VARIoT IoT vulnerabilities database
| VAR-202405-4042 | CVE-2024-33772 | D-Link Systems, Inc. of DIR-619L Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 5.5 CVSS V3: 5.7 Severity: MEDIUM |
A buffer overflow vulnerability in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 via formTcpipSetup allows remote authenticated users to trigger a denial of service (DoS) through the parameter "curTime.". D-Link Systems, Inc. The D-Link DIR-619L is a wireless router designed for home and small office environments. It implements the IEEE 802.11n standard and offers a maximum transmission rate of 300Mbps. This vulnerability stems from the failure of the curTime parameter in formTcpipSetup to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202405-4078 | CVE-2024-33771 | D-Link Systems, Inc. of DIR-619L Classic buffer overflow vulnerability in firmware |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: MEDIUM |
A buffer overflow vulnerability in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 via goform/formWPS, allows remote authenticated users to trigger a denial of service (DoS) through the parameter "webpage.". D-Link Systems, Inc. of DIR-619L Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. The D-Link DIR-619L is a wireless router designed for home and small office environments. It implements the IEEE 802.11n standard and offers a maximum transmission rate of 300Mbps.
The D-Link DIR-619L suffers from a buffer overflow vulnerability. This vulnerability stems from the failure of the goform/formWPS parameter webpage to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202405-4091 | CVE-2024-33433 | TOTOLINK of x2000r Vulnerability regarding improper parameter handling in firmware |
CVSS V2: 4.1 CVSS V3: 4.8 Severity: MEDIUM |
Cross Site Scripting vulnerability in TOTOLINK X2000R before v1.0.0-B20231213.1013 allows a remote attacker to execute arbitrary code via the Guest Access Control parameter in the Wireless Page. TOTOLINK of x2000r The firmware contains a vulnerability related to improper parameter handling.Information may be obtained and information may be tampered with. The TOTOLINK X2000R is a WiFi 6 wireless router launched by TOTOLINK, a Chinese electronics company. It supports gigabit networks and EasyMesh functionality, and features multi-device connectivity and wireless extension capabilities.
The TOTOLINK X2000R contains a cross-site scripting (XSS) vulnerability. This vulnerability stems from the application's lack of effective filtering and escaping of user-provided data. Attackers can exploit this vulnerability to inject a carefully crafted payload to execute arbitrary web scripts or HTML
| VAR-202405-4010 | CVE-2024-31810 | TOTOLINK of EX200 Vulnerability related to use of hardcoded credentials in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a hardcoded password for root at /etc/shadow.sample. TOTOLINK of EX200 A vulnerability exists in the firmware regarding the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK EX200 is a 2.4G wireless N range extender from China's TOTOLINK Electronics. It is designed to expand the coverage of existing Wi-Fi networks and eliminate "blind spots". Attackers can use this vulnerability to log in as the root account
| VAR-202405-0646 | No CVE | Beijing Yakong Technology Development Co., Ltd. KingSuperSCADA operating system client has an information leakage vulnerability (CNVD-2024-18096) |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Beijing Yakong Technology Development Co., Ltd., referred to as "Yakong Technology", is a high-tech enterprise of industrial automation and information software platform established in 1997.
There is an information leakage vulnerability in the KingSuperSCADA operating system client of Beijing Yakong Technology Development Co., Ltd., which can be exploited by attackers to obtain sensitive information.
| VAR-202405-0904 | No CVE | Hangzhou Hikvision Digital Technology Co., Ltd. Hikvision Integrated Security Management Platform has a command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Hangzhou Hikvision Digital Technology Co., Ltd. is a technology company focusing on technological innovation.
Hangzhou Hikvision Digital Technology Co., Ltd. Hikvision Integrated Security Management Platform has a command execution vulnerability, which can be exploited by attackers to execute commands.
| VAR-202405-0739 | CVE-2023-46012 | Linksys of EA7500 Classic buffer overflow vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Buffer Overflow vulnerability LINKSYS EA7500 3.0.1.207964 allows a remote attacker to execute arbitrary code via an HTTP request to the IGD UPnP. Linksys of EA7500 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Linksys EA7500 is a wireless router from Linksys, Inc. of the United States. The vulnerability is caused by a boundary error when the application processes untrusted input
| VAR-202405-1484 | CVE-2024-20870 | Samsung's Galaxy Store Vulnerability in |
CVSS V2: - CVSS V3: 5.1 Severity: MEDIUM |
Improper verification of intent by broadcast receiver vulnerability in Galaxy Store prior to version 4.5.71.8 allows local attackers to write arbitrary files with the privilege of Galaxy Store. Samsung's Galaxy Store Exists in unspecified vulnerabilities.Information may be tampered with
| VAR-202405-0458 | CVE-2024-3661 |
CVSS V2: - CVSS V3: 7.6 Severity: HIGH |
DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
| VAR-202405-0806 | CVE-2024-33113 | D-Link Systems, Inc. of dir-845l Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
D-LINK DIR-845L <=v1.01KRb03 is vulnerable to Information disclosurey via bsc_sms_inbox.php. D-Link Systems, Inc. of dir-845l The firmware contains command injection and cross-site scripting vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202405-0699 | CVE-2024-33112 | D-Link Systems, Inc. of dir-845l in the firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 7.5 Severity: HIGH |
D-Link DIR-845L router v1.01KRb03 and before is vulnerable to Command injection via the hnap_main()func. D-Link Systems, Inc. D-Link DIR-845L is a wireless router from D-Link, a Chinese company.
