the input data. Attackers can exploit this vulnerability to cause a denial of service
VAR-202404-0244 CVE-2024-4020 Shenzhen Tenda Technology Co.,Ltd.  of  fh1206  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability was found in Tenda FH1206 1.2.0.8(8155) and classified as critical. This issue affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument entrys leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261671. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of fh1206 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. No detailed vulnerability details are provided at present
VAR-202404-0740 CVE-2024-22905 ARM Ltd.  of  Mbed OS  Classic buffer overflow vulnerability in CVSS V2: -
CVSS V3: 7.0
Severity: HIGH
Buffer Overflow vulnerability in ARM mbed-os v.6.17.0 allows a remote attacker to execute arbitrary code via a crafted script to the hciTrSerialRxIncoming function. ARM Ltd. of Mbed OS Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202404-1011 CVE-2024-32335 TOTOLINK  of  N300RT  Cross-site scripting vulnerability in firmware CVSS V2: 6.4
CVSS V3: 5.4
Severity: MEDIUM
TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in Access Control under the Wireless Page. TOTOLINK of N300RT Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. The TOTOLINK N300RT is a wireless router designed primarily for home and small business users. An attacker could exploit this vulnerability by injecting a specially crafted payload to execute arbitrary web script or HTML
VAR-202404-1752 CVE-2024-32334 TOTOLINK  of  N300RT  Cross-site scripting vulnerability in firmware CVSS V2: 6.5
CVSS V3: 6.5
Severity: MEDIUM
TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in IP/Port Filtering under the Firewall Page. TOTOLINK of N300RT Firmware has a cross-site scripting vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK N300RT is a wireless router designed primarily for home and small business users. An attacker could exploit this vulnerability by injecting a specially crafted payload to execute arbitrary web script or HTML
VAR-202404-0638 CVE-2024-32333 TOTOLINK  of  N300RT  Cross-site scripting vulnerability in firmware CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in MAC Filtering under the Firewall Page. TOTOLINK of N300RT Firmware has a cross-site scripting vulnerability.Service operation interruption (DoS) It may be in a state. The TOTOLINK N300RT is a wireless router designed primarily for home and small business users. Detailed vulnerability details are currently unavailable
VAR-202404-1402 CVE-2024-32327 TOTOLINK  of  N300RT  Cross-site scripting vulnerability in firmware CVSS V2: 6.5
CVSS V3: 5.5
Severity: MEDIUM
TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in Port Forwarding under the Firewall Page. TOTOLINK of N300RT Firmware has a cross-site scripting vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK N300RT is a wireless router designed primarily for home and small business users. The TOTOLINK N300RT suffers from a cross-site scripting vulnerability. An attacker could exploit this vulnerability by injecting a specially crafted payload to execute arbitrary web script or HTML
VAR-202404-1581 CVE-2024-32326 TOTOLINK  of  EX200  Cross-site scripting vulnerability in firmware CVSS V2: 6.8
CVSS V3: 6.8
Severity: MEDIUM
TOTOLINK EX200 V4.0.3c.7646_B20201211 contains a Cross-site scripting (XSS) vulnerability through the key parameter in the setWiFiExtenderConfig function. TOTOLINK of EX200 Firmware has a cross-site scripting vulnerability.Information may be obtained. The TOTOLINK EX200 is a 2.4GHz wireless range extender from China's Jiong Electronics. It's primarily used to extend the coverage of existing Wi-Fi networks and resolve signal blind spots. Detailed vulnerability details are currently unavailable
VAR-202404-1754 CVE-2024-32325 TOTOLINK  of  EX200  Cross-site scripting vulnerability in firmware CVSS V2: 3.3
CVSS V3: 2.4
Severity: LOW
TOTOLINK EX200 V4.0.3c.7646_B20201211 contains a Cross-site scripting (XSS) vulnerability through the ssid parameter in the setWiFiExtenderConfig function. TOTOLINK of EX200 Firmware has a cross-site scripting vulnerability.Information may be obtained. The TOTOLINK EX200 is a 2.4GHz wireless N range extender released by China-based Jiong Electronics. It is primarily used to extend the coverage of existing Wi-Fi networks and resolve signal dead zones. This vulnerability stems from the lack of effective filtering and escaping of user-supplied data in the ssid parameter of the setWiFiExtenderConfig method. Detailed vulnerability details are currently unavailable
VAR-202404-1155 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. RG-UAC 6000-E50C has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Ruijie Networks, founded in 2003, is an industry-leading provider of network infrastructure and solutions. RG-UAC 6000-E50C of Beijing Xingwang Ruijie Network Technology Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202404-1533 CVE-2023-5407 Honeywell Experion Server Denial of Service Vulnerability CVSS V2: 5.4
CVSS V3: 5.9
Severity: MEDIUM
Controller denial of service due to improper handling of a specially crafted message received by the controller. See Honeywell Security Notification for recommendations on upgrading and versioning. Honeywell Experion Server is a high-performance industrial control system server from Honeywell, USA, mainly used in the Experion Process Knowledge System (PKS) platform. Honeywell Experion Server has a denial of service vulnerability. Attackers can exploit this vulnerability to cause the controller to deny service
VAR-202404-1755 CVE-2024-32320 Shenzhen Tenda Technology Co.,Ltd.  of  ac500  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.4
CVSS V3: 5.9
Severity: MEDIUM
Tenda AC500 V2.0.1.9(1307) firmware has a stack overflow vulnerability via the timeZone parameter in the formSetTimeZone function. Shenzhen Tenda Technology Co.,Ltd. of ac500 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. Tenda AC500 is a wireless controller device designed for small and medium-sized enterprises, supporting cross-VLAN management of wireless networks. Attackers can exploit this vulnerability to cause a denial of service
VAR-202404-1582 CVE-2024-32318 Shenzhen Tenda Technology Co.,Ltd.  of  ac500  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC500 V2.0.1.9(1307) firmware has a stack overflow vulnerability via the vlan parameter in the formSetVlanInfo function. Shenzhen Tenda Technology Co.,Ltd. of ac500 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC500 is a wireless controller device designed for small and medium-sized enterprises, supporting cross-VLAN management of wireless networks. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202404-1583 CVE-2024-32317 Shenzhen Tenda Technology Co.,Ltd.  of  AC10  Stack-based buffer overflow vulnerability in firmware CVSS V2: 6.1
CVSS V3: 7.5
Severity: HIGH
Tenda AC10 v4.0 V16.03.10.13 and V16.03.10.20 firmware has a stack overflow vulnerability via the adslPwd parameter in the formWanParameterSetting function. Shenzhen Tenda Technology Co.,Ltd. of AC10 A stack-based buffer overflow vulnerability exists in the firmware.Information may be obtained and information may be tampered with. Tenda A18 is a dual-band Gigabit wireless router, mainly for 200M and above fiber users. Tenda AC10 has a buffer overflow vulnerability, which is caused by the adslPwd parameter of the formWanParameterSetting method failing to correctly verify the length of the input data. No detailed vulnerability details are currently provided