VARIoT IoT vulnerabilities database
| VAR-201710-1063 | CVE-2017-6141 | plural F5 BIG-IP Vulnerability related to input validation in products |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
In F5 BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM, and WebSafe 12.1.0 through 12.1.2, certain values in a TLS abbreviated handshake when using a client SSL profile with the Session Ticket option enabled may cause disruption of service to the Traffic Management Microkernel (TMM). The Session Ticket option is disabled by default. plural F5 BIG-IP The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. LTM is a local traffic manager; APM is a solution that provides secure unified access to business-critical applications and networks. Several F5 products have security vulnerabilities. Attackers can exploit this vulnerability to cause the Traffic Management Microkernel to restart and temporarily fail to process traffic
| VAR-201710-1065 | CVE-2017-6145 | plural F5 BIG-IP Vulnerability related to session expiration in products |
CVSS V2: 7.5 CVSS V3: 7.3 Severity: HIGH |
iControl REST in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe 12.0.0 through 12.1.2 and 13.0.0 includes a service to convert authorization BIGIPAuthCookie cookies to X-F5-Auth-Token tokens. This service does not properly re-validate cookies when making that conversion, allowing once-valid but now expired cookies to be converted to valid tokens. plural F5 BIG-IP The product contains a session deadline vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Multiple F5 BIG-IP Products are prone to a security-bypass vulnerability.
Successfully exploiting this issue may allow attackers to perform unauthorized actions. This may lead to other attacks. F5 BIG-IP LTM, etc. F5 BIG-IP LTM is a local traffic manager; BIG-IP AAM is an application acceleration manager. iControl REST is one of the status display transmission interfaces. An attacker could exploit this vulnerability to obtain a valid iControl REST authentication token and gain access to the iControl REST interface of the BIG-IP system. The following products and versions are affected: F5 BIG-IP LTM Release 13.0.0, Release 12.0.0 to Release 12.1.2; BIG-IP AAM Release 13.0.0, Release 12.0.0 to Release 12.1.2; BIG-IP AFM Version 13.0.0, version 12.0.0 to version 12.1.2; BIG-IP Analytics version 13.0.0, version 12.0.0 to version 12.1.2; BIG-IP APM version 13.0.0, version 12.0.0 to 12.1. 2 version; BIG-IP ASM version 13.0.0, version 12.0.0 to 12.1.2; BIG-IP DNS version 13.0.0, version 12.0.0 to 12.1.2; BIG-IP Link Controller version 13.0.0 , version 12.0.0 through 12.1.2; BIG-IP PEM; BIG-IP WebSafe version 13.0.0, version 12.0.0 through 12.1.2
| VAR-201711-0215 | CVE-2017-2699 | plural Huawei Vulnerabilities related to authorization, authority, and access control in products |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
The Huawei Themes APP in versions earlier than PLK-UL00C17B385, versions earlier than CRR-L09C432B380, versions earlier than LYO-L21C577B128 has a privilege elevation vulnerability. An attacker could exploit this vulnerability to upload theme packs containing malicious files and trick users into installing the theme packets, resulting in the execution of arbitrary code. Huawei Honor 7 , Mate S ,and LYO-L21 Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Honor7 and MateS are a smartphone product from China's Huawei company. There is a privilege escalation vulnerability in the HuaweiHonor7/MateS mobile theme app. Huawei Honor 7 and Mate S are prone to a vulnerability that lets attackers upload arbitrary files
| VAR-201702-1068 | CVE-2017-6205 | D-Link DGS-1510 Websmart In device firmware Unauthenticated Command Bypass Attacked vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DGS-1510-28, and DGS-1510-20 Websmart devices with firmware before 1.31.B003 allow attackers to conduct Unauthenticated Command Bypass attacks via unspecified vectors. D-LinkDGS-1510-28XMP is an Ethernet switch from D-Link. Multiple D-Link Products are prone to an unspecified security-bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. D-Link DGS-1510-28XMP, etc. A security vulnerability exists in several D-Link DGS-1510 Websmart devices using firmware versions earlier than 1.31.B003. The following devices are affected: D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DGS-1510-28, DGS-1510-20