D-Link DIR-845L has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands on the system by sending specially crafted requests
| VAR-202405-1111 | CVE-2024-33111 | D-Link Systems, Inc. of dir-845l Cross-site scripting vulnerability in firmware |
CVSS V2: 6.4 CVSS V3: 5.4 Severity: MEDIUM |
D-Link DIR-845L router <=v1.01KRb03 is vulnerable to Cross Site Scripting (XSS) via /htdocs/webinc/js/bsc_sms_inbox.php. D-Link Systems, Inc. of dir-845l Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. D-Link DIR-845L is a wireless router from D-Link, a Chinese company.
D-Link DIR-845L v1.01KRb03 and earlier versions have a cross-site scripting vulnerability, which can be exploited by attackers to execute scripts in the victim's web browser using specially crafted URLs
| VAR-202405-1258 | CVE-2024-33110 | D-Link Systems, Inc. of dir-845l Authentication vulnerability in firmware |
CVSS V2: 9.4 CVSS V3: 9.1 Severity: CRITICAL |
D-Link DIR-845L router v1.01KRb03 and before is vulnerable to Permission Bypass via the getcfg.php component. D-Link Systems, Inc. of dir-845l An authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. The D-Link DIR-845L is a wireless router from D-Link, a Chinese company.
D-Link DIR-845L versions v1.01KRb03 and earlier contain an authorization vulnerability. An attacker could exploit this vulnerability to cause unauthorized operations
| VAR-202405-1658 | CVE-2023-43528 | Out-of-bounds read vulnerability in multiple Qualcomm products |
CVSS V2: - CVSS V3: 6.1 Severity: MEDIUM |
Information disclosure when the ADSP payload size received in HLOS in response to Audio Stream Manager matrix session is less than this expected size. AR8035 firmware, c-v2x 9150 firmware, CSRB31024 Multiple Qualcomm products, such as firmware, contain an out-of-bounds read vulnerability.Information may be obtained
| VAR-202405-0029 | CVE-2024-4549 | Delta Electronics, INC. of DIAEnergie Resource exhaustion vulnerability in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A denial of service vulnerability exists in Delta Electronics DIAEnergie v1.10.1.8610 and prior. When processing an 'ICS Restart!' message, CEBC.exe restarts the system. Delta Electronics, INC. of DIAEnergie Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202405-0030 | CVE-2024-4548 | Delta Electronics, INC. of DIAEnergie In SQL Injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
An SQLi vulnerability exists in Delta Electronics DIAEnergie v1.10.1.8610 and prior when CEBC.exe processes a 'RecalculateHDMWYC' message, which is split into 4 fields using the '~' character as the separator. An unauthenticated remote attacker can perform SQLi via the fourth field. Delta Electronics, INC. of DIAEnergie for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Delta Electronics DIAEnergie is an industrial energy management system from Delta Electronics, a Taiwanese company, used to monitor and analyze energy consumption in real time, calculate energy consumption and load characteristics, optimize equipment performance, improve production processes, and maximize energy efficiency.
Delta Electronics DIAEnergie v1.10.1.8610 and earlier versions have a SQL injection vulnerability
| VAR-202405-0028 | CVE-2024-4547 | Delta Electronics, INC. of DIAEnergie In SQL Injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A SQLi vulnerability exists in Delta Electronics DIAEnergie v1.10.1.8610 and prior when CEBC.exe processes a 'RecalculateScript' message, which is splitted into 4 fields using the '~' character as the separator. An unauthenticated remote attacker can perform SQLi via the fourth field. Delta Electronics, INC. of DIAEnergie for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker can use this vulnerability to view, add, modify, or delete information in the backend database
| VAR-202405-1410 | CVE-2024-33788 | Linksys of E5600 Command injection vulnerability in firmware |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability via the PinCode parameter at /API/info form endpoint. Linksys of E5600 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Linksys E5600 is a powerful, compact and reliable WiFi 5 router from Linksys of the United States. Attackers can exploit this vulnerability to cause arbitrary command execution
| VAR-202405-0129 | CVE-2024-4497 | Shenzhen Tenda Technology Co.,Ltd. of i21 Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been declared as critical. This vulnerability affects the function formexeCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-263086 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of i21 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter cmdinput of the function formexeCommand failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
| VAR-202405-0066 | CVE-2024-4496 | Shenzhen Tenda Technology Co.,Ltd. of i21 Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been classified as critical. This affects the function formWifiMacFilterSet. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263085 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of i21 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter ssidIndex of the function formWifiMacFilterSet failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack