VARIoT IoT vulnerabilities database
| VAR-201612-0648 | No CVE | MileSight camera multiple built-in default account vulnerabilities |
CVSS V2: 8.7 CVSS V3: - Severity: HIGH |
MileSight camera is a network camera produced by Xiamen Pulse Vision Digital Technology Co., Ltd.
MileSight camera has multiple built-in default account vulnerabilities. The MileSight camera device in the default configuration has three authentication accounts and seven non-authentication accounts. If the system has less than 10 user settings, an attacker can use an empty account to log in to the camera.
| VAR-201612-0646 | No CVE | MileSight camera default private key certificate vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
MileSight camera is a network camera produced by Xiamen Pulse Vision Digital Technology Co., Ltd.
The MileSight camera has a default private key certificate vulnerability. Since all cameras share the same secret key, an attacker uses the vulnerability to launch a man-in-the-middle attack when establishing an HTTPS connection.
| VAR-201612-0636 | No CVE | MileSight camera permission control page unauthorized access vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
MileSight camera is a network camera produced by Xiamen Pulse Vision Digital Technology Co., Ltd.
MileSight camera has an unauthorized access control page vulnerability. An unauthorized attacker could use the vulnerability to execute arbitrary commands.
| VAR-201612-0641 | No CVE | MileSight camera Web UI CGI buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
MileSight camera is a network camera produced by Xiamen Pulse Vision Digital Technology Co., Ltd.
MileSight camera has Web UI CGI buffer overflow vulnerability. An attacker exploiting the vulnerability could cause the web interface of the camera to crash and execute arbitrary code remotely.
| VAR-201612-0640 | No CVE | ZyXEL Billion 5200W-T Router Remote Command Execution Vulnerability |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
ZyXELBillion5200W-T is a router manufactured by ZyXEL. A remote command execution vulnerability exists in the ZyXELBillion5200W-T router. Because the tools_time.asp interface uiViewSNTPServer parameter has command injection and the device has a default account, the attacker is allowed to exploit the vulnerability to remotely execute arbitrary code.
| VAR-201612-0629 | No CVE | ZyXEL P660HN-T v1 Router Unauthenticated Remote Command Execution Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
ZyXELP660HN-Tv1 is a router manufactured by ZyXEL. The ZyXELP660HN-Tv1 router has an unauthenticated remote command execution vulnerability. Because the remote_host parameter has command injection and the device has a default account, an unauthenticated attacker can exploit the vulnerability to remotely execute arbitrary code.
| VAR-201612-0642 | No CVE | ZyXEL Billion 5200W-T Router Unauthenticated Remote Command Execution Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
ZyXELBillion5200W-T is a router manufactured by ZyXEL. The ZyXELBillion5200W-T router has an unauthenticated remote command execution vulnerability. The command is injected by the syslogServerAddr parameter, allowing unauthenticated attackers to exploit the vulnerability to remotely execute arbitrary code.
| VAR-201612-0649 | No CVE | ZyXEL P660HN-T v2 Router Unauthenticated Remote Command Execution Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
ZyXELP660HN-Tv2 is a router manufactured by ZyXEL. The ZyXELP660HN-Tv2 router has an unauthenticated remote command execution vulnerability. Because the ServerIP parameter has command injection and the device has a default account, the attacker is allowed to exploit the vulnerability to execute arbitrary code remotely.
| VAR-201612-0639 | No CVE | Haier wireless router has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Haier wireless router is a wireless intelligent router.
An unauthorized access vulnerability exists in the Haier wireless router. Allows an attacker to bypass permissions authentication and log in to the system device.
| VAR-201612-0632 | No CVE | Multiple Huawei switches have a denial of service vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Huawei S9700, S5700, S6700, S7700, and S9700 are the switch devices of Huawei (Huawei). A number of Huawei switches have a denial of service vulnerability. Because the device lacks input verification, the remote attacker can exploit the vulnerability to construct a malformed Resource Reservation Protocol (RSVP) packet to the device, causing a small buffer overflow of the device and a probabilistic restart.
| VAR-201706-0143 | CVE-2016-10042 | Arcadyan SLT-00 Star * Device Web Service disruption at the interface (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Authorization Bypass in the Web interface of Arcadyan SLT-00 Star* (aka Swisscom Internet-Box) devices before R7.7 allows unauthorized reconfiguration of the static routing table via an unauthenticated HTTP request, leading to denial of service and information disclosure. Swisscom Internet-Box is a router from Arcadyan. Give way. Swisscom Arcadyan SLT-00 Star* (also known as Swisscom Internet-Box) is a network set-top box device of Swisscom company in Switzerland. An authentication bypass vulnerability exists in the web interface of Swisscom Arcadyan SLT-00 Star* prior to R7.7
| VAR-201701-0356 | CVE-2016-8227 | Windows Multiple running Lenovo Used in the system Lenovo Transition Vulnerability in which privileges are elevated |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Privilege escalation vulnerability in Lenovo Transition application used in Lenovo Yoga, Flex and Miix systems running Windows allows local users to execute code with elevated privileges. Lenovo Transition is prone to a local privilege escalation vulnerability.