| VAR-201702-1069 | CVE-2017-6206 | D-Link DGS-1510 Websmart In device firmware Unauthenticated Information Disclosure Attacked vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DGS-1510-28, and DGS-1510-20 Websmart devices with firmware before 1.31.B003 allow attackers to conduct Unauthenticated Information Disclosure attacks via unspecified vectors. D-Link DGS-1510-28XMP and so on are D-Link's Ethernet switches. Security vulnerabilities exist in several D-Link DGS-1510 Websmart devices, allowing remote attackers to exploit this vulnerability to submit special requests for sensitive information. Multiple D-Link products are prone to an unspecified information-disclosure vulnerability. D-Link DGS-1510-28XMP, etc. The following devices are affected: D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DGS-1510-28, DGS-1510-20
| VAR-201705-3544 | CVE-2017-6137 | plural F5 BIG-IP Product Access control vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, PSM, WebAccelerator, and WebSafe 11.6.1 HF1, 12.0.0 HF3, 12.0.0 HF4, and 12.1.0 through 12.1.2, undisclosed traffic patterns received while software SYN cookie protection is engaged may cause a disruption of service to the Traffic Management Microkernel (TMM) on specific platforms and configurations. plural F5 BIG-IP Product Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5BIG-IP is a load balancer that uses a variety of allocation algorithms to distribute network requests to available servers in a server cluster. By managing incoming web data traffic and increasing effective network bandwidth, network visitors get as much as possible. The hardware device for the best networking experience. A F5BIG-IPTCP packet has a denial of service vulnerability that remote users can use to send a specially crafted sequence of packets, causing the target traffic management microkernel (TMM) to be interrupted. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. LTM is a local traffic manager; APM is a solution that provides secure unified access to business-critical applications and networks. Security flaws exist in several F5 products. An attacker could exploit this vulnerability to compromise services used by the Traffic Management Microkernel (TMM). The following products and versions are affected: F5 BIG-IP LTM Release 11.6.1 HF1, Release 12.0.0 HF3, Release 12.0.0 HF4, Release 12.1.0 through Release 12.1.2; BIG-IP AAM Release 11.6.1 HF1, 12.0.0 HF3 release, 12.0.0 HF4 release, 12.1.0 to 12.1.2 release; BIG-IP AFM 11.6.1 HF1 release, 12.0.0 HF3 release, 12.0.0 HF4 release, 12.1.0 to 12.1 release .2 releases; BIG-IP Analytics 11.6.1 HF1 release, 12.0.0 HF3 release, 12.0.0 HF4 release, 12.1.0 through 12.1.2 releases; BIG-IP APM 11.6.1 HF1 release, 12.0.0 HF3 release Version, version 12.0.0 HF4, version 12.1.0 to version 12.1.2; BIG-IP ASM version 11.6.1 HF1, version 12.0.0 HF3, version 12.0.0 HF4, version 12.1.0 to version 12.1.2; BIG-IP DNS Version 12.0.0 HF3, Version 12.0.0 HF4, Versions 12.1.0 to 12.1.2; BIG-IP GTM Version 11.6.1 HF1; BIG-IP Link Controller Version 11.6.1 HF1, Version 12.0.0 HF3 release, 12.0.0 HF4 release, 12.1.0 to 12.1.2 release; BIG-IP PEM 11.6.1 HF1 release, 12.0.0 HF3 release, 12.0.0 HF4 release, 12.1.0 to 12.1.2 release ; BIG-IP WebSafe Version 11.6.1 HF1, Version 12.0.0 HF3, Version 12.0.0 HF4, Versions 12.1.0 through 12
| VAR-201705-3545 | CVE-2017-6128 | plural F5 Access control vulnerabilities in products |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An attacker may be able to cause a denial-of-service (DoS) attack against the sshd component in F5 BIG-IP, Enterprise Manager, BIG-IQ, and iWorkflow. plural F5 The product contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5BIG-IP is a load balancer that uses a variety of allocation algorithms to distribute network requests to available servers in a server cluster. By managing incoming web data traffic and increasing effective network bandwidth, network visitors get as much as possible. The hardware device for the best networking experience. There is a denial of service vulnerability in F5BIG-IP products. An attacker could exploit the vulnerability to restart the device, resulting in a denial of service. Multiple F5 BIG-IP products are prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause denial-of-service condition. F5 BIG-IP and so on are all products of F5 Company in the United States. Among them, F5 BIG-IP is an all-in-one network device that integrates functions such as network traffic management, application security management, and load balancing. Enterprise Manager is a tool that provides visibility into the entire BIG-IP application delivery infrastructure and optimizes application performance. F5 BIG-IQ is a software-based cloud management solution. The solution supports the deployment of application delivery and network services across public and private clouds, traditional data centers and hybrid environments. iWorkflow is a virtual appliance that serves as a platform for deploying application delivery strategies
