VARIoT IoT vulnerabilities database

VAR-202401-1251 | CVE-2024-0997 | TOTOLINK of N200RE Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216 and classified as critical. Affected by this issue is the function setOpModeCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument pppoeUser leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252266 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK of N200RE A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK N200RE is a SOHO wireless router that utilizes 11N wireless technology, achieving a maximum wireless transmission rate of 300Mbps. It supports MIMO architecture and ATCT automatic idle channel detection technology, effectively improving wireless performance and stability. No detailed vulnerability details are currently available
VAR-202401-1084 | CVE-2024-0996 | Shenzhen Tenda Technology Co.,Ltd. of i9 Out-of-bounds write vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A vulnerability classified as critical has been found in Tenda i9 1.0.0.9(4122). This affects the function formSetCfm of the file /goform/setcfm of the component httpd. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252261 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of i9 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda i9 is a ceiling-mounted wireless access point from the Chinese company Tenda. This vulnerability is caused by the funcpara1 parameter of the formSetCfm function of /goform/setcfm failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or Lead to denial of service attacks
VAR-202401-1126 | CVE-2024-0995 | Shenzhen Tenda Technology Co.,Ltd. of w6 Out-of-bounds write vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A vulnerability was found in Tenda W6 1.0.0.9(4122). It has been rated as critical. Affected by this issue is the function formwrlSSIDset of the file /goform/wifiSSIDset of the component httpd. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252260. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of w6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-1159 | CVE-2024-0994 | Shenzhen Tenda Technology Co.,Ltd. of w6 Out-of-bounds write vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A vulnerability was found in Tenda W6 1.0.0.9(4122). It has been declared as critical. Affected by this vulnerability is the function formSetCfm of the file /goform/setcfm of the component httpd. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252259. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of w6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-1127 | CVE-2024-0993 | Shenzhen Tenda Technology Co.,Ltd. of i6 Out-of-bounds write vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A vulnerability was found in Tenda i6 1.0.0.9(3857). It has been classified as critical. Affected is the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet of the component httpd. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-252258 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of i6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda i6 is a wireless access point from the Chinese company Tenda. The vulnerability is caused by the index parameter of the formWifiMacFilterGet function of /goform/WifiMacFilterGet failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or Lead to denial of service attacks
VAR-202401-1064 | CVE-2024-0992 | Shenzhen Tenda Technology Co.,Ltd. of i6 Out-of-bounds write vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A vulnerability was found in Tenda i6 1.0.0.9(3857) and classified as critical. This issue affects the function formwrlSSIDset of the file /goform/wifiSSIDset of the component httpd. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252257 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of i6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda i6 is a wireless access point from the Chinese company Tenda. The vulnerability is caused by the index parameter of the formwrlSSIDset function of /goform/wifiSSIDset failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or Lead to denial of service attacks
VAR-202401-1128 | CVE-2024-0991 | Shenzhen Tenda Technology Co.,Ltd. of i6 Out-of-bounds write vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A vulnerability has been found in Tenda i6 1.0.0.9(3857) and classified as critical. This vulnerability affects the function formSetCfm of the file /goform/setcfm of the component httpd. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252256. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of i6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda i6 is a wireless access point from the Chinese company Tenda. This vulnerability is caused by the funcpara1 parameter of the formSetCfm function of /goform/setcfm failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or Lead to denial of service attacks
VAR-202401-1085 | CVE-2024-0990 | Shenzhen Tenda Technology Co.,Ltd. of i6 Out-of-bounds write vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A vulnerability, which was classified as critical, was found in Tenda i6 1.0.0.9(3857). This affects the function formSetAutoPing of the file /goform/setAutoPing of the component httpd. The manipulation of the argument ping1 leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252255. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of i6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda i6 is a wireless access point from the Chinese company Tenda. This vulnerability is caused by the ping1 parameter of the formSetAutoPing function of /goform/setAutoPing failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or Causing denial of service
VAR-202401-1620 | CVE-2024-23940 | Made by Trend Micro Air Support Improper Permission Assignment Vulnerability |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Trend Micro uiAirSupport, included in the Trend Micro Security 2023 family of consumer products, version 6.0.2092 and below is vulnerable to a DLL hijacking/proxying vulnerability, which if exploited could allow an attacker to impersonate and modify a library to execute code on the system and ultimately escalate privileges on an affected system. From Trend Micro Inc. Air An update has been released for support. The proof-of-concept code ( PoC ) are published on the Internet. This vulnerability information is provided by the developer for the purpose of disseminating the information to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.A user under a standard user account may be able to escalate privileges and execute arbitrary programs
VAR-202401-1037 | CVE-2024-0944 | TOTOLINK of T8 Firmware Session Expiration Vulnerability |
CVSS V2: 2.6 CVSS V3: 3.7 Severity: LOW |
A vulnerability was found in Totolink T8 4.1.5cu.833_20220905. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /cgi-bin/cstecgi.cgi. The manipulation leads to session expiration. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252188. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK of T8 A session expiration vulnerability exists in firmware.Information may be obtained. TOTOLINK T8 is a wireless dual-band router launched by China Jiong Electronics Co., Ltd., which supports Gigabit network.
