VARIoT IoT vulnerabilities database

VAR-202311-2457 | CVE-2023-49046 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Stack Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the devName parameter in the function formAddMacfilterRule.
VAR-202311-2332 | CVE-2023-49043 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Buffer Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the wpapsk_crypto parameter in the function fromSetWirelessRepeat.
VAR-202311-1790 | CVE-2023-6265 | DrayTek Corporation of Vigor2960 Path traversal vulnerability in firmware |
CVSS V2: - CVSS V3: 8.1 Severity: HIGH |
** UNSUPPORTED WHEN ASSIGNED ** Draytek Vigor2960 v1.5.1.4 and v1.5.1.5 are vulnerable to directory traversal via the mainfunction.cgi dumpSyslog 'option' parameter allowing an authenticated attacker with access to the web management interface to delete arbitrary files. Vigor2960 is no longer supported. ** Not supported ** This is a vulnerability in an unsupported product. DrayTek Corporation of Vigor2960 A path traversal vulnerability exists in firmware.Information is tampered with and service operation is interrupted (DoS) It may be in a state
VAR-202311-1677 | CVE-2023-5299 | Fuji Electric's Tellus Lite V-Simulator Vulnerability in |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
A user with a standard account in Fuji Electric Tellus Lite may overwrite files in the system. Fuji Electric's Tellus Lite V-Simulator Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the product installer. The issue results from incorrect permissions set on product folders created by the installer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of any user of the software
VAR-202311-1679 | CVE-2023-40152 | Fuji Electric Tellus Lite V-Simulator V9 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
When Fuji Electric Tellus Lite V-Simulator parses a specially-crafted input file an out of bounds write may occur. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of V9 files by the V-Simulator module. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process
VAR-202311-1678 | CVE-2023-35127 | Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Stack-based buffer overflow may occur when Fuji Electric Tellus Lite V-Simulator parses a specially-crafted input file. Fuji Electric's Tellus Lite V-Simulator Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of V9 files by the V-Simulator 6 module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process
VAR-202311-1972 | CVE-2023-20265 | Cross-site scripting vulnerability in multiple Cisco Systems products |
CVSS V2: 4.7 CVSS V3: 5.4 Severity: MEDIUM |
A vulnerability in the web-based management interface of a small subset of Cisco IP Phones could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials to access the web-based management interface of the affected device. IP DECT110 firmware, IP DECT 210 firmware, Cisco Unified IP Phone 6901 Cross-site scripting vulnerabilities exist in multiple Cisco Systems products, including firmware.Information may be obtained and information may be tampered with. Cisco IP Phone is a hardware device of the American company Cisco. An IP phone that provides call functionality
VAR-202311-2491 | CVE-2023-48111 | Tenda AX1803 time parameter buffer overflow vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the time parameter in the function saveParentControlInfo . This vulnerability allows attackers to cause a Denial of Service (DoS) attack. Tenda AX1803 is a dual-band Gigabit WIFI6 router from China's Tenda Company.
Tenda AX1803 v1.0.0.1 version has a buffer overflow vulnerability. This vulnerability is caused by the time parameter in the function saveParentControlInfo failing to correctly verify the length of the input data
VAR-202311-2413 | CVE-2023-48110 | Tenda AX1803 urls parameter buffer overflow vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda AX1803 v1.0.0.1 was discovered to contain a heap overflow via the urls parameter in the function saveParentControlInfo . This vulnerability allows attackers to cause a Denial of Service (DoS) attack. Tenda AX1803 is a dual-band Gigabit WIFI6 router from China's Tenda Company.
Tenda AX1803 v1.0.0.1 version has a buffer overflow vulnerability. This vulnerability is caused by the urls parameter in the function saveParentControlInfo failing to correctly verify the length of the input data
VAR-202311-2304 | CVE-2023-48109 | Shenzhen Tenda Technology Co.,Ltd. of ax1803 Out-of-bounds write vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda AX1803 v1.0.0.1 was discovered to contain a heap overflow via the deviceId parameter in the function saveParentControlInfo . This vulnerability allows attackers to cause a Denial of Service (DoS) attack. Shenzhen Tenda Technology Co.,Ltd. of ax1803 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state.
Tenda AX1803 v1.0.0.1 version has a buffer overflow vulnerability. This vulnerability is caused by the deviceId parameter in the function saveParentControlInfo failing to correctly verify the length of the input data
VAR-202311-1840 | CVE-2023-48192 | TOTOLINK A3700R Code Execution Vulnerability |
CVSS V2: 10.0 CVSS V3: 7.8 Severity: HIGH |
An issue in TOTOlink A3700R v.9.1.2u.6134_B20201202 allows a local attacker to execute arbitrary code via the setTracerouteCfg function. TOTOLINK A3700R is a wireless router made by China Zeon Electronics (TOTOLINK) Company.