| VAR-201705-3546 | CVE-2017-6131 | F5 BIG-IP Vulnerabilities related to the use of hard-coded credentials |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
In some circumstances, an F5 BIG-IP version 12.0.0 to 12.1.2 and 13.0.0 Azure cloud instance may contain a default administrative password which could be used to remotely log into the BIG-IP system. The impacted administrative account is the Azure instance administrative user that was created at deployment. The root and admin accounts are not vulnerable. An attacker may be able to remotely access the BIG-IP host via SSH. F5 BIG-IP Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. F5BIG-IP is a load balancer that uses a variety of allocation algorithms to distribute network requests to available servers in a server cluster. By managing incoming web data traffic and increasing effective network bandwidth, network visitors get as much as possible. The hardware device for the best networking experience. A default password vulnerability exists in F5BIG-IP products. F5 BIG-IP Azure Products are prone to a security-bypass vulnerability. This may lead to further attacks. F5 BIG-IP LTM, etc. LTM is a local traffic manager; APM is a solution that provides secure unified access to business-critical applications and networks. The following products and versions are affected: F5 BIG-IP LTM version 12.0.0 through 12.1.2, version 13.0.0; BIG-IP AAM version 12.0.0 through 12.1.2, version 13.0.0; BIG-IP AFM Version 12.0.0 to Version 12.1.2, Version 13.0.0; BIG-IP APM Version 12.0.0 to Version 12.1.2, Version 13.0.0; BIG-IP ASM Version 12.0.0 to Version 12.1.2, Version 13.0. 0 version; BIG-IP DNS version 12.0.0 to 12.1.2, version 13.0.0; BIG-IP Link Controller version 12.0.0 to 12.1.2, version 13.0.0; BIG-IP PEM version 12.0.0 to version 12.1.2, version 13.0.0; BIG-IP WebSafe version 12.0.0 to version 12.1.2, version 13.0.0
| VAR-201804-0507 | CVE-2017-6143 | F5 BIG-IP Vulnerabilities related to certificate validation |
CVSS V2: 5.8 CVSS V3: 5.4 Severity: MEDIUM |
X509 certificate verification was not correctly implemented in the IP Intelligence Subscription and IP Intelligence feed-list features, and thus the remote server's identity is not properly validated in F5 BIG-IP 12.0.0-12.1.2, 11.6.0-11.6.2, or 11.5.0-11.5.5. F5 BIG-IP Contains a certificate validation vulnerability.Information may be obtained and information may be altered. Both F5 BIG-IP AFM and ASM are products of F5 Company in the United States. F5 BIG-IP AFM is an advanced firewall product for mitigating DDos attacks. ASM is a web application firewall (WAF) that provides secure remote access, protects email, and simplifies web access control while enhancing network and application performance. There is a security vulnerability in F5 BIG-IP AFM and ASM, which is caused by the program not correctly verifying the identity of the remote server. An attacker could exploit this vulnerability to take control of intelligence data. The following products and versions are affected: F5 BIG-IP AFM version 12.1.0 to 12.1.2, 11.6.1 to 11.6.2, 11.5.1 to 11.5.5; BIG-IP ASM version 12.1.0 to version 12.1.2, version 11.6.1 to version 11.6.2, version 11.5.1 to version 11.5.5
| VAR-201712-0676 | CVE-2017-6129 | F5 BIG-IP APM Software input validation vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
In F5 BIG-IP APM software version 13.0.0 and 12.1.2, in some circumstances, APM tunneled VPN flows can cause a VPN/PPP connflow to be prematurely freed or cause TMM to stop responding with a "flow not in use" assertion. An attacker may be able to disrupt traffic or cause the BIG-IP system to fail over to another device in the device group. F5 BIG-IP APM The software contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5 BIG-IP APM is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to cause a denial-of-service condition. F5 BIG-IP Access Policy Manager (APM) is a set of access and security solutions from F5 Corporation of the United States. The solution provides unified access to business-critical applications and networks
| VAR-201712-0669 | CVE-2017-6139 | F5 BIG-IP APM Vulnerability related to information leakage from log files in software |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
In F5 BIG-IP APM software version 13.0.0 and 12.1.2, under rare conditions, the BIG-IP APM system appends log details when responding to client requests. Details in the log file can vary; customers running debug mode logging with BIG-IP APM are at highest risk. F5 BIG-IP APM is prone to an information-disclosure vulnerability.
