VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202403-0160 CVE-2024-2188 TP-LINK Technologies  of  archer ax50  Cross-site scripting vulnerability in firmware CVSS V2: 4.6
CVSS V3: 6.1
Severity: MEDIUM
Cross-Site Scripting (XSS) vulnerability stored in TP-Link Archer AX50 affecting firmware version 1.0.11 build 2022052. This vulnerability could allow an unauthenticated attacker to create a port mapping rule via a SOAP request and store a malicious JavaScript payload within that rule, which could result in an execution of the JavaScript payload when the rule is loaded. TP-LINK AX50 is a router device produced by China Pulian (TP-LINK) Company. This vulnerability stems from the application's lack of effective filtering and escaping of user-provided data
VAR-202403-0393 CVE-2024-27684 D-Link Systems, Inc.  of  go-rt-ac750  Cross-site scripting vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.1
Severity: MEDIUM
A Cross-site scripting (XSS) vulnerability in dlapn.cgi, dldongle.cgi, dlcfg.cgi, fwup.cgi and seama.cgi in D-Link GORTAC750_A1_FW_v101b03 allows remote attackers to inject arbitrary web script or HTML via the url parameter. D-Link Systems, Inc. of go-rt-ac750 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. D-Link GO-RT-AC750 is a wireless dual-band simple router from China D-Link. D-Link GO-RT-AC750 has a cross-site scripting vulnerability. This vulnerability stems from the lack of effective filtering and escaping of user-provided data in components such as dlapn.cgi and dldongle.cgi
VAR-202403-0510 CVE-2024-0156 Dell's  Dell Digital Delivery  Classic buffer overflow vulnerability in CVSS V2: 6.0
CVSS V3: 7.0
Severity: HIGH
Dell Digital Delivery, versions prior to 5.2.0.0, contain a Buffer Overflow Vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to arbitrary code execution and/or privilege escalation. (DoS) It may be in a state. Dell Digital Delivery is an application developed by the American Dell Company specifically for Dell computer equipment and used to purchase computer pre-installed software online. This vulnerability is caused by the program's failure to correctly verify the length of input data
VAR-202403-0345 CVE-2023-33066 Out-of-bounds write vulnerability in multiple Qualcomm products CVSS V2: -
CVSS V3: 8.4
Severity: HIGH
Memory corruption in Audio while processing RT proxy port register driver. 315 5g iot modem firmware, 9205 lte modem firmware, 9206 lte modem Several Qualcomm products, such as firmware, contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202403-0394 No CVE Beijing StarNet Ruijie Network Technology Co., Ltd. EG3210 has a command execution vulnerability (CNVD-2024-11054) CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
EG3210 is a multi-service security gateway. There is a command execution vulnerability in the EG3210 of Beijing StarNet Ruijie Network Technology Co., Ltd. An attacker can use this vulnerability to gain control of the server.
VAR-202403-0233 CVE-2024-27497 Linksys  of  e2000  Access control vulnerabilities in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
Linksys E2000 Ver.1.0.06 build 1 is vulnerable to authentication bypass via the position.js file. Linksys of e2000 Firmware contains an access control vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202403-0195 CVE-2024-24907 Dell's  secure connect gateway  Cross-site scripting vulnerability in CVSS V2: 6.7
CVSS V3: 7.6
Severity: HIGH
Dell Secure Connect Gateway (SCG) Policy Manager, all versions, contain(s) a Stored Cross-Site Scripting Vulnerability in the Filters page. An adjacent network high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery. Dell Secure Connect Gateway is a secure connection gateway from the American company Dell. No detailed vulnerability details are currently available
VAR-202403-0113 CVE-2024-24905 Dell's  secure connect gateway  Cross-site scripting vulnerability in CVSS V2: 5.7
CVSS V3: 7.6
Severity: HIGH
Dell Secure Connect Gateway (SCG) Policy Manager, all versions, contain(s) a Stored Cross-Site Scripting Vulnerability. An adjacent network high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery. No detailed vulnerability details are currently provided
VAR-202403-0239 CVE-2024-24904 Dell's  secure connect gateway  Cross-site scripting vulnerability in CVSS V2: 6.7
CVSS V3: 7.6
Severity: HIGH
Dell Secure Connect Gateway (SCG) Policy Manager, all versions, contain(s) a Stored Cross-Site Scripting Vulnerability. An adjacent network high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery. No detailed vulnerability details are currently provided
VAR-202403-0280 CVE-2024-24903 Dell's  secure connect gateway  Vulnerability related to password management function in CVSS V2: -
CVSS V3: 8.0
Severity: HIGH
Dell Secure Connect Gateway (SCG) Policy Manager, version 5.10+, contain a weak password recovery mechanism for forgotten passwords. An adjacent network low privileged attacker could potentially exploit this vulnerability, leading to unauthorized access to the application with privileges of the compromised account. The attacker could retrieve the reset password token without authorization and then perform the password change. (DoS) It may be in a state
