VARIoT IoT vulnerabilities database

VAR-202108-1581 | CVE-2021-38536 | plural NETGEAR Cross-site scripting vulnerabilities in devices |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
Certain NETGEAR devices are affected by stored XSS. This affects D6200 before 1.1.00.40, D7000 before 1.0.1.78, R6020 before 1.0.0.48, R6080 before 1.0.0.48, R6120 before 1.0.0.66, R6260 before 1.1.0.78, R6700v2 before 1.2.0.76, R6800 before 1.2.0.76, R6900v2 before 1.2.0.76, R6850 before 1.1.0.78, R7200 before 1.2.0.76, R7350 before 1.2.0.76, R7400 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, AC2400 before 1.2.0.76, AC2600 before 1.2.0.76, RAX35 before 1.0.3.62, and RAX40 before 1.0.3.62. plural NETGEAR A cross-site scripting vulnerability exists in the device.Information may be obtained and information may be tampered with. This affects D6200 prior to 1.1.00.40, D7000 prior to 1.0.1.78, R6020 prior to 1.0.0.48, R6080 prior to 1.0.0.48, R6120 prior to 1.0.0.66, R6260 prior to 1.1.0.78, R6700v2 prior to 1.2.0.76, R6800 prior to 1.2.0.76, R6900v2 prior to 1.2.0.76, R6850 prior to 1.1.0.78, R7200 prior to 1.2.0.76, R7350 prior to 1.2.0.76, R7400 prior to 1.2.0.76, R7450 prior to 1.2.0.76, AC2100 prior to 1.2.0.76, AC2400 prior to 1.2.0.76, AC2600 prior to 1.2.0.76, RAX35 prior to 1.0.3.62, and RAX40 prior to 1.0.3.62
VAR-202108-1630 | CVE-2021-38524 | plural NETGEAR Out-of-bounds write vulnerabilities in the product |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects MK62 before 1.0.6.110, MR60 before 1.0.6.110, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX20 before 1.0.2.82, RAX200 before 1.0.3.106, RAX45 before 1.0.2.32, RAX50 before 1.0.2.32, RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, and RBS750 before 3.2.16.6. plural NETGEAR The product contains a vulnerability related to out-of-bounds writes.Service operation interruption (DoS) It may be in a state. This affects MK62 prior to 1.0.6.110, MR60 prior to 1.0.6.110, MS60 prior to 1.0.6.110, RAX15 prior to 1.0.2.82, RAX20 prior to 1.0.2.82, RAX200 prior to 1.0.3.106, RAX45 prior to 1.0.2.32, RAX50 prior to 1.0.2.32, RAX75 prior to 1.0.3.106, RAX80 prior to 1.0.3.106, RBK752 prior to 3.2.16.6, RBR750 prior to 3.2.16.6, and RBS750 prior to 3.2.16.6
VAR-202108-1045 | CVE-2021-28846 | plural TRENDnet Product Format String Vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A Format String vulnerablity exists in TRENDnet TEW-755AP 1.11B03, TEW-755AP2KAC 1.11B03, TEW-821DAP2KAC 1.11B03, and TEW-825DAP 1.11B03, which could let a remote malicious user cause a denial of service due to a logic bug at address 0x40dcd0 when calling fprintf with "%s: key len = %d, too long\n" format. The two variables seem to be put in the wrong order. The vulnerability could be triggered by sending the POST request to apply_cgi with a long and unknown key in the request body. plural TRENDnet The product contains a vulnerability in format strings.Service operation interruption (DoS) It may be in a state
VAR-202108-0942 | CVE-2021-31655 | TRENDnet TV-IP110WN Cross-site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross Site Scripting (XSS) vulnerability in TRENDnet TV-IP110WN V1.2.2.64 V1.2.2.65 V1.2.2.68 via the profile parameter. in a GET request in view.cgi. TRENDnet TV-IP110WN Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
VAR-202108-2473 | No CVE | Unauthorized access vulnerabilities exist in various products of Ricoh (China) Ricoh (China) Investment Co., Ltd. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Ricoh (China) Investment Co., Ltd. provides office image processing equipment (such as MFPs, printers, etc.), production digital printers, etc., such as document output management services and IT solutions.
Many products of Ricoh (China) Investment Co., Ltd. have unauthorized access vulnerabilities. Attackers can use the vulnerabilities to obtain sensitive information.
