VARIoT IoT vulnerabilities database

VAR-202402-3399 | CVE-2024-25746 | Shenzhen Tenda Technology Co.,Ltd. of AC9 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
Stack Based Buffer Overflow vulnerability in Tenda AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the add_white_node function. Shenzhen Tenda Technology Co.,Ltd. of AC9 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-2672 | CVE-2023-24334 | Shenzhen Tenda Technology Co.,Ltd. of ac23 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 8.0 Severity: HIGH |
A stack overflow vulnerability in Tenda AC23 with firmware version US_AC23V1.0re_V16.03.07.45_cn_TDC01 allows attackers to run arbitrary commands via schedStartTime parameter. Shenzhen Tenda Technology Co.,Ltd. of ac23 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-2784 | CVE-2023-24333 | Shenzhen Tenda Technology Co.,Ltd. of ac21 Code injection vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
A stack overflow vulnerability in Tenda AC21 with firmware version US_AC21V1.0re_V16.03.08.15_cn_TDC01 allows attackers to run arbitrary commands via crafted POST request to /goform/openSchedWifi. Shenzhen Tenda Technology Co.,Ltd. of ac21 A code injection vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-2897 | CVE-2023-24332 | Shenzhen Tenda Technology Co.,Ltd. of AC6 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 8.5 CVSS V3: 8.1 Severity: HIGH |
A stack overflow vulnerability in Tenda AC6 with firmware version US_AC6V5.0re_V03.03.02.01_cn_TDC01 allows attackers to run arbitrary commands via crafted POST request to /goform/PowerSaveSet. Shenzhen Tenda Technology Co.,Ltd. of AC6 A stack-based buffer overflow vulnerability exists in the firmware.Information may be obtained and information may be tampered with. The AC6, a dual-band wireless router from Tenda, supports both IPv4 and IPv6 protocols, utilizes the 802.11ac/n wireless standard, and offers a wireless transfer rate of 1167 Mbps. Detailed vulnerability details are currently unavailable
VAR-202402-3003 | CVE-2023-24331 | D-Link Systems, Inc. of DIR-816 Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Command Injection vulnerability in D-Link Dir 816 with firmware version DIR-816_A2_v1.10CNB04 allows attackers to run arbitrary commands via the urlAdd parameter. D-Link Systems, Inc. of DIR-816 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-3234 | CVE-2023-24330 | D-Link Systems, Inc. of DIR-882 Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
Command Injection vulnerability in D-Link Dir 882 with firmware version DIR882A1_FW130B06 allows attackers to run arbitrary commands via crafted POST request to /HNAP1/. D-Link Systems, Inc. of DIR-882 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-3466 | CVE-2023-47422 | plural Shenzhen Tenda Technology Co.,Ltd. Access control vulnerabilities in products |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
An access control issue in /usr/sbin/httpd in Tenda TX9 V1 V22.03.02.54, Tenda AX3 V3 V16.03.12.11, Tenda AX9 V1 V22.03.01.46, and Tenda AX12 V1 V22.03.01.46 allows attackers to bypass authentication on any endpoint via a crafted URL. TX9 firmware, AX3 firmware, ax9 firmware etc. Shenzhen Tenda Technology Co.,Ltd. The product contains an access control vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-2149 | CVE-2024-1661 | TOTOLINK of x6000r Vulnerability related to use of hardcoded credentials in firmware |
CVSS V2: 1.0 CVSS V3: 2.5 Severity: LOW |
A vulnerability classified as problematic was found in Totolink X6000R 9.4.0cu.852_B20230719. Affected by this vulnerability is an unknown functionality of the file /etc/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-254179. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK of x6000r A vulnerability exists in the firmware regarding the use of hardcoded credentials.Information may be obtained. TOTOLINK X6000R is a wireless router from China's TOTOLINK Electronics. No detailed vulnerability details are provided at this time
VAR-202402-2400 | No CVE | Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR6205-E has a command execution vulnerability (CNVD-2024-07921) |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
NBR6205-E is a router product.
Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR6205-E has a command execution vulnerability. An attacker can use this vulnerability to gain server permissions.