Successfully exploiting this issue may allow attackers to obtain sensitive information. This may lead to other attacks. Pulse Connect Secure and Desktop Client are prone to a local information-disclosure vulnerability.
The following versions and products are vulnerable:
Versions prior to Desktop Client 9.0R3, and 5.3R7
Versions prior to Pulse Connect Secure 9.0R3, 8.3R7, and 8.1R14. F5 BIG-IP Access Policy Manager (APM) is a set of access and security solutions from F5 Corporation of the United States. The solution provides unified access to business-critical applications and networks
| VAR-201710-1064 | CVE-2017-6144 | F5 BIG-IP PEM Vulnerabilities in certificate validation |
CVSS V2: 5.8 CVSS V3: 7.4 Severity: HIGH |
In F5 BIG-IP PEM 12.1.0 through 12.1.2 when downloading the Type Allocation Code (TAC) database file via HTTPS, the server's certificate is not verified. Attackers in a privileged network position may be able to launch a man-in-the-middle attack against these connections. TAC databases are used in BIG-IP PEM for Device Type and OS (DTOS) and Tethering detection. Customers not using BIG-IP PEM, not configuring downloads of TAC database files, or not using HTTP for that download are not affected. F5 BIG-IP PEM Contains a certificate validation vulnerability.The information may be obtained and the information may be falsified. Multiple F5 BIG-IP Products are prone to a security-bypass vulnerability.
Successfully exploiting this issue may allow attackers to perform unauthorized actions. This may lead to other attacks. F5 BIG-IP is an all-in-one network device integrated with network traffic management, application security management, load balancing and other functions from F5 Corporation of the United States. PEM is one of the Policy Enforcement Managers. Attackers can use this vulnerability to implement man-in-the-middle attacks to tamper with data or obtain information
| VAR-201704-1018 | CVE-2017-6130 | F5 SSL Intercept iApp and SSL Orchestrator Vulnerable to server-side request forgery |
CVSS V2: 5.8 CVSS V3: 7.4 Severity: HIGH |
F5 SSL Intercept iApp 1.5.0 - 1.5.7 and SSL Orchestrator 2.0 is vulnerable to a Server-Side Request Forgery (SSRF) attack when deployed using the Dynamic Domain Bypass (DDB) feature feature plus SNAT Auto Map option for egress traffic. The former is a set of templates for configuring outbound security devices for decrypting SSL traffic in LTM; the latter is a set of solutions designed to optimize SSL infrastructure and provide security devices. Attackers can exploit this vulnerability to implement server-side request forgery attacks
| VAR-201702-1099 | No CVE | TP-Link C2 and C20i Default Credential Design Vulnerabilities |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
TP-Link is a Chinese network equipment manufacturer such as routers and IOT equipment. There is a default credential design vulnerability in the VS-LinkC2 and C20i vsftpdFTP servers. An attacker can exploit the vulnerability to execute the system() command multiple times and run with root privileges.
| VAR-201704-1325 | CVE-2017-8219 | TP-Link C2 and C20i Vulnerability related to input validation in device firmware |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow DoSing the HTTP server via a crafted Cookie header to the /cgi/ansi URI. TP-Link C2 and C20i There is an input validation vulnerability in the device firmware.Service operation interruption (DoS) An attack may be carried out. TP-Link is a Chinese network equipment manufacturer such as routers and IOT equipment. A denial of service vulnerability exists in TP-LinkC2 and C20i. An attacker could exploit the vulnerability by sending an HTTP request to the affected device, causing the HTTP server to crash, causing a denial of service. Both TP-Link C2 and C20i are routers manufactured by China Pulian (TP-LINK). TP-Link C2 and C20i with 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n and earlier firmware have security vulnerabilities
| VAR-201702-1093 | No CVE | There is a SQL injection vulnerability in the Haixian Zhikang basic platform |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Haixie Zhikang Basic Platform is a management system for catering and medicine.
