VARIoT IoT vulnerabilities database

VAR-202309-2442 | CVE-2023-43240 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter sip_address in ipportFilter.
VAR-202309-1784 | CVE-2023-43239 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter flag_5G in showMACfilterMAC.
VAR-202309-2527 | CVE-2023-43238 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter nvmacaddr in form2Dhcpip.cgi.
VAR-202309-2195 | CVE-2023-43236 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter statuscheckpppoeuser in dir_setWanWifi.
VAR-202309-2116 | CVE-2023-43241 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-823G v1.0.2B05 was discovered to contain a stack overflow via parameter TXPower and GuardInt in SetWLanRadioSecurity.
VAR-202309-2274 | CVE-2023-43237 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter macCloneMac in setMAC.
VAR-202309-2275 | CVE-2023-43235 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-823G v1.0.2B05 was discovered to contain a stack overflow via parameter StartTime and EndTime in SetWifiDownSettings.
VAR-202309-1870 | CVE-2023-43135 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
There is an unauthorized access vulnerability in TP-LINK ER5120G 4.0 2.0.0 Build 210817 Rel.80868n, which allows attackers to obtain sensitive information of the device without authentication, obtain user tokens, and ultimately log in to the device backend management.
VAR-202309-2529 | CVE-2023-43137 |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
TPLINK TL-ER5120G 4.0 2.0.0 Build 210817 Rel.80868n has a command injection vulnerability, when an attacker adds ACL rules after authentication, and the rule name parameter has injection points.
VAR-202309-1787 | CVE-2023-43138 |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
TPLINK TL-ER5120G 4.0 2.0.0 Build 210817 Rel.80868n has a command injection vulnerability, when an attacker adds NAPT rules after authentication, and the rule name has an injection point.
VAR-202309-2098 | CVE-2023-2262 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.
VAR-202309-2381 | CVE-2023-41030 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Hard-coded credentials in Juplink RX4-1500 versions V1.0.2 through V1.0.5 allow unauthenticated attackers to log in to the web interface or telnet service as the 'user' user.
VAR-202309-1961 | CVE-2023-41349 |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
ASUS router RT-AX88U has a vulnerability of using externally controllable format strings within its Advanced Open VPN function. An authenticated remote attacker can exploit the exported OpenVPN configuration to execute an externally-controlled format string attack, resulting in sensitivity information leakage, or forcing the device to reset and permanent denial of service.
VAR-202309-2398 | CVE-2023-37281 |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
Contiki-NG is an operating system for internet-of-things devices. In versions 4.9 and prior, when processing the various IPv6 header fields during IPHC header decompression, Contiki-NG confirms the received packet buffer contains enough data as needed for that field. But no similar check is done before decompressing the IPv6 address. Therefore, up to 16 bytes can be read out of bounds on the line with the statement `memcpy(&ipaddr->u8[16 - postcount], iphc_ptr, postcount);`. The value of `postcount` depends on the address compression used in the received packet and can be controlled by the attacker. As a result, an attacker can inject a packet that causes an out-of-bound read. As of time of publication, a patched version is not available. As a workaround, one can apply the changes in Contiki-NG pull request #2509 to patch the system.
VAR-202309-2067 | CVE-2023-37459 |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
Contiki-NG is an operating system for internet-of-things devices. In versions 4.9 and prior, when a packet is received, the Contiki-NG network stack attempts to start the periodic TCP timer if it is a TCP packet with the SYN flag set. But the implementation does not first verify that a full TCP header has been received. Specifically, the implementation attempts to access the flags field from the TCP buffer in the following conditional expression in the `check_for_tcp_syn` function. For this reason, an attacker can inject a truncated TCP packet, which will lead to an out-of-bound read from the packet buffer. As of time of publication, a patched version is not available. As a workaround, one can apply the changes in Contiki-NG pull request #2510 to patch the system.
VAR-202309-0738 | CVE-2023-38891 |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
SQL injection vulnerability in Vtiger CRM v.7.5.0 allows a remote authenticated attacker to escalate privileges via the getQueryColumnsList function in ReportRun.php.
VAR-202309-2235 | CVE-2023-39285 |
CVSS V2: - CVSS V3: 4.3 Severity: MEDIUM |
A vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 SP3 (22.24.5800.0) could allow an unauthenticated attacker to perform a Cross Site Request Forgery (CSRF) attack due to insufficient request validation. A successful exploit could allow an attacker to provide a modified URL, potentially enabling them to modify system configuration settings.
VAR-202309-0631 | CVE-2023-38557 | Siemens Spectrum Power 7 local privilege escalation vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A vulnerability has been identified in Spectrum Power 7 (All versions < V23Q3). The affected product assigns improper access rights to the update script. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges. Spectrum Power 7 provides basic components for SCADA, communications and data modeling for control and monitoring systems. Suites of applications can be added to optimize network and generation management in all areas of energy management
VAR-202309-0621 | CVE-2023-38558 | Siemens SIMATIC PCS neo (Administration Console) information leakage vulnerability |
CVSS V2: 4.6 CVSS V3: 5.5 Severity: MEDIUM |
A vulnerability has been identified in SIMATIC PCS neo (Administration Console) V4.0 (All versions), SIMATIC PCS neo (Administration Console) V4.0 Update 1 (All versions). The affected application leaks Windows admin credentials. An attacker with local access to the Administration Console could get the credentials, and impersonate the admin user, thereby gaining admin access to other Windows systems
VAR-202309-0673 | CVE-2023-4701 |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
A Improper Privilege Management vulnerability through an incorrect use of privileged APIs in CodeMeter Runtime versions prior to 7.60c allow a local, low privileged attacker to use an API call for escalation of privileges in order gain full admin access on the host system