VARIoT IoT vulnerabilities database

VAR-202311-2106 | CVE-2023-48804 | TOTOLINK X6000R enable parameter command execution vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function when passed to the CsteSystem function creates a command execution vulnerability. TOTOLINK X6000R is a wireless router made by China Zeon Electronics (TOTOLINK) Company.
TOTOLINK X6000R V9.4.0cu.852_B20230719 version has a command execution vulnerability. The vulnerability is caused by the enable parameter of the sub_4119A0 function failing to correctly filter special characters, commands, etc. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202311-2232 | CVE-2023-48808 | TOTOLINK X6000R stun_user parameter command execution vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function when passed to the CsteSystem function creates a command execution vulnerability. TOTOLINK X6000R is a wireless router launched by China Jiong Electronics. It supports WiFi 6 technology and has high concurrent connection and dual-band transmission functions.
TOTOLINK X6000R has a command execution vulnerability. The vulnerability is caused by the stun_user parameter of the sub_4119A0 function failing to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202311-2153 | CVE-2023-48807 | TOTOLINK X6000R user parameter command execution vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function when passed to the CsteSystem function creates a command execution vulnerability. TOTOLINK X6000R is a wireless router made by China Zeon Electronics (TOTOLINK) Company.
TOTOLINK X6000R V9.4.0cu.852_B20230719 version has a command execution vulnerability. The vulnerability is caused by the failure of the user parameter of the sub_4119A0 function to correctly filter special characters, commands, etc. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202311-2161 | CVE-2023-5274 | Mitsubishi Electric's GX Works2 Input verification vulnerability in |
CVSS V2: 1.0 CVSS V3: 4.7 Severity: MEDIUM |
Improper Input Validation vulnerability in simulation function of GX Works2 allows an attacker to cause a denial-of-service (DoS) condition on the function by sending specially crafted packets. However, the attacker would need to send the packets from within the same personal computer where the function is running. Mitsubishi Electric's GX Works2 There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state. Mitsubishi Electric GX Works2 is a programmable controller of Mitsubishi Electric Corporation of Japan
VAR-202311-2207 | CVE-2023-48810 | TOTOLINK X6000R requestUser parameter command execution vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function when passed to the CsteSystem function creates a command execution vulnerability. TOTOLINK X6000R is a wireless router launched by China Jiong Electronics. It supports WiFi 6 technology and has high concurrent connection and dual-band transmission functions.
TOTOLINK X6000R has a command execution vulnerability. The vulnerability is caused by the requestUser parameter of the sub_4119A0 function failing to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202311-2272 | CVE-2023-48803 | TOTOLINK of x6000r in the firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function when passed to the CsteSystem function creates a command execution vulnerability. TOTOLINK of x6000r The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK X6000R is a wireless router launched by China Jiong Electronics. It supports WiFi 6 technology and has high concurrent connection and dual-band transmission functions.
TOTOLINK X6000R has a command execution vulnerability. The vulnerability is caused by the pass parameter of the sub_4119A0 function failing to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202311-2162 | CVE-2023-5275 | Mitsubishi Electric's GX Works2 Input verification vulnerability in |
CVSS V2: 1.0 CVSS V3: 4.7 Severity: MEDIUM |
Improper Input Validation vulnerability in simulation function of GX Works2 allows an attacker to cause a denial-of-service (DoS) condition on the function by sending specially crafted packets. However, the attacker would need to send the packets from within the same personal computer where the function is running. Mitsubishi Electric's GX Works2 There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state. Mitsubishi Electric GX Works2 is a programmable controller from Mitsubishi Electric of Japan
VAR-202311-2300 | CVE-2023-48963 | Shenzhen Tenda Technology Co.,Ltd. of i6 Out-of-bounds write vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda i6 V1.0.0.8(3856) is vulnerable to Buffer Overflow via /goform/wifiSSIDget. Shenzhen Tenda Technology Co.,Ltd. of i6 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. Tenda i6 is a wireless access point from the Chinese company Tenda. The vulnerability is caused by a boundary error in the component /goform/wifiSSIDget when processing untrusted input. A remote attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202311-2271 | CVE-2023-48806 | TOTOLINK X6000R informEnable parameter command execution vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function when passed to the CsteSystem function creates a command execution vulnerability. TOTOLINK X6000R is a wireless router made by China Zeon Electronics (TOTOLINK) Company.