There is a SQL injection vulnerability in the login site of Haixie Zhikang's basic platform. Attackers can use the vulnerability to obtain sensitive information on the website database.
| VAR-201702-1102 | CVE-2025-34048 | D-Link ADSL Router Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: High |
A path traversal vulnerability exists in the web management interface of D-Link DSL-2730U, DSL-2750U, and DSL-2750E ADSL routers with firmware versions IN_1.02, SEA_1.04, and SEA_1.07. The vulnerability is due to insufficient input validation on the getpage parameter within the /cgi-bin/webproc CGI script. This flaw allows an unauthenticated remote attacker to perform path traversal attacks by supplying crafted requests, enabling arbitrary file read on the affected device. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-04 UTC. D-LinkADSLRouterDSL-2730U, DSL-2750U, DSL-2750E are a variety of wireless router products. The D-LinkADSL router has an information disclosure vulnerability that allows an attacker to exploit sensitive information
| VAR-201712-0667 | CVE-2017-6094 | Genexis GAPS Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
CPEs used by subscribers on the access network receive their individual configuration settings from a central GAPS instance. A CPE identifies itself by the MAC address of its WAN interface and a certain "chk" value (48bit) derived from the MAC. The algorithm used to compute the "chk" was disclosed by reverse engineering the CPE's firmware. As a result, it is possible to forge valid "chk" values for any given MAC address and therefore receive the configuration settings of other subscribers' CPEs. The configuration settings often contain sensitive values, for example credentials (username/password) for VoIP services. This issue affects Genexis B.V. GAPS up to 7.2. Genexis GAPS Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. GenexisAutomaticProvisioning System (GAPS) is a system of GENEXIS in the Netherlands for automatically configuring routers and networks. An access control vulnerability exists in GAPS 7.2 and earlier. An attacker could use this vulnerability to obtain configuration information (user credentials)
| VAR-201705-3536 | CVE-2017-6079 | Edgewater Networks Edgemarc Command injection vulnerability in the appliance |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
The HTTP web-management application on Edgewater Networks Edgemarc appliances has a hidden page that allows for user-defined commands such as specific iptables routes, etc., to be set. You can use this page as a web shell essentially to execute commands, though you get no feedback client-side from the web application: if the command is valid, it executes. An example is the wget command. The page that allows this has been confirmed in firmware as old as 2006. Edgewater Networks Edgemarc The appliance contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Edgewater Networks Edgemarc is the device of Edgewater Networks. There are arbitrary command injection vulnerabilities in EdgewaterNetworksEdgemarc. An attacker could exploit this vulnerability to inject arbitrary commands into the context of an affected application, causing further attacks. HTTP web-management appliance is one of the HTTP Web management programs. A security vulnerability exists in the HTTP web-management application on Edgewater Networks Edgemarc devices
| VAR-201702-0960 | CVE-2017-6127 |
DigiSol DG-HR1400 Wireless Router Cross-Site Request Forgery Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201702-0538 |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Multiple cross-site request forgery (CSRF) vulnerabilities in the access portal on the DIGISOL DG-HR1400 Wireless Router with firmware 1.00.02 allow remote attackers to hijack the authentication of administrators for requests that (1) change the SSID, (2) change the Wi-Fi password, or (3) possibly have unspecified other impact via crafted requests to form2WlanBasicSetup.cgi. The DigiSolDG-HR1400 WirelessRouter is a wireless broadband home router. A cross-site request forgery vulnerability exists in the accessportal of DigiSolDG-HR1400 WirelessRouter. Allows remote attackers to build malicious URIs, entice users to resolve, and perform malicious actions in the target user context. DIGISOL DG-HR1400 is prone to multiple cross-site request-forgery vulnerabilities. This may lead to further attacks.
DG-HR1400 1.00.02 is vulnerable; other versions may also be affected