VAR-202108-1620 | CVE-2021-38514 | Multiple Netgear Product Authorization Issue Vulnerability |
CVSS V2: 4.0 CVSS V3: 2.7 Severity: LOW |
Certain NETGEAR devices are affected by authentication bypass. This affects D3600 prior to 1.0.0.72, D6000 prior to 1.0.0.72, D6100 prior to 1.0.0.63, D6200 prior to 1.1.00.34, D6220 prior to 1.0.0.48, D6400 prior to 1.0.0.86, D7000 prior to 1.0.1.70, D7000v2 prior to 1.0.0.52, D7800 prior to 1.0.1.56, D8500 prior to 1.0.3.44, DC112A prior to 1.0.0.42, DGN2200v4 prior to 1.0.0.108, DGND2200Bv4 prior to 1.0.0.108, EX2700 prior to 1.0.1.48, EX3700 prior to 1.0.0.76, EX3800 prior to 1.0.0.76, EX6000 prior to 1.0.0.38, EX6100 prior to 1.0.2.24, EX6100v2 prior to 1.0.1.76, EX6120 prior to 1.0.0.42, EX6130 prior to 1.0.0.28, EX6150v1 prior to 1.0.0.42, EX6150v2 prior to 1.0.1.76, EX6200 prior to 1.0.3.88, EX6200v2 prior to 1.0.1.72, EX6400 prior to 1.0.2.136, EX7000 prior to 1.0.0.66, EX7300 prior to 1.0.2.136, EX8000 prior to 1.0.1.180, RBK50 prior to 2.1.4.10, RBR50 prior to 2.1.4.10, RBS50 prior to 2.1.4.10, RBK40 prior to 2.1.4.10, RBR40 prior to 2.1.4.10, RBS40 prior to 2.1.4.10, RBW30 prior to 2.2.1.204, PR2000 prior to 1.0.0.28, R6020 prior to 1.0.0.38, R6080 prior to 1.0.0.38, R6050 prior to 1.0.1.18, JR6150 prior to 1.0.1.18, R6120 prior to 1.0.0.46, R6220 prior to 1.1.0.86, R6250 prior to 1.0.4.34, R6300v2 prior to 1.0.4.32, R6400 prior to 1.0.1.44, R6400v2 prior to 1.0.2.62, R6700 prior to 1.0.1.48, R6700v2 prior to 1.2.0.36, R6800 prior to 1.2.0.36, R6900v2 prior to 1.2.0.36, R6900 prior to 1.0.1.48, R7000 prior to 1.0.9.34, R6900P prior to 1.3.1.64, R7000P prior to 1.3.1.64, R7100LG prior to 1.0.0.48, R7300DST prior to 1.0.0.70, R7500v2 prior to 1.0.3.38, R7800 prior to 1.0.2.52, R7900 prior to 1.0.3.8, R8000 prior to 1.0.4.28, R7900P prior to 1.4.1.30, R8000P prior to 1.4.1.30, R8300 prior to 1.0.2.128, R8500 prior to 1.0.2.128, R9000 prior to 1.0.3.10, RBS40V prior to 2.2.0.58, RBK50V prior to 2.2.0.58, WN2000RPTv3 prior to 1.0.1.32, WN2500RPv2 prior to 1.0.1.54, WN3000RPv3 prior to 1.0.2.78, WN3100RPv2 prior to 1.0.0.66, WNDR3400v3 prior to 1.0.1.22, WNDR3700v4 prior to 1.0.2.102, WNDR4300v1 prior to 1.0.2.104, WNDR4300v2 prior to 1.0.0.56, WNDR4500v3 prior to 1.0.0.56, WNR2000v5 (R2000) prior to 1.0.0.66, WNR2020 prior to 1.1.0.62, WNR2050 prior to 1.1.0.62, WNR3500Lv2 prior to 1.2.0.62, and XR500 prior to 2.3.2.22.
