VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202402-3032 CVE-2024-27657 D-Link Systems, Inc.  of  DIR-823G  Stack-based buffer overflow vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the User-Agent parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input, and possibly remote code execution. D-Link Systems, Inc. of DIR-823G A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-3258 CVE-2024-27656 D-Link Systems, Inc.  of  DIR-823G  Stack-based buffer overflow vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Cookie parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input, and possibly remote code execution. D-Link Systems, Inc. of DIR-823G A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-2700 CVE-2024-27655 D-Link Systems, Inc.  of  DIR-823G  Stack-based buffer overflow vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the SOAPACTION parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input, and possibly remote code execution. D-Link Systems, Inc. of DIR-823G A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-3037 CVE-2024-26548 VIVOTEK Inc.  of  FD8166A-VVTK-0204j  Firmware vulnerabilities CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
An issue in vivotek Network Camera v.FD8166A-VVTK-0204j allows a remote attacker to execute arbitrary code via a crafted payload to the upload_file.cgi component. VIVOTEK Inc. of FD8166A-VVTK-0204j There are unspecified vulnerabilities in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-3001 CVE-2023-37495 HCL Technologies Limited  of  Domino server  Vulnerability regarding lack of authentication for critical features in CVSS V2: -
CVSS V3: 5.9
Severity: MEDIUM
Internet passwords stored in Person documents in the Domino® Directory created using the "Add Person" action on the People & Groups tab in the Domino® Administrator are secured using a cryptographically weak hash algorithm. This could enable attackers with access to the hashed value to determine a user's password, e.g. using a brute force attack. This issue does not impact Person documents created through user registration https://help.hcltechsw.com/domino/10.0.1/admin/conf_userregistration_c.html . HCL Technologies Limited of Domino server There is a vulnerability in the lack of authentication for critical features.Information may be obtained
VAR-202402-2928 CVE-2024-26342 ASUSTeK Computer Inc.  of  4G-AC68U  in the firmware  NULL  Pointer dereference vulnerability CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
A Null pointer dereference in usr/sbin/httpd in ASUS AC68U 3.0.0.4.384.82230 allows remote attackers to trigger DoS via network packet. ASUSTeK Computer Inc. of 4G-AC68U The firmware has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state
VAR-202402-2654 CVE-2023-51747 Apache Software Foundation  of  Apache James  Input verification vulnerability in CVSS V2: -
CVSS V3: 7.1
Severity: HIGH
Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions. Apache Software Foundation of Apache James These include vulnerabilities related to input validation, vulnerabilities related to authentication evasion through spoofing, HTTP There is a vulnerability related to request smuggling.Information may be obtained and information may be tampered with
VAR-202402-3105 CVE-2023-51518 Apache Software Foundation  of  Apache James  Untrusted Data Deserialization Vulnerability in CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Apache James prior to version 3.7.5 and 3.8.0 exposes a JMX endpoint on localhost subject to pre-authentication deserialisation of untrusted data. Given a deserialisation gadjet, this could be leveraged as part of an exploit chain that could result in privilege escalation. Note that by default JMX endpoint is only bound locally. We recommend users to:  - Upgrade to a non-vulnerable Apache James version  - Run Apache James isolated from other processes (docker - dedicated virtual machine)  - If possible turn off JMX . Apache Software Foundation of Apache James There is a vulnerability in deserialization of untrusted data.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-2722 CVE-2024-25751 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A Stack Based Buffer Overflow vulnerability in Tenda AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the fromSetSysTime function. Shenzhen Tenda Technology Co.,Ltd. of AC9 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda AC9 suffers from a buffer overflow vulnerability caused by a failure to check the input buffer size
VAR-202402-2745 CVE-2024-1890 sma  of  Cluster Controller  firmware and  Sunny Webbox  Vulnerability related to improper restriction of rendered user interface layers or frames in firmware CVSS V2: -
CVSS V3: 6.4
Severity: MEDIUM
Vulnerability whereby an attacker could send a malicious link to an authenticated operator, which could allow remote attackers to perform a clickjacking attack on Sunny WebBox firmware version 1.6.1 and earlier. sma of Cluster Controller firmware and Sunny Webbox A vulnerability exists in the firmware that involves improper restriction of rendered user interface layers or frames.Information may be obtained and information may be tampered with
