VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202405-1802 CVE-2024-5195 ARRIS Group  of  ARRIS VAP2500  Command injection vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: Medium
A vulnerability was found in Arris VAP2500 08.50. It has been rated as critical. Affected by this issue is some unknown functionality of the file /diag_s.php. The manipulation of the argument customer_info leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265832. ARRIS Group of ARRIS VAP2500 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202405-1809 CVE-2024-5194 CVSS V2: 5.8
CVSS V3: 4.7
Severity: Medium
A vulnerability was found in Arris VAP2500 08.50. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /assoc_table.php. The manipulation of the argument id leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265831.
VAR-202405-3772 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. EG2000CE has a command execution vulnerability (CNVD-2024-22811) CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
EG2000CE is an intelligent router. EG2000CE of Beijing Xingwang Ruijie Network Technology Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to obtain server permissions.
VAR-202405-2111 CVE-2024-35580 Shenzhen Tenda Technology Co.,Ltd.  of  ax1806  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function formSetIptv. Shenzhen Tenda Technology Co.,Ltd. of ax1806 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AX1806 is a home wireless router device. Attackers can exploit this vulnerability to crash the application or execute arbitrary code in the application context
VAR-202405-3273 CVE-2024-35579 Shenzhen Tenda Technology Co.,Ltd.  of  ax1806  Stack-based buffer overflow vulnerability in firmware CVSS V2: 7.3
CVSS V3: 7.7
Severity: HIGH
Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the function formSetIptv. Shenzhen Tenda Technology Co.,Ltd. of ax1806 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AX1806 is a home wireless router device. No detailed vulnerability details are currently provided
VAR-202405-3825 CVE-2024-35578 Shenzhen Tenda Technology Co.,Ltd.  of  ax1806  Stack-based buffer overflow vulnerability in firmware CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formSetIptv. Shenzhen Tenda Technology Co.,Ltd. of ax1806 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AX1806 is a home wireless router device. Attackers can exploit this vulnerability to execute arbitrary code
VAR-202405-3649 CVE-2024-35576 Shenzhen Tenda Technology Co.,Ltd.  of  ax1806  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.7
CVSS V3: 5.2
Severity: MEDIUM
Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function formSetIptv. Shenzhen Tenda Technology Co.,Ltd. of ax1806 A stack-based buffer overflow vulnerability exists in the firmware.Information may be obtained and information may be tampered with. Tenda AX1806 is a home wireless router device. No detailed vulnerability details are currently provided
VAR-202405-3088 CVE-2024-35571 Shenzhen Tenda Technology Co.,Ltd.  of  ax1806  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function formSetIptv. Shenzhen Tenda Technology Co.,Ltd. of ax1806 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AX1806 is a home wireless router device. Attackers can exploit this vulnerability to execute arbitrary code
VAR-202405-2040 No CVE H3C ER5100G2 system management has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
ER5100G2 is a new generation enterprise-class Gigabit wired router. H3C ER5100G2 system management has a command execution vulnerability, which can be exploited by attackers to obtain server permissions.
VAR-202405-2251 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. EG3210 has a command execution vulnerability (CNVD-2024-23199) CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
EG3210 is a multi-service security gateway. Beijing Xingwang Ruijie Network Technology Co., Ltd. EG3210 has a command execution vulnerability, which can be exploited by attackers to gain control of the server.
VAR-202405-3031 No CVE Shenzhen Tongwei Digital Technology Co., Ltd. InVid Tech has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shenzhen Tongwei Digital Technology Co., Ltd. is an international provider of video security products and system solutions integrating R&D, production, sales and services. Shenzhen Tongwei Digital Technology Co., Ltd. InVid Tech has a weak password vulnerability, which attackers use to log in to the system backend and obtain sensitive information.
