VARIoT IoT vulnerabilities database

VAR-202404-0331 | CVE-2023-48724 | TP-LINK Technologies of EAP225 Out-of-bounds write vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A memory corruption vulnerability exists in the web interface functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted HTTP POST request can lead to denial of service of the device's web interface. An attacker can send an unauthenticated HTTP POST request to trigger this vulnerability. TP-LINK Technologies of EAP225 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. TP-LINK AC1350 is a router from China's TP-LINK company
VAR-202404-3003 | CVE-2023-47541 | fortinet's FortiSandbox Past traversal vulnerability in |
CVSS V2: - CVSS V3: 6.7 Severity: MEDIUM |
An improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.2 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.0 through 2.4.1 and 2.3.0 through 2.3.3 and 2.2.0 through 2.2.2 and 2.1.0 through 2.1.3 and 2.0.0 through 2.0.3 allows attacker to execute unauthorized code or commands via CLI. fortinet's FortiSandbox Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202404-2098 | CVE-2023-47540 | fortinet's FortiSandbox In OS Command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 6.7 Severity: MEDIUM |
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.2 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.0.5 through 3.0.7 may allows attacker to execute unauthorized code or commands via CLI. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiSandbox is an APT (Advanced Persistent Threat) protection device from Fortinet. The device provides dual sandbox technology, dynamic threat intelligence system, real-time control panel and reporting.
Fortinet FortiSandbox has an operating system command injection vulnerability, which is caused by an operating system command injection vulnerability
VAR-202404-0165 | CVE-2023-50821 | Siemens SIMATIC WinCC Denial of Service Vulnerability (CNVD-2024-17302) |
CVSS V2: 4.9 CVSS V3: 6.2 Severity: Medium |
A vulnerability has been identified in SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC04), SIMATIC WinCC Runtime Professional V17 (All versions < V17 Update 8), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 1), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 16), SIMATIC WinCC V8.0 (All versions < V8.0 Update 5). The affected products do not properly validate the input provided in the login dialog box. An attacker could leverage this vulnerability to cause a persistent denial of service condition. SIMATIC PCS 7 is a process control system. SIMATIC WinCC is an automated supervisory control and data acquisition (SCADA) system. SIMATIC WinCC Runtime Professional is a visualization runtime platform for operators to control and monitor machines and equipment
VAR-202404-3378 | CVE-2024-27898 | SAP of SAP NetWeaver Server-side request forgery vulnerability in |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
SAP NetWeaver application, due to insufficient input validation, allows an attacker to send a crafted request from a vulnerable web application targeting internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. Thus, having a low impact on confidentiality. SAP of SAP NetWeaver Contains a server-side request forgery vulnerability.Information may be obtained
VAR-202404-2859 | CVE-2024-31817 | TOTOLINK of EX200 Information disclosure vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
In TOTOLINK EX200 V4.0.3c.7646_B20201211, an attacker can obtain sensitive information without authorization through the function getSysStatusCfg. TOTOLINK of EX200 Firmware has an information disclosure vulnerability.Information may be obtained. The TOTOLINK EX200 is a wireless N range extender developed by China's TOTOLINK Electronics. It is primarily used to extend the coverage of existing Wi-Fi networks and resolve signal dead zones.
The TOTOLINK EX200 has an information leakage vulnerability due to improper device permission management
VAR-202404-2896 | CVE-2024-31816 | TOTOLINK of EX200 Information disclosure vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
In TOTOLINK EX200 V4.0.3c.7646_B20201211, an attacker can obtain sensitive information without authorization through the function getEasyWizardCfg. TOTOLINK of EX200 Firmware has an information disclosure vulnerability.Information may be obtained. The TOTOLINK EX200 is a 2.4GHz wireless N range extender released by China-based Jiong Electronics. It is primarily used to extend the coverage of existing Wi-Fi networks and resolve signal blind spots
VAR-202404-3358 | CVE-2024-31815 | TOTOLINK of EX200 User-controlled key authentication bypass vulnerability in firmware |
CVSS V2: 9.4 CVSS V3: 9.1 Severity: CRITICAL |
In TOTOLINK EX200 V4.0.3c.7314_B20191204, an attacker can obtain the configuration file without authorization through /cgi-bin/ExportSettings.sh. TOTOLINK of EX200 An authentication bypass vulnerability exists in firmware with user-controlled keys.Information may be obtained and information may be tampered with. The TOTOLINK EX200 is a wireless N range extender developed by China's TOTOLINK Electronics. It is primarily used to extend the coverage of existing Wi-Fi networks and resolve signal dead zones.
