VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202401-1132 CVE-2024-0924 Shenzhen Tenda Technology Co.,Ltd.  of  ac10u  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability, which was classified as critical, was found in Tenda AC10U 15.03.06.49_multi_TDE01. This affects the function formSetPPTPServer. The manipulation of the argument startIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252129 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of ac10u A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the startIp parameter of the formSetPPTPServer function failing to correctly verify the length of the input data. An attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202401-1133 CVE-2024-0923 Tenda  of  AC10U  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability, which was classified as critical, has been found in Tenda AC10U 15.03.06.49_multi_TDE01. Affected by this issue is the function formSetDeviceName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252128. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10U is a wireless router made by the Chinese company Tenda
VAR-202401-1144 CVE-2024-0922 Tenda  of  AC10U  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability classified as critical was found in Tenda AC10U 15.03.06.49_multi_TDE01. Affected by this vulnerability is the function formQuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252127. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10U is a wireless router made by the Chinese company Tenda. A remote attacker could exploit this vulnerability to overflow a buffer and execute arbitrary code on the system
VAR-202401-1079 CVE-2024-0921 D-Link Systems, Inc.  of  DIR-816 A2  in the firmware  OS  Command injection vulnerability CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/setDeviceSettings of the component Web Interface. The manipulation of the argument statuscheckpppoeuser leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252139. D-Link Systems, Inc. of DIR-816 A2 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-816 A2 is a wireless router made by China D-Link Company. This vulnerability is caused by the failure of the parameter statuscheckpppoeuser to correctly filter special characters, commands, etc. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-2292 CVE-2024-22529 TOTOLINK  of  x2000r  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK X2000R_V2 V2.0.0-B20230727.10434 has a command injection vulnerability in the sub_449040 (handle function of formUploadFile) of /bin/boa. TOTOLINK of x2000r Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK X2000R is a WiFi 6 router launched by China Jiong Electronics. It supports Easy Mesh function and provides Gigabit network connection and VPN service. The vulnerability is caused by the failure of sub_449040 in /bin/boa to properly filter special characters and commands in the construction command. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202401-1949 CVE-2024-22651 D-Link Systems, Inc.  of  DIR-815  Command injection vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
There is a command injection vulnerability in the ssdpcgi_main function of cgibin binary in D-Link DIR-815 router firmware v1.04. D-Link Systems, Inc. of DIR-815 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-2645 CVE-2024-22663 TOTOLINK A3700R Command Injection Vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK_A3700R_V9.1.2u.6165_20211012has a command Injection vulnerability via setOpModeCfg. TOTOLINK A3700R is a wireless router from China's TOTOLINK Electronics. TOTOLINK A3700R has a command injection vulnerability, which is caused by the setOpModeCfg method failing to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202401-2676 CVE-2024-22662 TOTOLINK A3700R setParentalRules method buffer overflow vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A3700R_V9.1.2u.6165_20211012 has a stack overflow vulnerability via setParentalRules. TOTOLINK A3700R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the setParentalRules method failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202401-2354 CVE-2024-22660 TOTOLINK A3700R setLanguageCfg method buffer overflow vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK_A3700R_V9.1.2u.6165_20211012has a stack overflow vulnerability via setLanguageCfg. TOTOLINK A3700R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the setLanguageCfg method failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202401-1097 CVE-2022-45790 Vulnerability related to improper restriction of excessive authentication attempts in multiple OMRON Corporation products CVSS V2: -
CVSS V3: 9.1
Severity: CRITICAL
The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic. cj1g-cpu45p firmware, cj1g-cpu45p-gtc firmware, cj1g-cpu44p Multiple OMRON Corporation products, including firmware, contain a vulnerability related to improper restriction of excessive authentication attempts.Information may be obtained and information may be tampered with