VAR-202402-2068 | CVE-2024-25468 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue in TOTOLINK X5000R V.9.1.0u.6369_B20230113 allows a remote attacker to cause a denial of service via the host_time parameter of the NTPSyncWithHost component. TOTOLINK of X5000R The firmware has OS A command injection vulnerability exists.Service operation interruption (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics
VAR-202402-1635 | CVE-2023-31728 | teltonika-networks of rut240 Firmware vulnerabilities |
CVSS V2: - CVSS V3: 7.0 Severity: HIGH |
Teltonika RUT240 devices with firmware before 07.04.2, when bridge mode is used, sometimes make SSH and HTTP services available on the IPv6 WAN interface even though the UI shows that they are only available on the LAN interface. teltonika-networks of rut240 There are unspecified vulnerabilities in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-1769 | CVE-2024-21915 |
CVSS V2: - CVSS V3: 9.0 Severity: CRITICAL |
A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable
VAR-202402-1647 | CVE-2024-25373 | Shenzhen Tenda Technology Co.,Ltd. of AC10 Classic buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 4.6 Severity: MEDIUM |
Tenda AC10V4.0 V16.03.10.20 was discovered to contain a stack overflow via the page parameter in the sub_49B384 function. Shenzhen Tenda Technology Co.,Ltd. of AC10 Firmware has a classic buffer overflow vulnerability.Information may be obtained and information may be tampered with
VAR-202402-1924 | CVE-2023-32462 | Dell's smartfabric os10 In OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Dell OS10 Networking Switches running 10.5.2.x and above contain an OS command injection vulnerability when using remote user authentication. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands and possible system takeover. This is a critical vulnerability as it allows an attacker to cause severe damage. Dell recommends customers to upgrade at the earliest opportunity. (DoS) It may be in a state. Dell OS10 Networking Switches is a switch made by the American company Dell
VAR-202402-1803 | CVE-2023-45581 | fortinet's FortiClient EMS Vulnerability in |
CVSS V2: - CVSS V3: 7.2 Severity: HIGH |
An improper privilege management vulnerability [CWE-269] in Fortinet FortiClientEMS version 7.2.0 through 7.2.2 and before 7.0.10 allows an Site administrator with Super Admin privileges to perform global administrative operations affecting other sites via crafted HTTP or HTTPS requests. fortinet's FortiClient EMS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-1750 | CVE-2023-28078 | Dell's smartfabric os10 Vulnerability in |
CVSS V2: 9.4 CVSS V3: 9.1 Severity: CRITICAL |
Dell OS10 Networking Switches running 10.5.2.x and above contain a vulnerability with zeroMQ when VLT is configured. A remote unauthenticated attacker could potentially exploit this vulnerability leading to information disclosure and a possible Denial of Service when a huge number of requests are sent to the switch. This is a high severity vulnerability as it allows an attacker to view sensitive data. Dell recommends customers to upgrade at the earliest opportunity. Dell's smartfabric os10 Exists in unspecified vulnerabilities.Information is obtained and service operation is interrupted (DoS) It may be in a state
VAR-202402-1804 | CVE-2023-44294 | Dell's secure connect gateway In SQL Injection vulnerability |
CVSS V2: 5.5 CVSS V3: 6.5 Severity: MEDIUM |
In Dell Secure Connect Gateway Application and Secure Connect Gateway Appliance (between v5.10.00.00 and v5.18.00.00), a security concern has been identified, where a malicious user with a valid User session may inject malicious content in filters of Collection Rest API.
This issue may potentially lead to unintentional information disclosure from the product database. Dell's secure connect gateway for, SQL There is an injection vulnerability.Information may be obtained
VAR-202402-1912 | CVE-2023-50927 | Contiki-NG Out-of-bounds read vulnerability in |
CVSS V2: - CVSS V3: 8.6 Severity: HIGH |
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An attacker can trigger out-of-bounds reads in the RPL-Lite implementation of the RPL protocol in the Contiki-NG operating system. This vulnerability is caused by insufficient control of the lengths for DIO and DAO messages, in particular when they contain RPL sub-option headers. The problem has been patched in Contiki-NG 4.9. Users are advised to upgrade. Users unable to upgrade should manually apply the code changes in PR #2484. Contiki-NG Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202402-1858 | CVE-2023-48229 | Contiki-NG Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 7.0 Severity: HIGH |
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds write exists in the driver for IEEE 802.15.4 radios on nRF platforms in the Contiki-NG operating system. The problem is triggered when parsing radio frames in the `read_frame` function in the `arch/cpu/nrf/net/nrf-ieee-driver-arch.c` module. More specifically, the `read_frame` function performs an incomplete validation of the payload length of the packet, which is a value that can be set by an external party that sends radio packets to a Contiki-NG system. Although the value is validated to be in the range of the MTU length, it is not validated to fit into the given buffer into which the packet will be copied. The problem has been patched in the "develop" branch of Contiki-NG and is expected to be included in subsequent releases. Users are advised to update their develop branch or to update to a subsequent release when available. Users unable to upgrade should consider manually applying the changes in PR #2741. Contiki-NG Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-2171 | CVE-2023-50926 | Contiki-NG Out-of-bounds read vulnerability in |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds read can be caused by an incoming DIO message when using the RPL-Lite implementation in the Contiki-NG operating system. More specifically, the prefix information of the DIO message contains a field that specifies the length of an IPv6 address prefix. The value of this field is not validated, which means that an attacker can set a value that is longer than the maximum prefix length. Subsequently, a memcmp function call that compares different prefixes can be called with a length argument that surpasses the boundary of the array allocated for the prefix, causing an out-of-bounds read. The problem has been patched in the "develop" branch of Contiki-NG, and is expected to be included in the next release. Users are advised to update as soon as they are able to or to manually apply the changes in Contiki-NG pull request #2721. Contiki-NG Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state