The TOTOLINK EX200 has a security vulnerability caused by improper interface permission management
VAR-202404-2870 | CVE-2024-31814 | TOTOLINK of EX200 Firmware vulnerability regarding authentication bypass using alternative paths or channels |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK EX200 V4.0.3c.7646_B20201211 allows attackers to bypass login through the Form_Login function. TOTOLINK of EX200 The firmware contains an authentication bypass vulnerability using alternate paths or channels.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK EX200 is a wireless N range extender developed by China's TOTOLINK Electronics. It's primarily used to extend the coverage of existing Wi-Fi networks and resolve signal dead zones. Detailed vulnerability details are currently unavailable
VAR-202404-3544 | CVE-2024-31813 | TOTOLINK of EX200 Lack of Authentication Vulnerability in Firmware |
CVSS V2: 7.2 CVSS V3: 8.4 Severity: HIGH |
TOTOLINK EX200 V4.0.3c.7646_B20201211 does not contain an authentication mechanism by default. TOTOLINK of EX200 A lack of authentication vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK EX200 is a wireless N range extender manufactured by China's TOTOLINK Electronics. It's primarily used to extend the coverage of existing Wi-Fi networks and resolve signal dead zones. Detailed vulnerability details are currently unavailable
VAR-202404-2871 | CVE-2024-31812 | TOTOLINK of EX200 Firmware special element sanitization vulnerability |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
In TOTOLINK EX200 V4.0.3c.7646_B20201211, an attacker can obtain sensitive information without authorization through the function getWiFiExtenderConfig. TOTOLINK of EX200 The firmware contains a special element sanitization vulnerability.Information may be obtained. The TOTOLINK EX200 is a wireless N range extender developed by China's TOTOLINK Electronics. It is primarily used to extend the coverage of existing Wi-Fi networks and resolve signal dead zones.
The TOTOLINK EX200 has an information leakage vulnerability due to improper permission management
VAR-202404-3218 | CVE-2024-31811 | TOTOLINK of EX200 Command injection vulnerability in firmware |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (RCE) vulnerability via the langType parameter in the setLanguageCfg function. TOTOLINK of EX200 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK EX200 is a wireless N range extender developed by China's TOTOLINK Electronics. It is primarily used to extend the coverage of existing Wi-Fi networks and resolve signal dead zones. An attacker could exploit this vulnerability to execute arbitrary code
VAR-202404-2904 | CVE-2024-31809 | TOTOLINK of EX200 Firmware special element sanitization vulnerability |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (RCE) vulnerability via the FileName parameter in the setUpgradeFW function. TOTOLINK of EX200 The firmware contains a special element sanitization vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK EX200 is a wireless N range extender developed by China's TOTOLINK Electronics. It is primarily used to extend the coverage of existing Wi-Fi networks and resolve signal dead zones. An attacker could exploit this vulnerability to execute arbitrary code
VAR-202404-2850 | CVE-2024-31808 | TOTOLINK of EX200 Vulnerability regarding improper parameter handling in firmware |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (RCE) vulnerability via the webWlanIdx parameter in the setWebWlanIdx function. TOTOLINK of EX200 The firmware contains a vulnerability related to improper parameter handling.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK EX200 is a wireless N range extender developed by China's TOTOLINK Electronics. It is primarily used to extend the coverage of existing Wi-Fi networks and resolve signal dead zones. An attacker could exploit this vulnerability to execute arbitrary code
VAR-202404-2860 | CVE-2024-31807 | TOTOLINK of EX200 Code injection vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (RCE) vulnerability via the hostTime parameter in the NTPSyncWithHost function. TOTOLINK of EX200 A code injection vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK EX200 is a wireless N range extender developed by China's TOTOLINK Electronics. It is primarily used to extend the coverage of existing Wi-Fi networks and resolve signal dead zones. An attacker could exploit this vulnerability to execute arbitrary code
VAR-202404-2861 | CVE-2024-31806 | TOTOLINK of EX200 Firmware special element sanitization vulnerability |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a Denial-of-Service (DoS) vulnerability in the RebootSystem function which can reboot the system without authorization. TOTOLINK of EX200 The firmware contains a special element sanitization vulnerability.Service operation interruption (DoS) It may be in a state. The TOTOLINK EX200 is a wireless N range extender released by China's Jiweng Electronics (TOTOLINK). It is primarily used to extend the coverage of existing Wi-Fi networks and resolve signal dead zones.
The TOTOLINK EX200 suffers from a denial of service vulnerability caused by a failure to properly validate user input in the RebootSystem method
VAR-202404-2897 | CVE-2024-31805 | TOTOLINK of EX200 Access control vulnerabilities in firmware |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
TOTOLINK EX200 V4.0.3c.7646_B20201211 allows attackers to start the Telnet service without authorization via the telnet_enabled parameter in the setTelnetCfg function. TOTOLINK of EX200 Firmware contains an access control vulnerability.Information may be obtained. The TOTOLINK EX200 is a wireless N range extender developed by China's TOTOLINK Electronics. It is primarily used to extend the coverage of existing Wi-Fi networks and resolve signal dead zones.
The TOTOLINK EX200 has a security vulnerability due to improper permission management
VAR-202404-3101 | CVE-2024-29754 | Google of Android Out-of-bounds read vulnerability in |
CVSS V2: 4.9 CVSS V3: 6.2 Severity: MEDIUM |
In TMU_IPC_GET_TABLE, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information may be obtained. Google Pixel is a smartphone produced by Google in the United States. The vulnerability is caused by the lack of boundary checking in the TMU_IPC_GET_TABLE module. Attackers can exploit this vulnerability to obtain local information
VAR-202404-2956 | CVE-2024-29741 | Google of Android Vulnerability in privilege management in |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
In pblS2mpuResume of s2mpu.c, there is a possible mitigation bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in a permission management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States
VAR-202404-0973 | CVE-2023-48426 | Google of Chromecast Vulnerability related to lack of authentication for critical functions in firmware |
CVSS V2: - CVSS V3: 10.0 Severity: CRITICAL |
u-boot bug that allows for u-boot shell and interrupt over UART
. Google of Chromecast Firmware has a lack of authentication vulnerability for critical functionality.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state