VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202403-0713 CVE-2024-2560 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Cross-site request forgery vulnerability in firmware CVSS V2: 5.0
CVSS V3: 4.3
Severity: MEDIUM
A vulnerability classified as problematic was found in Tenda AC18 15.03.05.05. Affected by this vulnerability is the function fromSysToolRestoreSet of the file /goform/SysToolRestoreSet. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257059. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd
VAR-202403-0714 CVE-2024-2559 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Cross-site request forgery vulnerability in firmware CVSS V2: 5.0
CVSS V3: 4.3
Severity: MEDIUM
A vulnerability classified as problematic has been found in Tenda AC18 15.03.05.05. Affected is the function fromSysToolReboot of the file /goform/SysToolReboot. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-257058 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd
VAR-202403-0744 CVE-2024-2558 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability was found in Tenda AC18 15.03.05.05. It has been rated as critical. This issue affects the function formexeCommand of the file /goform/execCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257057 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the cmdinput parameter of the formexeCommand function in the /goform/execCommand file failing to correctly verify the length of the input data. A remote attacker can exploit this vulnerability to execute on the system. Arbitrary code or lead to denial of service attacks
VAR-202403-0846 CVE-2024-2547 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability was found in Tenda AC18 15.03.05.05 and classified as critical. Affected by this issue is the function R7WebsSecurityHandler. The manipulation of the argument password leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257000. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability is caused by the password parameter of the R7WebsSecurityHandler function failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202403-0755 CVE-2024-2546 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability has been found in Tenda AC18 15.13.07.09 and classified as critical. Affected by this vulnerability is the function fromSetWirelessRepeat. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256999. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability is caused by the failure of the wpapsk_crypto5g parameter of the fromSetWirelessRepeat function to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202403-1157 CVE-2024-28640 TOTOLINK  of  X5000R  firmware and  a7000r  Out-of-bounds read vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Buffer Overflow vulnerability in TOTOLink X5000R V9.1.0u.6118-B20201102 and A7000R V9.1.0u.6115-B20201022 allows a remote attacker to cause a denial of service (D0S) via the command field. TOTOLINK of X5000R firmware and a7000r An out-of-bounds read vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. TOTOLINK X5000R is a router. TOTOLINK A7000R is a wireless router. There is a buffer overflow vulnerability in TOTOLINK X5000R and A7000R
VAR-202403-2283 CVE-2024-28639 TOTOLINK  of  X5000R  firmware and  a7000r  Classic buffer overflow vulnerability in firmware CVSS V2: 4.0
CVSS V3: 9.8
Severity: CRITICAL
Buffer Overflow vulnerability in TOTOLink X5000R V9.1.0u.6118-B20201102 and A7000R V9.1.0u.6115-B20201022, allow remote attackers to execute arbitrary code and cause a denial of service (DoS) via the IP field. TOTOLINK of X5000R firmware and a7000r Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK X5000R is a router. TOTOLINK A7000R is a wireless router. There is a buffer overflow vulnerability in TOTOLINK X5000R and A7000R. The vulnerability is caused by the sub_41F7E8 function in the /www/cgi bin/cstegi.cgi file not checking the data length when copying the IP field content
VAR-202403-2890 CVE-2024-28404 TOTOLINK  of  x2000r  Cross-site scripting vulnerability in firmware CVSS V2: 7.3
CVSS V3: 8.0
Severity: HIGH
TOTOLINK X2000R before V1.0.0-B20231213.1013 contains a Stored Cross-site scripting (XSS) vulnerability in MAC Filtering under the Firewall Page. TOTOLINK of x2000r Firmware has a cross-site scripting vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK X2000R is a WiFi 6 router launched by China Jiong Electronics. It supports Gigabit network and Easy Mesh functions, and has multi-device connection and wireless expansion capabilities. TOTOLINK X2000R has a cross-site scripting vulnerability. No detailed vulnerability details are currently provided
VAR-202403-1743 CVE-2024-28401 TOTOLINK  of  x2000r  Cross-site scripting vulnerability in firmware CVSS V2: 5.5
CVSS V3: 5.4
Severity: MEDIUM
TOTOLINK X2000R before v1.0.0-B20231213.1013 contains a Store Cross-site scripting (XSS) vulnerability in Root Access Control under the Wireless Page. TOTOLINK of x2000r Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. TOTOLINK X2000R is a wireless router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to execute arbitrary Web scripts or HTML by injecting carefully designed payloads
VAR-202403-1911 CVE-2024-28403 TOTOLINK  of  x2000r  Cross-site scripting vulnerability in firmware CVSS V2: 5.5