VAR-202402-2638 CVE-2024-1889 sma  of  Cluster Controller  firmware and  Sunny Webbox  Cross-site request forgery vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
Cross-Site Request Forgery vulnerability in SMA Cluster Controller, affecting version 01.05.01.R. This vulnerability could allow an attacker to send a malicious link to an authenticated user to perform actions with these user permissions on the affected device. (DoS) It may be in a state
VAR-202402-3319 CVE-2024-0387 plural  Moxa Inc.  Product vulnerabilities CVSS V2: 5.2
CVSS V3: 6.5
Severity: MEDIUM
The EDS-4000/G4000 Series prior to version 3.2 includes IP forwarding capabilities that users cannot deactivate. An attacker may be able to send requests to the product and have it forwarded to the target. An attacker can bypass access controls or hide the source of malicious requests. EDS-4008 firmware, EDS-4009 firmware, EDS-4012 firmware etc. Moxa Inc. There are unspecified vulnerabilities in the product.Information may be obtained and information may be tampered with. MOXA EDS-4000/G4000 Series is a series of industrial managed Ethernet switches from China's MOXA company. There is a security bypass vulnerability in MOXA EDS-4000/G4000 Series versions prior to 3.2
VAR-202402-2601 No CVE There is a command execution vulnerability in EG3210 of Beijing StarNet Ruijie Network Technology Co., Ltd. CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Beijing Xingwang Ruijie Network Technology Co., Ltd. EG3210 is a router product. There is a command execution vulnerability in the EG3210 of Beijing StarNet Ruijie Network Technology Co., Ltd. An attacker can use this vulnerability to gain control of the server.
VAR-202402-3290 CVE-2024-22395 plural  SonicWALL  Product vulnerabilities CVSS V2: -
CVSS V3: 6.3
Severity: MEDIUM
Improper access control vulnerability has been identified in the SMA100 SSL-VPN virtual office portal, which in specific conditions could potentially enable a remote authenticated attacker to associate another user's MFA mobile application. SMA200 firmware, SMA210 firmware, SMA400 firmware etc. SonicWALL There are unspecified vulnerabilities in the product.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-2723 CVE-2024-25730 Hitron Technologies Inc.  of  CODA-4582U  firmware and  CODA-4589  Insufficient Entropy Vulnerability in Firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Hitron CODA-4582 and CODA-4589 devices have default PSKs that are generated from 5-digit hex values concatenated with a "Hitron" substring, resulting in insufficient entropy (only about one million possibilities). Hitron Technologies Inc. of CODA-4582U firmware and CODA-4589 Firmware has an entropy deficiency vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-2325 CVE-2024-1786 D-Link Systems, Inc.  of  DIR-600M  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DIR-600M C1 3.08. Affected by this issue is some unknown functionality of the component Telnet Service. The manipulation of the argument username leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254576. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. D-Link Systems, Inc. of DIR-600M Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202402-2319 CVE-2024-1783 TOTOLINK  of  lr1200gb  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability classified as critical has been found in Totolink LR1200GB 9.1.0u.6619_B20230130/9.3.5u.6698_B20230810. Affected is the function loginAuth of the file /cgi-bin/cstecgi.cgi of the component Web Interface. The manipulation of the argument http_host leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-254574 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK of lr1200gb A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK LR1200GB is a wireless dual-band 4G LTE router from China's TOTOLINK Electronics. No detailed vulnerability details are currently provided
VAR-202402-2825 CVE-2024-25756 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  Stack-based buffer overflow vulnerability in firmware CVSS V2: -
CVSS V3: 8.0
Severity: HIGH
A Stack Based Buffer Overflow vulnerability in Tenda AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the formWifiBasicSet function. Shenzhen Tenda Technology Co.,Ltd. of AC9 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-3165 CVE-2024-25753 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  Stack-based buffer overflow vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
Stack Based Buffer Overflow vulnerability in Tenda AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the formSetDeviceName function. Shenzhen Tenda Technology Co.,Ltd. of AC9 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-3398 CVE-2024-25748 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  Stack-based buffer overflow vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
A Stack Based Buffer Overflow vulnerability in tenda AC9 AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the fromSetIpMacBind function. Shenzhen Tenda Technology Co.,Ltd. of AC9 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state