VARIoT IoT vulnerabilities database
| VAR-202406-2715 | CVE-2023-37539 | HCL Technologies Limited of Domino server Cross-site scripting vulnerability in |
CVSS V2: - CVSS V3: 5.4 Severity: MEDIUM |
The Domino Catalog template is susceptible to a Stored Cross-Site Scripting (XSS) vulnerability. An attacker with the ability to edit documents in the catalog application/database created from this template can embed a cross site scripting attack. The attack would be activated by an end user clicking it. HCL Technologies Limited of Domino server Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
| VAR-202406-2615 | CVE-2024-36795 | of netgear WNR614 Path traversal vulnerability in firmware |
CVSS V2: 2.1 CVSS V3: 4.0 Severity: MEDIUM |
Insecure permissions in Netgear WNR614 JNR1010V2/N300-V1.1.0.54_1.0.1 allows attackers to access URLs and directories embedded within the firmware via unspecified vectors. of netgear WNR614 A path traversal vulnerability exists in firmware.Information may be tampered with. NETGEAR WNR614 is an N300 wireless router with an external antenna from NETGEAR Inc. Attackers can exploit this vulnerability to cause information leakage
| VAR-202406-0123 | CVE-2024-36359 | Trend Micro InterScan Web Security Virtual Appliance Cross-Site Scripting Privilege Escalation Vulnerability |
CVSS V2: 5.5 CVSS V3: 5.4 Severity: MEDIUM |
A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 could allow an attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Authentication is required to exploit this vulnerability.The specific flaw exists within the HTTP Inspection component. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user
| VAR-202406-0101 | CVE-2024-32849 | Trend Micro Maximum Security coreServiceShell Link Following Local Privilege Escalation Vulnerability |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Trend Micro Security 17.x (Consumer) is vulnerable to a Privilege Escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the coreServiceShell. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM
| VAR-202406-0045 | CVE-2024-5597 | Fuji Electric's Monitouch V-SFT Vulnerability regarding mix-ups in |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Fuji Electric Monitouch V-SFT is vulnerable to a type confusion, which could cause a crash or code execution. Fuji Electric's Monitouch V-SFT contains a type confusion vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of V9 files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Fuji Electric Monitouch V-SFT is a human-machine interface software from Fuji Electric
| VAR-202406-2008 | CVE-2024-36782 | TOTOLINK of CP300 Vulnerability related to use of hardcoded credentials in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK CP300 V2.0.4-B20201102 was discovered to contain a hardcoded password vulnerability in /etc/shadow.sample, which allows attackers to log in as root. TOTOLINK of CP300 A vulnerability exists in the firmware regarding the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK is a mid-to-high-end wireless router brand in the Asia-Pacific region
| VAR-202406-1058 | CVE-2024-36783 | TOTOLINK of lr350 Command injection vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK LR350 V9.3.5u.6369_B20220309 was discovered to contain a command injection via the host_time parameter in the NTPSyncWithHost function. TOTOLINK of lr350 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK LR350 is a wireless router from China's TOTOLINK Electronics. No detailed vulnerability details are currently available
| VAR-202406-2211 | CVE-2024-36729 | TRENDnet of TEW-827DRU Stack-based buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 6.3 Severity: MEDIUM |
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action wizard_ipv6 with a sufficiently long reboot_type key. TRENDnet of TEW-827DRU A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202406-1252 | CVE-2024-36728 | TRENDnet of TEW-827DRU Stack-based buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 8.1 Severity: HIGH |
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action vlan_setting with a sufficiently long dns1 or dns 2 key
| VAR-202406-2711 | CVE-2023-43555 | Out-of-bounds read vulnerability in multiple Qualcomm products |
CVSS V2: - CVSS V3: 8.2 Severity: HIGH |
Information disclosure in Video while parsing mp2 clip with invalid section length. AQT1000 firmware, fastconnect 6200 firmware, fastconnect 6700 Multiple Qualcomm products, such as firmware, contain an out-of-bounds read vulnerability.Information may be obtained
| VAR-202406-2297 | CVE-2023-43551 | Authentication vulnerabilities in multiple Qualcomm products |