CVSS V3: 5.4
Severity: MEDIUM
TOTOLINK X2000R before V1.0.0-B20231213.1013 is vulnerable to Cross Site Scripting (XSS) via the VPN Page. TOTOLINK of x2000r Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. TOTOLINK X2000R is a WiFi 6 router launched by China Jiong Electronics. It supports Gigabit network and Easy Mesh functions, and has multi-device connection and wireless expansion capabilities. TOTOLINK X2000R has a cross-site scripting vulnerability. The vulnerability is caused by the lack of effective filtering and escaping of user-provided data on the VPN Page. Attackers can exploit this vulnerability to execute arbitrary web scripts or HTML by injecting carefully designed payloads
VAR-202403-0709 CVE-2024-2490 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability classified as critical was found in Tenda AC18 15.03.05.05. Affected by this vulnerability is the function setSchedWifi of the file /goform/openSchedWifi. The manipulation of the argument schedStartTime/schedEndTime leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256897 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. A remote attacker can exploit this vulnerability to execute on the system. Arbitrary code or lead to denial of service attacks
VAR-202403-0658 CVE-2024-2489 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability classified as critical has been found in Tenda AC18 15.03.05.05. Affected is the function formSetQosBand of the file /goform/SetNetControlList. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-256896. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202403-0914 CVE-2024-2488 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability was found in Tenda AC18 15.03.05.05. It has been rated as critical. This issue affects the function formSetPPTPServer of the file /goform/SetPptpServerCfg. The manipulation of the argument startIP leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256895. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202403-0626 CVE-2024-2487 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability was found in Tenda AC18 15.03.05.05. It has been declared as critical. This vulnerability affects the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName/mac leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-256894 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202403-0685 CVE-2024-2486 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability was found in Tenda AC18 15.03.05.05. It has been classified as critical. This affects the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256893 was assigned to this vulnerability. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202403-1344 CVE-2024-28354 TRENDnet  of  TEW-827DRU  Command injection vulnerability in firmware CVSS V2: -
CVSS V3: 10.0
Severity: CRITICAL
There is a command injection vulnerability in the TRENDnet TEW-827DRU router with firmware version 2.10B01. An attacker can inject commands into the post request parameters usapps.@smb[%d].username in the apply.cgi interface, thereby gaining root shell privileges. TRENDnet of TEW-827DRU Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202403-2291 CVE-2024-28353 TRENDnet  of  TEW-827DRU  Command injection vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
There is a command injection vulnerability in the TRENDnet TEW-827DRU router with firmware version 2.10B01. An attacker can inject commands into the post request parameters usapps.config.smb_admin_name in the apply.cgi interface, thereby gaining root shell privileges. TRENDnet of TEW-827DRU Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202403-0758 CVE-2024-2485 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability was found in Tenda AC18 15.03.05.05 and classified as critical. Affected by this issue is the function formSetSpeedWan of the file /goform/SetSpeedWan. The manipulation of the argument speed_dir leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-256892. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of AC18 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202403-0662 CVE-2024-1917 Mitsubishi Electric MELSEC-Q Series and MELSEC-L Series Remote Code Execution Vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet. Mitsubishi Electric MELSEC-Q Series is a MELSEC-Q series programmable logic controller of Mitsubishi Electric of Japan. Mitsubishi MELSEC-L Series is a MELSEC-L series programmable logic controller of Mitsubishi of Japan
VAR-202403-2944 No CVE There is a command execution vulnerability (CNVD-2022-53245) in the operation and maintenance audit system of Beijing COSCO Kirin Technology Co., Ltd. CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Beijing COSCO Kirin Technology Co., Ltd. is a software development company focusing on research and development. The company's main products are COSCO Kirin bastion host, Kirin SSL VPN, Kirin dynamic password system, Kirin cloud desktop, etc. COSCO Kirin bastion machines mainly operate in cloud markets such as Tencent Cloud, Alibaba Cloud, Huawei Cloud, and Inspur Cloud. There is a command execution vulnerability in the operation and maintenance audit system of Beijing COSCO Kirin Technology Co., Ltd. An attacker can use this vulnerability to gain control of the server.