VARIoT IoT vulnerabilities database

VAR-202404-2359 | CVE-2024-30840 | Shenzhen Tenda Technology Co.,Ltd. of AC15 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
A Stack Overflow vulnerability in Tenda AC15 v15.03.05.18 allows attackers to cause a denial of service via the LISTEN parameter in the fromDhcpListClient function. Shenzhen Tenda Technology Co.,Ltd. of AC15 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state
VAR-202404-0085 | CVE-2024-26023 | Buffalo radio LAN Multiple vulnerabilities in routers |
CVSS V2: - CVSS V3: 4.2 Severity: MEDIUM |
OS command injection vulnerability in BUFFALO wireless LAN routers allows a logged-in user to execute arbitrary OS commands. None
VAR-202404-0086 | CVE-2024-23486 | Buffalo radio LAN Multiple vulnerabilities in routers |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Plaintext storage of a password issue exists in BUFFALO wireless LAN routers, which may allow a network-adjacent unauthenticated attacker with access to the product's login page may obtain configured credentials. None
VAR-202404-0795 | No CVE | Ruijie NBR108G-P gateway has information leakage vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Ruijie Networks is a professional network manufacturer with a full range of network equipment product lines and solutions including switches, routers, software, security firewalls, wireless products, storage, etc.
Ruijie NBR108G-P gateway has an information leakage vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202404-2869 | CVE-2024-25852 | Linksys of RE7000 Access control vulnerabilities in firmware |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
Linksys RE7000 v2.0.9, v2.0.11, and v2.0.15 have a command execution vulnerability in the "AccessControlList" parameter of the access control function point. An attacker can use the vulnerability to obtain device administrator rights. Linksys of RE7000 Firmware contains an access control vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Linksys RE7000 is a wireless signal extender from Linksys, an American company
VAR-202404-3491 | CVE-2024-2742 | Planet IGS-4215-16T2S IP address function command injection vulnerability |
CVSS V2: 5.9 CVSS V3: 6.4 Severity: MEDIUM |
Operating system command injection vulnerability in Planet IGS-4215-16T2S, affecting firmware version 1.305b210528. An authenticated attacker could execute arbitrary code on the remote host by exploiting IP address functionality. Planet IGS-4215-16T2S is an industrial-grade switch device
VAR-202404-3637 | CVE-2024-2741 | Planet IGS-4215-16T2S Web Interface Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.6 CVSS V3: 7.1 Severity: HIGH |
Cross-Site Request Forgery (CSRF) vulnerability in Planet IGS-4215-16T2S, affecting firmware version 1.305b210528. This vulnerability could allow a remote attacker to trick some authenticated users into performing actions in their session, such as adding or updating accounts through the Switch web interface. Planet IGS-4215-16T2S is an industrial-grade switch device
VAR-202404-3041 | CVE-2024-2740 | Planet IGS-4215-16T2S Information Disclosure Vulnerability |
CVSS V2: 6.6 CVSS V3: 7.7 Severity: HIGH |
Information exposure vulnerability in Planet IGS-4215-16T2S, affecting firmware version 1.305b210528. This vulnerability could allow a remote attacker to access some administrative resources due to lack of proper management of the Switch web interface. Planet IGS-4215-16T2S is an industrial-grade switch device. Attackers can exploit this vulnerability to obtain sensitive information
VAR-202404-3442 | CVE-2024-29269 | Telesquare of TLR-2005KSH Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter. Telesquare of TLR-2005KSH Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202404-3328 | CVE-2024-22450 | Dell's Alienware Command Center Vulnerability regarding uncontrolled search path elements in |
CVSS V2: - CVSS V3: 7.4 Severity: HIGH |
Dell Alienware Command Center, versions prior to 6.2.7.0, contain an uncontrolled search path element vulnerability. A local malicious user could potentially inject malicious files in the file search path, leading to system compromise. (DoS) It may be in a state
VAR-202404-3640 | CVE-2024-0159 | Dell's Alienware Command Center Vulnerability in |
CVSS V2: - CVSS V3: 6.7 Severity: MEDIUM |
Dell Alienware Command Center, versions 5.5.52.0 and prior, contain improper access control vulnerability, leading to Denial of Service on local system. Dell's Alienware Command Center Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
VAR-202404-3219 | CVE-2024-31487 | fortinet's FortiSandbox Past traversal vulnerability in |
CVSS V2: - CVSS V3: 5.9 Severity: MEDIUM |
A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.4 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.0 through 2.4.1 may allows attacker to information disclosure via crafted http requests. fortinet's FortiSandbox Exists in a past traversal vulnerability.Information may be obtained
VAR-202404-3527 | CVE-2024-23671 | fortinet's FortiSandbox Past traversal vulnerability in |
CVSS V2: - CVSS V3: 8.1 Severity: HIGH |
A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted HTTP requests. fortinet's FortiSandbox Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be in a state
VAR-202404-3533 | CVE-2024-21756 | fortinet's FortiSandbox In OS Command injection vulnerability |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted requests.. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202404-3263 | CVE-2024-21755 | fortinet's FortiSandbox In OS Command injection vulnerability |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted requests.. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202404-0371 | CVE-2023-49913 | TP-LINK Technologies of EAP225 firmware and EAP115 Out-of-bounds write vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `action` parameter at offset `0x422448` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115. TP-LINK Technologies of EAP225 firmware and EAP115 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK AC1350 is a router from China's TP-LINK company
VAR-202405-1812 | CVE-2023-49909 | TP-LINK Technologies of EAP225 Out-of-bounds write vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `action` parameter at offset `0x0045ab38` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225. TP-LINK Technologies of EAP225 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK AC1350 is a router from China's TP-LINK company
VAR-202404-0250 | CVE-2023-49134 | TP-LINK Technologies of EAP225 firmware and EAP115 Command injection vulnerability in firmware |
CVSS V2: 7.6 CVSS V3: 8.1 Severity: HIGH |
A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point. TP-LINK Technologies of EAP225 firmware and EAP115 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK AC1350/N300 is a router from TP-LINK of China
VAR-202404-0249 | CVE-2023-49133 | TP-LINK Technologies of EAP225 firmware and EAP115 Command injection vulnerability in firmware |
CVSS V2: 7.6 CVSS V3: 8.1 Severity: HIGH |
A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP225(V3) 5.1.0 Build 20220926 of the AC1350 Wireless MU-MIMO Gigabit Access Point. TP-LINK Technologies of EAP225 firmware and EAP115 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK AC1350/N300 is a router from TP-LINK of China.
TP-LINK AC1350 and TP-LINK N300 have a command injection vulnerability. The vulnerability is caused by the tddpd enable_test_mode function failing to properly filter special characters and commands in constructing commands
VAR-202404-0248 | CVE-2023-49074 | TP-LINK Technologies of EAP225 Firmware vulnerabilities |
CVSS V2: 7.1 CVSS V3: 7.4 Severity: HIGH |
A denial of service vulnerability exists in the TDDP functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of network requests can lead to reset to factory settings. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability. TP-LINK Technologies of EAP225 There are unspecified vulnerabilities in the firmware.Service operation interruption (DoS) It may be in a state. TP-LINK AC1350 is a router from China's TP-LINK company