A local attacker can leverage this issue to gain elevated privileges. Lenovo Transition is a set of programs developed by China Lenovo (Lenovo) to set whether the video, picture, etc. are automatically full-screen in different modes. There are security vulnerabilities in the Transition program of several Lenovo products. An attacker could exploit this vulnerability to execute arbitrary code with administrator or system privileges. The following products and versions are affected: Lenovo Edge 15 based on Windows 8.1 and earlier; Flex2 14 version, Flex2 15 version; Flex2 14D version, Flex2 15D version; Flex2 Pro15 version; Miix 2-10 version, Miix 2-11 version; Miix 3-1030 version; Yoga 11S version, Yoga 13 version; Yoga 2-11 version, Yoga 2-13 version, Yoga 2 Pro version
| VAR-201612-0628 | No CVE | ASP.NET Core HTTP header injection vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ASP.NET Core is a new open source and cross-platform framework for building modern cloud-based applications connected to the Internet, such as web applications, Internet of Things (IoT) applications, and mobile back-end applications.
ASP.NET Core 5-RC1 version has an HTTP header injection vulnerability. A remote attacker can inject arbitrary HTML and script code by submitting a malicious HTTP request and execute it in a user's browser session.
| VAR-201701-1166 | No CVE | Multiple Samsung Device 'OTP' Service Remote Heap Buffer Overflow Vulnerabilities |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
SamsungGalaxyS6 is Samsung Electronics' mobile smart Android phone. A remote heap buffer overflow vulnerability exists in multiple Samsung devices. An attacker could exploit the vulnerability to cause a denial of service. Due to the nature of this issue, code execution may be possible but this has not been confirmed
| VAR-201803-1081 | CVE-2016-8786 | plural Huawei Vulnerability related to input validation in products |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Huawei S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, S5700 V200R006C00, V200R007C00, V200R008C00, S6700 V200R008C00, S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00 have a denial of service (DoS) vulnerability. Due to the lack of input validation, a remote attacker may craft a malformed Resource Reservation Protocol (RSVP) packet and send it to the device, causing a few buffer overflows and occasional device restart. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei S12700 is an intelligent routing switch of China Huawei. A number of Huawei products have a denial of service vulnerability, which stems from the lack of input detection in the program. Multiple Huawei products are prone to a remote denial-of-service vulnerability.
Attackers can exploit this issue to restart the affected device, denying service to legitimate users.
Huawei S12700, S5700, S6700, S7700, and S9700 are vulnerable. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version; S5700 V200R006C00 Version, V200R007C00 Version, V200R008C00 Version; S6700 V200R008C00 Version; S7700 V200R001C00 Version, V200R002C00 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version , V200R007C00, V200R008C00; S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00
| VAR-201803-1080 | CVE-2016-8785 | plural Huawei Vulnerability related to input validation in products |
CVSS V2: 4.3 CVSS V3: 4.3 Severity: MEDIUM |
Huawei S12700 V200R007C00, V200R008C00, S5700 V200R007C00, S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R007C00 have an input validation vulnerability. Due to the lack of input validation, an attacker may craft a malformed packet and send it to the device using VRP, causing the device to display additional memory data and possibly leading to sensitive information leakage. plural Huawei The product contains an input validation vulnerability.Information may be obtained. The Huawei S9700, S5700, S7700, and S9700 are the switch devices of Huawei (Huawei). Multiple Huawei Products are prone to an information-disclosure vulnerability.
Remote attackers can exploit this issue to obtain sensitive information that may lead to further attacks. Huawei S12700 and others are all intelligent routing switches of China Huawei (Huawei). The following products and versions are affected: Huawei S12700 V200R007C00, V200R008C00; S5700 V200R007C00; S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00
| VAR-201612-0651 | No CVE | NETGEAR WNR2000 Router Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
NetgearWNR2000 is a wireless router product from Netgear. An information disclosure vulnerability exists in the NETGEARWNR2000 router. Unauthenticated attackers exploit vulnerabilities to obtain sensitive information and potentially recover administrator passwords.
| VAR-201612-0654 | No CVE | Samsung DVR Design Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
SamsungDVR is a small PC for recording TV broadcast, cable TV or DirectTV transmission. SamsungDVR design vulnerability. Since the Samsung DVR web browser uses the HTTP80 port by default to transmit a base64 encoded certificate in the cookie header, only the login name and password are base64 encoded. The attacker exploits the vulnerability to modify the default credentials to gain access to the SamsungDVRweb interface and control the IP camera.
| VAR-201612-0655 | No CVE | NETGEAR WNR2000 Router Heap Buffer Overflow Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
NetgearWNR2000 is a wireless router product from Netgear. A heap buffer overflow vulnerability exists in the NETGEARWNR2000 router. Since the router HTTP server processes *.cgi files by URL, an attacker exploiting the vulnerability can lead to a denial of service condition, leading to further attacks.
| VAR-201612-0661 | No CVE | NETGEAR WNR2000 Router Access Control Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
NetgearWNR2000 is a wireless router product from Netgear. An access control vulnerability exists in the NETGEARWNR2000 router. Since the apply_noauth.cgi function has similar functionality to the apply.cgi function that the administrator uses to perform sensitive operations. Unauthenticated attackers can perform sensitive operations through the apply_noauth.cgi function.