VARIoT IoT vulnerabilities database

VAR-202409-1092 | CVE-2024-46551 | DrayTek Corporation of vigor3910 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sBPA_Pwd parameter at inet15.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the sBPA_Pwd parameter of the inet15.cgi page failing to properly verify the length of the input data
VAR-202409-1080 | CVE-2024-46550 | DrayTek Corporation of vigor3910 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the CGIbyFieldName parameter at chglog.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the CGIbyFieldName parameter of the chglog.cgi page failing to properly verify the length of the input data
VAR-202409-0736 | CVE-2024-39590 | OpenPLC Project of OpenPLC_v3 Vulnerability in firmware regarding invalid type conversion |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Multiple invalid pointer dereference vulnerabilities exist in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC_v3 16bf8bac1a36d95b73e7b8722d0edb8b9c5bb56a. A specially crafted EtherNet/IP request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger these vulnerabilities.This instance of the vulnerability occurs within the `Protected_Logical_Write_Reply` function. OpenPLC Project of OpenPLC_v3 The firmware contains a vulnerability related to invalid type conversion.Service operation interruption (DoS) It may be in a state
VAR-202409-0737 | CVE-2024-39589 | OpenPLC Project of OpenPLC_v3 Vulnerability in firmware regarding invalid type conversion |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Multiple invalid pointer dereference vulnerabilities exist in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC_v3 16bf8bac1a36d95b73e7b8722d0edb8b9c5bb56a. A specially crafted EtherNet/IP request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger these vulnerabilities.This instance of the vulnerability occurs within the `Protected_Logical_Read_Reply` function. OpenPLC Project of OpenPLC_v3 The firmware contains a vulnerability related to invalid type conversion.Service operation interruption (DoS) It may be in a state
VAR-202409-0665 | CVE-2024-36981 | OpenPLC Project of OpenPLC_v3 Out-of-bounds read vulnerability in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
An out-of-bounds read vulnerability exists in the OpenPLC Runtime EtherNet/IP PCCC parser functionality of OpenPLC_v3 b4702061dc14d1024856f71b4543298d77007b88. A specially crafted network request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.This is the final instance of the incorrect comparison
VAR-202409-0664 | CVE-2024-36980 | OpenPLC Project of OpenPLC_v3 Out-of-bounds read vulnerability in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
An out-of-bounds read vulnerability exists in the OpenPLC Runtime EtherNet/IP PCCC parser functionality of OpenPLC_v3 b4702061dc14d1024856f71b4543298d77007b88. A specially crafted network request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.This is the first instance of the incorrect comparison
VAR-202409-0653 | CVE-2024-34026 | OpenPLC Project of OpenPLC_v3 Out-of-bounds write vulnerability in firmware |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
A stack-based buffer overflow vulnerability exists in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC _v3 b4702061dc14d1024856f71b4543298d77007b88. A specially crafted EtherNet/IP request can lead to remote code execution. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability. OpenPLC Project of OpenPLC_v3 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202409-0700 | CVE-2024-46419 | TOTOLINK of T8 Classic buffer overflow vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the setWizardCfg function via the ssid5g parameter. TOTOLINK of T8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK AC1200 is a dual-band Wi-Fi router from China's TOTOLINK Electronics. The vulnerability is caused by the failure to correctly verify the length of the input data in the ssid5g parameter of the setWizardCfg function. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202409-0760 | CVE-2024-46451 | TOTOLINK of T8 Classic buffer overflow vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the setWiFiAclRules function via the desc parameter. TOTOLINK of T8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK AC1200 T8 is a dual-band full-gigabit router from China's TOTOLINK Electronics. The vulnerability is caused by the desc parameter of the setWiFiAclRules function failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202409-0681 | CVE-2024-46424 | TOTOLINK of T8 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the UploadCustomModule function, which allows attackers to cause a Denial of Service (DoS) via the File parameter. TOTOLINK AC1200 is a dual-band Wi-Fi router from China's TOTOLINK Electronics.