There is a code execution vulnerability in the TOTOLINK A3700R v9.1.2u.6134_B20201202 version
VAR-202311-1968 | CVE-2023-38823 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Buffer Overflow vulnerability in Tenda Ac19 v.1.0, AC18, AC9 v.1.0, AC6 v.2.0 and v.1.0 allows a remote attacker to execute arbitrary code via the formSetCfm function in bin/httpd
VAR-202311-1670 | CVE-2023-3379 | plural WAGO Product vulnerabilities |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges. compact controller 100 firmware, Edge Controller firmware, PFC100 firmware etc. WAGO There are unspecified vulnerabilities in the product.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202311-0454 | CVE-2023-47586 | Fuji Electric's V-Server Out-of-bounds write vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Multiple heap-based buffer overflow vulnerabilities exist in V-Server V4.0.18.0 and earlier and V-Server Lite V4.0.18.0 and earlier. If a user opens a specially crafted VPR file, information may be disclosed and/or arbitrary code may be executed. Fuji Electric's V-Server Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fuji Electric V-Server and Fuji Electric V-Server Lite are both products of Fuji Electric Corporation of Japan. Fuji Electric V-Server is a set of software for collecting and managing real-time field data. Fuji Electric V-Server Lite is a remote monitoring software for industrial environments. The software can collect information from devices such as PLCs, temperature controllers, inverters, etc.
Fuji Electric V-Server/V-Server Lite has a buffer overflow vulnerability, which is caused by a boundary error when the application processes untrusted input
VAR-202311-0456 | CVE-2023-47583 | Fuji Electric's TELLUS Out-of-bounds read vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Multiple out-of-bounds read vulnerabilities exist in TELLUS Simulator V4.0.17.0 and earlier. If a user opens a specially crafted file (X1 or V9 file), information may be disclosed and/or arbitrary code may be executed. Fuji Electric's TELLUS Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fuji Electric TELLUS is advanced, user-friendly, and remotely controllable industrial automation software
VAR-202311-0453 | CVE-2023-47581 | Fuji Electric's TELLUS and TELLUS Lite Out-of-bounds read vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Out-of-bounds read vulnerability exists in TELLUS V4.0.17.0 and earlier and TELLUS Lite V4.0.17.0 and earlier. If a user opens a specially crafted file (X1, V8, or V9 file), information may be disclosed and/or arbitrary code may be executed. (DoS) It may be in a state. Fuji Electric TELLUS is advanced, user-friendly industrial automation software that supports remote control. Fuji Electric TELLUS Lite is remote control software primarily used for equipment monitoring and management in industrial environments.
Fuji Electric TELLUS/TELLUS Lite suffers from an out-of-bounds read vulnerability due to a lack of proper validation of user-supplied data. An attacker could exploit this vulnerability to leak information or execute arbitrary code
VAR-202311-0455 | CVE-2023-47580 | Fuji Electric's TELLUS and TELLUS Lite Buffer error vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Multiple improper restriction of operations within the bounds of a memory buffer issues exist in TELLUS V4.0.17.0 and earlier and TELLUS Lite V4.0.17.0 and earlier. If a user opens a specially crafted file (X1, V8, or V9 file), information may be disclosed and/or arbitrary code may be executed. (DoS) It may be in a state. Fuji Electric TELLUS is advanced, user-friendly industrial automation software that supports remote control. Fuji Electric TELLUS Lite is remote control software primarily used for equipment monitoring and management in industrial environments.
Fuji Electric TELLUS/TELLUS Lite suffers from a buffer overflow vulnerability caused by improperly restricting the range of a memory buffer. An attacker could exploit this vulnerability to leak information or execute arbitrary code
VAR-202311-0697 | CVE-2023-5986 | Schneider Electric EcoStruxure Power Monitoring Expert Open Redirection Vulnerability |
CVSS V2: 6.4 CVSS V3: 6.1 Severity: MEDIUM |
A CWE-601 URL Redirection to Untrusted Site vulnerability exists that could cause an openredirect vulnerability leading to a cross site scripting attack. By providing a URL-encoded input
attackers can cause the software’s web application to redirect to the chosen domain after a
successful login is performed. Schneider Electric EcoStruxure Power Monitoring Expert is a device developed by Schneider Electric for power distribution monitoring in IoT environments.
Schneider Electric EcoStruxure Power Monitoring Expert has an open redirection vulnerability. The vulnerability is caused by the system not properly handling the target jump. Attackers can use this vulnerability to redirect users to malicious websites for phishing and other attacks
VAR-202311-0698 | CVE-2023-47678 | ASUSTeK COMPUTER Made RT-AC87U Improper access control vulnerability in |
CVSS V2: 9.4 CVSS V3: 9.1 Severity: CRITICAL |
An improper access control vulnerability exists in RT-AC87U all versions. An attacker may read or write files that are not intended to be accessed by connecting to a target device via tftp. ASUSTeK COMPUTER INC. This vulnerability information is JPCERT/CC Report to JPCERT/CC Coordinated with the developer. Reporter : Zero Zero One Co., Ltd. ASUS RT-AC87U is a wireless router from ASUS, a Chinese company
VAR-202311-0501 | CVE-2023-34982 | plural AVEVA Vulnerability related to externally controllable references to other domain resources in the product |
CVSS V2: - CVSS V3: 7.1 Severity: HIGH |
This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service. batch management , communication drivers , edge etc. multiple AVEVA The product contains a vulnerability related to externally controllable references to cross-domain resources.Information is tampered with and service operation is interrupted (DoS) It may be in a state