CVSS V2: - CVSS V3: 9.1 Severity: CRITICAL |
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command. 315 5g iot modem firmware, 9205 lte modem firmware, 9206 lte modem Multiple Qualcomm products, such as firmware, contain vulnerabilities related to authentication.Information may be tampered with
| VAR-202406-2081 | CVE-2024-20070 | Vulnerabilities in the use of encryption algorithms in multiple MediaTek products |
CVSS V2: - CVSS V3: 5.1 Severity: MEDIUM |
In modem, there is a possible information disclosure due to using risky cryptographic algorithm during connection establishment negotiation. This could lead to remote information disclosure, when weak encryption algorithm is used, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00942482; Issue ID: MSV-1469. media tech's NR15 , nr16 , NR17 Exists in the use of cryptographic algorithms.Information is obtained and service operation is interrupted (DoS) It may be in a state
| VAR-202406-1703 | CVE-2024-20069 | media tech's NR15 Vulnerability in |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In modem, there is a possible selection of less-secure algorithm during the VoWiFi IKE due to a missing DH downgrade check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01286330; Issue ID: MSV-1430. media tech's NR15 Exists in unspecified vulnerabilities.Information may be obtained
| VAR-202406-2694 | CVE-2024-20068 | media tech's nr16 and NR17 Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 5.9 Severity: MEDIUM |
In modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is no needed for exploitation. Patch ID: MOLY01270721; Issue ID: MSV-1479. media tech's nr16 and NR17 Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202406-2276 | CVE-2024-20067 | media tech's nr16 and NR17 Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
In modem, there is a possible out of bounds write due to improper input invalidation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01267285; Issue ID: MSV-1462. media tech's nr16 and NR17 Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202406-1535 | CVE-2024-20066 | media tech's nr16 and NR17 Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
In modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is no needed for exploitation. Patch ID: MOLY01267281; Issue ID: MSV-1477. media tech's nr16 and NR17 Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202406-1374 | No CVE | Raisecom iSDC of Raisecom Technology Development Co., Ltd. has a command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Raisecom Technology Development Co., Ltd. is a provider of optical network products and system solutions.
Raisecom iSDC of Raisecom Technology Development Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to obtain server permissions.
| VAR-202405-1938 | CVE-2024-5271 | Fuji Electric's Monitouch V-SFT Vulnerability regarding mix-ups in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: High |
Fuji Electric Monitouch V-SFT is vulnerable to an out-of-bounds write because of a
type confusion, which could result in arbitrary code execution. Fuji Electric's Monitouch V-SFT contains a type confusion vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of V9C files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Fuji Electric Monitouch V-SFT is a screen configuration software from Fuji Electric of Japan
| VAR-202405-1939 | CVE-2024-34171 | Fuji Electric Monitouch V-SFT V9C File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: 10.0 CVSS V3: 7.8 Severity: HIGH |
Fuji Electric Monitouch V-SFT
is vulnerable to a stack-based buffer overflow, which could allow an attacker to execute arbitrary code. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of V9C files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Fuji Electric Monitouch V-SFT is human-machine interface (HMI) configuration software developed by Fuji Electric Co., Ltd., primarily used in industrial automation. It provides functions such as touchscreen interface design, PDF document viewing, video playback, and alarm messaging
| VAR-202405-3465 | CVE-2024-35403 | TOTOLINK of CP900L Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 3.3 CVSS V3: 2.7 Severity: LOW |
TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a stack overflow via the desc parameter in the function setIpPortFilterRules. TOTOLINK of CP900L A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. TOTOLINK CP900L is a wireless router from China's TOTOLINK Electronics. The vulnerability is caused by the desc parameter of the setIpPortFilterRules function failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to cause a denial of service