There is a buffer overflow vulnerability in the UploadCustomModule function of TOTOLINK AC1200. The vulnerability is caused by the File parameter of the UploadCustomModule function failing to correctly verify the length of the input data
VAR-202409-1026 | CVE-2024-45698 | D-Link Systems, Inc. of dir-x4860 Vulnerability related to use of hardcoded credentials in firmware |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on the device. D-Link Systems, Inc. of dir-x4860 A vulnerability exists in the firmware regarding the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202409-1099 | CVE-2024-45697 | D-Link Systems, Inc. of dir-x4860 Vulnerabilities related to private functions in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Certain models of D-Link wireless routers have a hidden functionality where the telnet service is enabled when the WAN port is plugged in. Unauthorized remote attackers can log in and execute OS commands using hard-coded credentials. D-Link Systems, Inc. of dir-x4860 The firmware contains a vulnerability related to an undisclosed function.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. DIR-X4860 is a wireless router of D-Link, a Chinese company.
D-Link Electronics (Shanghai) Co., Ltd
VAR-202409-0703 | CVE-2024-45695 | D-Link Systems, Inc. of dir-x4860 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
The web service of certain models of D-Link wireless routers contains a Stack-based Buffer Overflow vulnerability, which allows unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device. D-Link Systems, Inc. of dir-x4860 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. DIR-X4860 is a wireless router of D-Link, a Chinese company.
DIR-X4860 of D-Link Electronics (Shanghai) Co., Ltd. has a buffer overflow vulnerability. The vulnerability is caused by a stack-based buffer overflow vulnerability
VAR-202409-2267 | No CVE | Siemens SIMATIC S7-200 SMART has a Denial of Service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Siemens SIMATIC S7-200 SMART is a programmable logic controller (PLC) used in small and medium-sized automation systems of Siemens, Germany.
Siemens SIMATIC S7-200 SMART has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202409-1200 | CVE-2024-46049 | Shenzhen Tenda Technology Co.,Ltd. of o6 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda O6 V3.0 firmware V1.0.0.7(2054) contains a stack overflow vulnerability in the formexeCommand function. Shenzhen Tenda Technology Co.,Ltd. of o6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda O6 is a wireless bridge from China's Tenda company. No detailed vulnerability details are currently available
VAR-202409-0787 | CVE-2024-46048 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Command injection vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 9.8 Severity: CRITICAL |
Tenda FH451 v1.0.0.9 has a command injection vulnerability in the formexeCommand function i. Shenzhen Tenda Technology Co.,Ltd. of fh451 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202409-0809 | CVE-2024-46047 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Out-of-bounds write vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 7.5 Severity: HIGH |
Tenda FH451 v1.0.0.9 has a stack overflow vulnerability in the fromDhcpListClient function. Shenzhen Tenda Technology Co.,Ltd. of fh451 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state
VAR-202409-0810 | CVE-2024-46046 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Out-of-bounds write vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 9.8 Severity: CRITICAL |
Tenda FH451 v1.0.0.9 has a stack overflow vulnerability located in the RouteStatic function. Shenzhen Tenda Technology Co.,Ltd. of fh451 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state.
Tenda FH451 has a buffer overflow vulnerability, which can be exploited by attackers to overflow the buffer and execute arbitrary code on the system or cause the application to crash
VAR-202409-1127 | CVE-2024-46045 | Shenzhen Tenda Technology Co.,Ltd. of ch22 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda CH22 V1.0.0.6(468) has a stack overflow vulnerability located in the frmL7PlotForm function. Shenzhen Tenda Technology Co.,Ltd. of ch22 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. No detailed vulnerability details are currently provided
VAR-202409-1009 | CVE-2024-46044 | Shenzhen Tenda Technology Co.,Ltd. of ch22 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
CH22 V1.0.0.6(468) has a stack overflow vulnerability located in the fromqossetting function. Shenzhen Tenda Technology Co.,Ltd. of ch22 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. No detailed vulnerability details are provided at present