VAR-202401-0919 CVE-2024-0769 D-Link Systems, Inc.  of  DIR-859  Path traversal vulnerability in firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. D-Link Systems, Inc. of DIR-859 A path traversal vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-2107 CVE-2023-42429 Vulnerabilities in multiple Intel products CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Improper buffer restrictions in some Intel NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access. Intel NUC 7 ESSENTIAl PC NUC7CJYSAL firmware, nuc 7 essential nuc7cjysamn firmware, nuc kit nuc7cjyhn Multiple Intel products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-2112 CVE-2023-38587 Input validation vulnerability in multiple Intel products CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Improper input validation in some Intel NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access. nuc 8 home nuc8i3behfa firmware, nuc 8 home nuc8i5behfa firmware, nuc 8 home nuc8i5bekpa Multiple Intel products such as firmware contain vulnerabilities related to input validation.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-2104 CVE-2023-28738 Input validation vulnerability in multiple Intel products CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Improper input validation for some Intel NUC BIOS firmware before version JY0070 may allow a privileged user to potentially enable escalation of privilege via local access. nuc 7 essential nuc7cjysamn firmware, nuc kit nuc7cjyhn firmware, nuc kit nuc7pjyhn Multiple Intel products such as firmware contain vulnerabilities related to input validation.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-0959 CVE-2024-0717 plural  D-Link Systems, Inc.  Product vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 up to 20240112. This vulnerability affects unknown code of the file /devinfo of the component HTTP GET Request Handler. The manipulation of the argument area with the input notice|net|version leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-251542 is the identifier assigned to this vulnerability. dir-825acg1 firmware, DIR-841 firmware, dir-1260 firmware etc. D-Link Systems, Inc. There are unspecified vulnerabilities in the product.Information may be obtained
VAR-202401-1633 CVE-2023-5131 Delta Electronics, INC.  of  ISPSoft  Out-of-bounds write vulnerability in CVSS V2: 7.3
CVSS V3: 8.2
Severity: HIGH
A heap buffer-overflow exists in Delta Electronics ISPSoft. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DVP file to achieve code execution. of ISPSoft Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202312-0164 CVE-2023-6340 SonicWALL  of  capture client  and  NetExtender  Out-of-bounds write vulnerability in CVSS V2: -
CVSS V3: 5.5
Severity: MEDIUM
SonicWall Capture Client version 3.7.10, NetExtender client version 10.2.337 and earlier versions are installed with sfpmonitor.sys driver. The driver has been found to be vulnerable to Denial-of-Service (DoS) caused by Stack-based Buffer Overflow vulnerability. SonicWALL of capture client and NetExtender Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202401-1629 CVE-2023-6549 of Citrix Systems  netscaler application delivery controller  and  netscaler gateway  Buffer error vulnerability in CVSS V2: 8.5
CVSS V3: 8.2
Severity: HIGH
Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service and Out-Of-Bounds Memory Read . of Citrix Systems netscaler application delivery controller and netscaler gateway Exists in a buffer error vulnerability.Service operation interruption (DoS) It may be in a state. NetScaler Gateway is an access gateway with an SSL VPN solution that provides single sign-on and authentication for remote end users of network assets. NetScaler ADC is an application delivery controller. Both are products of Citrix. Citrix NetScaler ADC and Gateway have a denial of service vulnerability. The vulnerability is due to not restricting memory operations within the boundary range. Attackers can exploit this vulnerability to launch a denial of service vulnerability
VAR-202401-2573 CVE-2023-6548 Citrix NetScaler ADC and NetScaler Gateway have code injection vulnerabilities CVSS V2: 10.0
CVSS V3: 5.5
Severity: MEDIUM
Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface. NetScaler ADC is an application delivery controller. NetScaler Gateway is an access gateway with an SSL VPN solution that provides single sign-on and authentication for remote end users of network assets. Both are products of Citrix
VAR-202401-1785 CVE-2023-49515 TP-LINK Technologies  of  tapo c200  firmware and  tapo tc70  Firmware vulnerabilities CVSS V2: -
CVSS V3: 4.6
Severity: MEDIUM
Insecure Permissiosn vulnerability in TP Link TC70 and C200 WIFI Camera v.3 firmware v.1.3.4 and fixed in v.1.3.11 allows a physically proximate attacker to obtain sensitive information via a connection to the UART pin components. TP-LINK Technologies of tapo c200 firmware and tapo tc70 There are unspecified vulnerabilities in the firmware.Information may be obtained