VARIoT IoT vulnerabilities database

VAR-202401-1132 | CVE-2024-0924 | Shenzhen Tenda Technology Co.,Ltd. of ac10u Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: MEDIUM |
A vulnerability, which was classified as critical, was found in Tenda AC10U 15.03.06.49_multi_TDE01. This affects the function formSetPPTPServer. The manipulation of the argument startIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252129 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of ac10u A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the startIp parameter of the formSetPPTPServer function failing to correctly verify the length of the input data. An attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202401-1133 | CVE-2024-0923 | Tenda of AC10U Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: MEDIUM |
A vulnerability, which was classified as critical, has been found in Tenda AC10U 15.03.06.49_multi_TDE01. Affected by this issue is the function formSetDeviceName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252128. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10U is a wireless router made by the Chinese company Tenda
VAR-202401-1144 | CVE-2024-0922 | Tenda of AC10U Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: MEDIUM |
A vulnerability classified as critical was found in Tenda AC10U 15.03.06.49_multi_TDE01. Affected by this vulnerability is the function formQuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252127. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10U is a wireless router made by the Chinese company Tenda. A remote attacker could exploit this vulnerability to overflow a buffer and execute arbitrary code on the system
VAR-202401-1079 | CVE-2024-0921 | D-Link Systems, Inc. of DIR-816 A2 in the firmware OS Command injection vulnerability |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: MEDIUM |
A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/setDeviceSettings of the component Web Interface. The manipulation of the argument statuscheckpppoeuser leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252139. D-Link Systems, Inc. of DIR-816 A2 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-816 A2 is a wireless router made by China D-Link Company. This vulnerability is caused by the failure of the parameter statuscheckpppoeuser to correctly filter special characters, commands, etc. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-2292 | CVE-2024-22529 | TOTOLINK of x2000r Command injection vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK X2000R_V2 V2.0.0-B20230727.10434 has a command injection vulnerability in the sub_449040 (handle function of formUploadFile) of /bin/boa. TOTOLINK of x2000r Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK X2000R is a WiFi 6 router launched by China Jiong Electronics. It supports Easy Mesh function and provides Gigabit network connection and VPN service. The vulnerability is caused by the failure of sub_449040 in /bin/boa to properly filter special characters and commands in the construction command. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202401-1949 | CVE-2024-22651 | D-Link Systems, Inc. of DIR-815 Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
There is a command injection vulnerability in the ssdpcgi_main function of cgibin binary in D-Link DIR-815 router firmware v1.04. D-Link Systems, Inc. of DIR-815 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-2645 | CVE-2024-22663 | TOTOLINK A3700R Command Injection Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK_A3700R_V9.1.2u.6165_20211012has a command Injection vulnerability via setOpModeCfg. TOTOLINK A3700R is a wireless router from China's TOTOLINK Electronics.
TOTOLINK A3700R has a command injection vulnerability, which is caused by the setOpModeCfg method failing to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202401-2676 | CVE-2024-22662 | TOTOLINK A3700R setParentalRules method buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3700R_V9.1.2u.6165_20211012 has a stack overflow vulnerability via setParentalRules. TOTOLINK A3700R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the setParentalRules method failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202401-2354 | CVE-2024-22660 | TOTOLINK A3700R setLanguageCfg method buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK_A3700R_V9.1.2u.6165_20211012has a stack overflow vulnerability via setLanguageCfg. TOTOLINK A3700R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the setLanguageCfg method failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202401-1097 | CVE-2022-45790 | Vulnerability related to improper restriction of excessive authentication attempts in multiple OMRON Corporation products |
CVSS V2: - CVSS V3: 9.1 Severity: CRITICAL |
The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic. cj1g-cpu45p firmware, cj1g-cpu45p-gtc firmware, cj1g-cpu44p Multiple OMRON Corporation products, including firmware, contain a vulnerability related to improper restriction of excessive authentication attempts.Information may be obtained and information may be tampered with