TOTOLINK T8 has a code problem vulnerability, which originates from some unknown functions of the file /cgi-bin/cstecgi.cgi. No detailed vulnerability details are provided at present
VAR-202401-1161 | CVE-2024-0943 | TOTOLINK of n350rt Firmware Session Expiration Vulnerability |
CVSS V2: 2.6 CVSS V3: 3.7 Severity: LOW |
A vulnerability was found in Totolink N350RT 9.3.5u.6255. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/cstecgi.cgi. The manipulation leads to session expiration. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252187. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK N350RT is a small home router from China's Zeon Electronics (TOTOLINK) company. An attacker could exploit this vulnerability to gain access to other users' sessions
VAR-202401-1088 | CVE-2024-0942 | TOTOLINK of N200RE_v5 Firmware Session Expiration Vulnerability |
CVSS V2: 2.6 CVSS V3: 3.7 Severity: LOW |
A vulnerability was found in Totolink N200RE V5 9.3.5u.6255_B20211224. It has been classified as problematic. Affected is an unknown function of the file /cgi-bin/cstecgi.cgi. The manipulation leads to session expiration. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-252186 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK N200RE is a wireless broadband router that uses 11N wireless technology, supports up to 300Mbps wireless transmission rate, and is designed to meet the needs of home and small office networks.
TOTOLINK N200RE has a code vulnerability, and no detailed vulnerability details are currently available
VAR-202401-1105 | CVE-2024-0932 | Tenda of AC10U Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: MEDIUM |
A vulnerability, which was classified as critical, has been found in Tenda AC10U 15.03.06.49_multi_TDE01. This issue affects the function setSmartPowerManagement. The manipulation of the argument time leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252137 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10U is a wireless router from China's Tenda company. The vulnerability is caused by the setSmartPowerManagement function failing to properly check the boundaries. An attacker can exploit this vulnerability to overflow the buffer and execute arbitrary code on the system
VAR-202401-1038 | CVE-2024-0931 | Tenda of AC10U Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: MEDIUM |
A vulnerability classified as critical was found in Tenda AC10U 15.03.06.49_multi_TDE01. This vulnerability affects the function saveParentControlInfo. The manipulation of the argument deviceId/time/urls leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252136. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10U is a wireless router from China's Tenda company. An attacker can exploit this vulnerability to execute arbitrary code on the system
VAR-202401-1131 | CVE-2024-0930 | Tenda of AC10U Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: MEDIUM |
A vulnerability classified as critical has been found in Tenda AC10U 15.03.06.49_multi_TDE01. This affects the function fromSetWirelessRepeat. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252135. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10U is a wireless router made by the Chinese company Tenda. This vulnerability is caused by the wpapsk_crypto parameter of the fromSetWirelessRepeat function failing to correctly verify the length of the input data. An attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202401-1162 | CVE-2024-0929 | Tenda of AC10U Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: MEDIUM |
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been rated as critical. Affected by this issue is the function fromNatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252134 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker can exploit this vulnerability to execute arbitrary code on the system
VAR-202401-1150 | CVE-2024-0928 | Tenda of AC10U Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: MEDIUM |
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been declared as critical. Affected by this vulnerability is the function fromDhcpListClient. The manipulation of the argument page/listN leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252133 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the page/listN parameter of the fromDhcpListClient function failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to overflow the buffer and execute arbitrary code on the system
VAR-202401-1090 | CVE-2024-0927 | Tenda of AC10U Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: MEDIUM |
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been classified as critical. Affected is the function fromAddressNat. The manipulation of the argument entrys/mitInterface/page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252132. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the Entrys/mitInterface/page parameter of the fromAddressNat function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to overflow the buffer and execute arbitrary code on the system
VAR-202401-1039 | CVE-2024-0926 | Tenda of AC10U Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: MEDIUM |
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01 and classified as critical. This issue affects the function formWifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252131. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10U is a wireless router made by China Tenda Company. The vulnerability is caused by the index parameter of the formWifiWpsOOB function failing to correctly verify the length of the input data. An attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202401-1091 | CVE-2024-0925 | Tenda of AC10U Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: MEDIUM |
A vulnerability has been found in Tenda AC10U 15.03.06.49_multi_TDE01 and classified as critical. This vulnerability affects the function formSetVirtualSer. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-252130 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10 is a wireless router made by China Tenda Company