VAR-202405-3659 CVE-2024-35190 Sangoma  of  Asterisk  Vulnerability related to improper implementation of authentication algorithms in CVSS V2: -
CVSS V3: 5.8
Severity: MEDIUM
Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1. Sangoma of Asterisk contains vulnerabilities related to improper implementation of authentication algorithms, vulnerabilities related to the use of operators, and vulnerabilities related to improper implementation of control flow.Information may be obtained
VAR-202405-3505 CVE-2024-22429 Vulnerabilities in multiple Dell products CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to arbitrary code execution. Dell Edge Gateway 5000 firmware, precision 5820 tower firmware, Dell Edge Gateway 3000 Unspecified vulnerabilities exist in multiple Dell products, including firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202405-2830 No CVE Beijing Asia Control Technology Development Co., Ltd. Asia Control Giant SCADA Monitoring Platform has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Yakong Giant SCADA Monitoring Platform is a high-end industrial automation full-configuration monitoring software suitable for "all-trusted" industrial control systems. It supports the joint use of all mainstream trusted CPUs, operating systems, PLC devices, and databases. The Yakong Giant SCADA Monitoring Platform of Beijing Yakong Technology Development Co., Ltd. has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202405-3782 CVE-2024-4609 Rockwell Automation FactoryTalk View SE SQL Injection Vulnerability CVSS V2: 8.0
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability exists in the Rockwell Automation FactoryTalk® View SE Datalog function that could allow a threat actor to inject a malicious SQL statement if the SQL database has no authentication in place or if legitimate credentials were stolen. If exploited, the attack could result in information exposure, revealing sensitive information. Additionally, a threat actor could potentially modify and delete the data in a remote database. An attack would only affect the HMI design time, not runtime. Rockwell Automation FactoryTalk View SE is an industrial automation system view interface from Rockwell Automation of the United States
VAR-202405-0251 CVE-2024-4965 D-Link Systems, Inc.  of  dar-7000  in the firmware  OS  Command injection vulnerability CVSS V2: 6.5
CVSS V3: 6.3
Severity: Medium
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000-40 V31R02B1413C and classified as critical. This issue affects some unknown processing of the file /useratte/resmanage.php. The manipulation of the argument load leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264533 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. D-Link Systems, Inc. of dar-7000 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. DAR-7000-40 is a network device suitable for government, finance, insurance, hotel, small and medium-sized enterprises, education and other fields. It provides professional traffic management capabilities, powerful content auditing, advanced Internet behavior management and efficient firewall and other practical functions. It can provide users with a visual network management experience by identifying and managing the network data flow application layer. Attackers can exploit this vulnerability to cause operating system command injection
VAR-202405-0253 CVE-2024-4964 D-Link Systems, Inc.  of  dar-7000  Unrestricted Upload of Dangerous File Types Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Medium
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in D-Link DAR-7000-40 V31R02B1413C and classified as critical. This vulnerability affects unknown code of the file /firewall/urlblist.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264532. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. D-Link Systems, Inc. of dar-7000 Firmware has an unrestricted upload of dangerous file types vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202405-0249 CVE-2024-4963 D-Link Systems, Inc.  of  dar-7000  Unrestricted Upload of Dangerous File Types Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Medium
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DAR-7000-40 V31R02B1413C. This affects an unknown part of the file /url/url.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264531. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. D-Link Systems, Inc. of dar-7000 Firmware has an unrestricted upload of dangerous file types vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202405-0250 CVE-2024-4962 D-Link Systems, Inc.  of  dar-7000  Unrestricted Upload of Dangerous File Types Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Medium
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DAR-7000-40 V31R02B1413C. Affected by this issue is some unknown functionality of the file /useratte/resmanage.php. The manipulation of the argument file leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-264530 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. D-Link Systems, Inc. of dar-7000 Firmware has an unrestricted upload of dangerous file types vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202405-0248 CVE-2024-4961 D-Link Systems, Inc.  of  dar-7000  Unrestricted Upload of Dangerous File Types Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Medium
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in D-Link DAR-7000-40 V31R02B1413C. Affected by this vulnerability is an unknown functionality of the file /user/onlineuser.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264529 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. D-Link Systems, Inc. of dar-7000 Firmware has an unrestricted upload of dangerous file types vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state