VAR-202403-0112 CVE-2024-24906 Dell's  secure connect gateway  Cross-site scripting vulnerability in CVSS V2: 6.7
CVSS V3: 7.6
Severity: HIGH
Dell Secure Connect Gateway (SCG) Policy Manager, all versions, contain(s) a Stored Cross-Site Scripting Vulnerability in Policy page. An adjacent network high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery. Dell Secure Connect Gateway is a secure connection gateway of Dell (Dell) in the United States. No detailed vulnerability details are currently provided
VAR-202403-0456 CVE-2024-24900 Dell's  secure connect gateway  Vulnerability in CVSS V2: 6.2
CVSS V3: 5.8
Severity: MEDIUM
Dell Secure Connect Gateway (SCG) Policy Manager, all versions, contain an improper authorization vulnerability. An adjacent network low privileged attacker could potentially exploit this vulnerability, leading to unauthorized devices added to policies. Exploitation may lead to information disclosure and unauthorized access to the system. Dell's secure connect gateway Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with. No detailed vulnerability details are currently provided
VAR-202403-0458 CVE-2024-22458 Dell's  secure connect gateway  Vulnerability in using cryptographic algorithms in CVSS V2: 2.6
CVSS V3: 3.7
Severity: LOW
Dell Secure Connect Gateway, 5.18, contains an Inadequate Encryption Strength Vulnerability. An unauthenticated network attacker could potentially exploit this vulnerability, allowing an attacker to recover plaintext from a block of ciphertext. No detailed vulnerability details are currently available
VAR-202403-0198 CVE-2024-22457 Dell's  secure connect gateway  Spoofing authentication evasion vulnerability in CVSS V2: -
CVSS V3: 7.1
Severity: HIGH
Dell Secure Connect Gateway 5.20 contains an improper authentication vulnerability during the SRS to SCG update path. A remote low privileged attacker could potentially exploit this vulnerability, leading to impersonation of the server through presenting a fake self-signed certificate and communicating with the remote server. Dell's secure connect gateway Exists in spoofing authentication evasion vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202403-0007 CVE-2024-1941 Delta Electronics CNCSoft-B DPA File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Delta Electronics CNCSoft-B versions 1.0.0.4 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of DPA files in the DOPSoft executable. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Delta Electronics CNCSoft-B is a CNC machine tool simulation system software from Delta Electronics, Taiwan, China. The vulnerability is caused by the program failing to correctly verify the length of the input data
VAR-202402-2811 CVE-2024-27662 D-Link Systems, Inc.  of  DIR-823G  Exceptional condition handling vulnerability in firmware CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a Null-pointer dereferences in sub_4110f4(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. D-Link Systems, Inc. of DIR-823G A firmware vulnerability exists regarding the handling of exceptional conditions.Service operation interruption (DoS) It may be in a state
VAR-202402-3031 CVE-2024-27661 D-Link Systems, Inc.  of  DIR-823G  in the firmware  NullPointerException Catch  It was used  NULL  Pointer dereference detection vulnerability CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
D-Link DIR-823G A1V1.0.2B05 was discovered to contain Null-pointer dereferences in sub_4484A8(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. D-Link Systems, Inc. of DIR-823G The firmware has NullPointerException Catch It was used NULL A pointer dereference detection vulnerability exists.Service operation interruption (DoS) It may be in a state
VAR-202402-3144 CVE-2024-27660 D-Link Systems, Inc.  of  DIR-823G  in the firmware  NULL  Pointer dereference vulnerability CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a Null-pointer dereferences in sub_41C488(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. D-Link Systems, Inc. of DIR-823G The firmware has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state
VAR-202402-3257 CVE-2024-27659 D-Link Systems, Inc.  of  DIR-823G  in the firmware  NullPointerException Catch  It was used  NULL  Pointer dereference detection vulnerability CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
D-Link DIR-823G A1V1.0.2B05 was discovered to contain Null-pointer dereferences in sub_42AF30(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. D-Link Systems, Inc. of DIR-823G The firmware has NullPointerException Catch It was used NULL A pointer dereference detection vulnerability exists.Service operation interruption (DoS) It may be in a state
VAR-202402-3367 CVE-2024-27658 D-Link Systems, Inc.  of  DIR-823G  in the firmware  NullPointerException Catch  It was used  NULL  Pointer dereference detection vulnerability CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
D-Link DIR-823G A1V1.0.2B05 was discovered to contain Null-pointer dereferences in sub_4484A8(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. D-Link Systems, Inc. of DIR-823G The firmware has NullPointerException Catch It was used NULL A pointer dereference detection vulnerability exists.Service operation interruption (DoS) It may be in a state