VAR-202401-0919 | CVE-2024-0769 | D-Link Systems, Inc. of DIR-859 Path traversal vulnerability in firmware |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. D-Link Systems, Inc. of DIR-859 A path traversal vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-2107 | CVE-2023-42429 | Vulnerabilities in multiple Intel products |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Improper buffer restrictions in some Intel NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access. Intel NUC 7 ESSENTIAl PC NUC7CJYSAL firmware, nuc 7 essential nuc7cjysamn firmware, nuc kit nuc7cjyhn Multiple Intel products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-2112 | CVE-2023-38587 | Input validation vulnerability in multiple Intel products |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Improper input validation in some Intel NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access. nuc 8 home nuc8i3behfa firmware, nuc 8 home nuc8i5behfa firmware, nuc 8 home nuc8i5bekpa Multiple Intel products such as firmware contain vulnerabilities related to input validation.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-2104 | CVE-2023-28738 | Input validation vulnerability in multiple Intel products |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Improper input validation for some Intel NUC BIOS firmware before version JY0070 may allow a privileged user to potentially enable escalation of privilege via local access. nuc 7 essential nuc7cjysamn firmware, nuc kit nuc7cjyhn firmware, nuc kit nuc7pjyhn Multiple Intel products such as firmware contain vulnerabilities related to input validation.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-0959 | CVE-2024-0717 | plural D-Link Systems, Inc. Product vulnerabilities |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 up to 20240112. This vulnerability affects unknown code of the file /devinfo of the component HTTP GET Request Handler. The manipulation of the argument area with the input notice|net|version leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-251542 is the identifier assigned to this vulnerability. dir-825acg1 firmware, DIR-841 firmware, dir-1260 firmware etc. D-Link Systems, Inc. There are unspecified vulnerabilities in the product.Information may be obtained
VAR-202401-1633 | CVE-2023-5131 | Delta Electronics, INC. of ISPSoft Out-of-bounds write vulnerability in |
CVSS V2: 7.3 CVSS V3: 8.2 Severity: HIGH |
A heap buffer-overflow exists in Delta Electronics ISPSoft. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DVP file to achieve code execution. of ISPSoft Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202312-0164 | CVE-2023-6340 | SonicWALL of capture client and NetExtender Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 5.5 Severity: MEDIUM |
SonicWall Capture Client version 3.7.10, NetExtender client version 10.2.337 and earlier versions are installed with sfpmonitor.sys driver. The driver has been found to be vulnerable to Denial-of-Service (DoS) caused by Stack-based Buffer Overflow vulnerability. SonicWALL of capture client and NetExtender Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202401-1629 | CVE-2023-6549 | of Citrix Systems netscaler application delivery controller and netscaler gateway Buffer error vulnerability in |
CVSS V2: 8.5 CVSS V3: 8.2 Severity: HIGH |
Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service and Out-Of-Bounds Memory Read
. of Citrix Systems netscaler application delivery controller and netscaler gateway Exists in a buffer error vulnerability.Service operation interruption (DoS) It may be in a state. NetScaler Gateway is an access gateway with an SSL VPN solution that provides single sign-on and authentication for remote end users of network assets. NetScaler ADC is an application delivery controller. Both are products of Citrix.
Citrix NetScaler ADC and Gateway have a denial of service vulnerability. The vulnerability is due to not restricting memory operations within the boundary range. Attackers can exploit this vulnerability to launch a denial of service vulnerability
VAR-202401-2573 | CVE-2023-6548 | Citrix NetScaler ADC and NetScaler Gateway have code injection vulnerabilities |
CVSS V2: 10.0 CVSS V3: 5.5 Severity: MEDIUM |
Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface. NetScaler ADC is an application delivery controller. NetScaler Gateway is an access gateway with an SSL VPN solution that provides single sign-on and authentication for remote end users of network assets. Both are products of Citrix
VAR-202401-1785 | CVE-2023-49515 | TP-LINK Technologies of tapo c200 firmware and tapo tc70 Firmware vulnerabilities |
CVSS V2: - CVSS V3: 4.6 Severity: MEDIUM |
Insecure Permissiosn vulnerability in TP Link TC70 and C200 WIFI Camera v.3 firmware v.1.3.4 and fixed in v.1.3.11 allows a physically proximate attacker to obtain sensitive information via a connection to the UART pin components. TP-LINK Technologies of tapo c200 firmware and tapo tc70 There are unspecified vulnerabilities in the firmware.Information may be obtained