TOTOLINK X6000R V9.4.0cu.852_B20230719 version has a command execution vulnerability. The vulnerability is caused by the informEnable parameter of the sub_4119A0 function failing to correctly filter special characters, commands, etc. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202311-2358 | CVE-2023-45484 | Tenda AC10 fromSetWifiGuestBasic function buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the shareSpeed parameter in the function fromSetWifiGuestBasic. Tenda AC10 is a wireless router made by China Tenda Company.
Tenda AC10 has a buffer overflow vulnerability. This vulnerability is caused by the failure of the shareSpeed parameter of the fromSetWifiGuestBasic function to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202311-2305 | CVE-2023-45483 | Tenda AC10 compare_parentcontrol_time function buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the time parameter in the function compare_parentcontrol_time. Tenda AC10 is a wireless router made by China Tenda Company. This vulnerability is caused by the time parameter of the compare_parentcontrol_time function failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause Denial of service attack
VAR-202311-2319 | CVE-2023-45482 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the urls parameter in the function get_parentControl_list_Info.
VAR-202311-2507 | CVE-2023-45481 | Tenda AC10 SetFirewallCfg function buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the firewallEn parameter in the function SetFirewallCfg. Tenda AC10 is a wireless router made by China Tenda Company.
Tenda AC10 has a buffer overflow vulnerability. This vulnerability is caused by the failure of the firewallEn parameter of the SetFirewallCfg function to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202311-2381 | CVE-2023-45480 | Tenda AC10 sub_47D878 function buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the src parameter in the function sub_47D878. Tenda AC10 is a wireless router made by China Tenda Company.
Tenda AC10 has a buffer overflow vulnerability. This vulnerability is caused by the failure of the src parameter of the sub_47D878 function to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202311-2440 | CVE-2023-45479 | Tenda AC10 sub_49E098 function buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the list parameter in the function sub_49E098. Tenda AC10 is a wireless router made by China Tenda Company. The vulnerability is caused by the list parameter of the sub_49E098 function failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause Denial of service attack
VAR-202311-2124 | CVE-2023-49694 | of netgear ProSAFE Network Management System Vulnerability in |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A low-privileged OS user with access to a Windows host where NETGEAR ProSAFE Network Management System is installed can create arbitrary JSP files in a Tomcat web application directory. The user can then execute the JSP files under the security context of SYSTEM. of netgear ProSAFE Network Management System Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR is a router made by the American company NETGEAR. A hardware device that connects two or more networks and acts as a gateway between the networks.
There is an access control error vulnerability in versions before NETGEAR ProSAFE Network Management System v1.7.0.26. A remote attacker could exploit this vulnerability to escalate privileges
VAR-202311-2434 | CVE-2023-49044 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Stack Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the ssid parameter in the function form_fast_setting_wifi_set.
VAR-202311-2374 | CVE-2023-49047 |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Tenda AX1803 v1.0.0.1 contains a stack overflow via the devName parameter in the function formSetDeviceName.
VAR-202311-2486 | CVE-2023-49042 | Tenda AX1803 setSchedWifi function buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Heap Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the schedStartTime parameter or the schedEndTime parameter in the function setSchedWifi. Tenda AX1803 is a dual-band Gigabit WIFI6 router from China's Tenda Company.
Tenda AX1803 v1.0.0.1 version has a buffer overflow vulnerability, which is caused by a boundary error when the application handles untrusted input
VAR-202311-2333 | CVE-2023-49040 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
An issue in Tneda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the adslPwd parameter in the form_fast_setting_internet_set function.