VAR-202108-1631 | CVE-2021-38525 | plural NETGEAR Out-of-bounds write vulnerabilities in the product |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.36, D7000 before 1.0.1.70, EX6200v2 before 1.0.1.78, EX7000 before 1.0.1.78, EX8000 before 1.0.1.186, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6050 before 1.0.1.18, R6080 before 1.0.0.42, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6300v2 before 1.0.4.34, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.40. plural NETGEAR The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This affects D3600 prior to 1.0.0.76, D6000 prior to 1.0.0.76, D6200 prior to 1.1.00.36, D7000 prior to 1.0.1.70, EX6200v2 prior to 1.0.1.78, EX7000 prior to 1.0.1.78, EX8000 prior to 1.0.1.186, JR6150 prior to 1.0.1.18, PR2000 prior to 1.0.0.28, R6020 prior to 1.0.0.42, R6050 prior to 1.0.1.18, R6080 prior to 1.0.0.42, R6120 prior to 1.0.0.46, R6220 prior to 1.1.0.80, R6260 prior to 1.1.0.64, R6300v2 prior to 1.0.4.34, R6700 prior to 1.0.2.6, R6700v2 prior to 1.2.0.36, R6800 prior to 1.2.0.36, R6900 prior to 1.0.2.4, R6900P prior to 1.3.1.64, R6900v2 prior to 1.2.0.36, R7000 prior to 1.0.9.42, R7000P prior to 1.3.1.64, R7800 prior to 1.0.2.60, R8900 prior to 1.0.4.12, R9000 prior to 1.0.4.12, and XR500 prior to 2.3.2.40
VAR-202108-2207 | CVE-2021-22385 | plural Huawei Vulnerability in leaking resources to the wrong area in smartphone products |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A component of the Huawei smartphone has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution. plural Huawei Smartphone products contain vulnerabilities related to the leakage of resources to the wrong area.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202108-2197 | CVE-2021-22386 | plural Huawei Double release vulnerability in smartphone products |
CVSS V2: 6.9 CVSS V3: 7.0 Severity: HIGH |
A component of the Huawei smartphone has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevation of Privileges. plural Huawei Smartphone products contain vulnerabilities related to double release.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202108-0519 | CVE-2021-21601 | Dell EMC Data Protection Search and IDPA Vulnerability regarding information leakage from log files in |
CVSS V2: 2.1 CVSS V3: 7.8 Severity: HIGH |
Dell EMC Data Protection Search, 19.4 and prior, and IDPA, 2.6.1 and prior, contain an Information Exposure in Log File Vulnerability in CIS. A local low privileged attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with the privileges of the compromised account. (DoS) It may be in a state
VAR-202108-0403 | CVE-2021-21567 | Dell PowerScale OneFS Vulnerability in privilege management in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Dell PowerScale OneFS 9.1.0.x contains an improper privilege management vulnerability. It may allow an authenticated user with ISI_PRIV_LOGIN_SSH and/or ISI_PRIV_LOGIN_CONSOLE to elevate privilege. Dell PowerScale OneFS Exists in a permission management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202108-2315 | No CVE | Xiaodu routing has command execution vulnerabilities |
CVSS V2: 8.3 CVSS V3: - Severity: HIGH |
Xiaodu Router is a smart router product launched by Baidu, which can transmit cloud data at will and supports remote download of audio and video resources.
Xiaodu routing has a command execution vulnerability, which can be exploited by an attacker to gain control of the server.
VAR-202108-2316 | No CVE | Xiaodu routing has unauthorized access vulnerabilities |
CVSS V2: 3.3 CVSS V3: - Severity: LOW |
Xiaodu Router is a smart router product launched by Baidu, which can transmit cloud data at will and supports remote download of audio and video resources.
Xiaodu routing has unauthorized access vulnerabilities, and attackers can use vulnerabilities to obtain sensitive information.
VAR-202108-2318 | No CVE | Quanxun Convergence Network Technology (Beijing) Co., Ltd. Aikuai Flow Control Routing Existing SQL Injection Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Quanxun Huiju Network Technology (Beijing) Co., Ltd. was established in 2013. "Ikuai" and "iKuai" are the company's product brands, and "iKuic" is the company's overseas product brands.
Quanxun Convergence Network Technology (Beijing) Co., Ltd. Aikuai flow control routing has a SQL injection vulnerability. Attackers can use the vulnerability to log in to the system and obtain sensitive information.
VAR-202108-1843 | CVE-2021-36276 | Dell DBUtilDrv2.sys driver Vulnerability in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Dell DBUtilDrv2.sys driver (versions 2.5 and 2.6) contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required. DELL Dell DBUtilDrv2.sys is a driver for Dell equipment of Dell (DELL)
VAR-202108-2348 | CVE-2021-38786 | Allwinner R818 SoC Android Q SDK In NULL Pointer dereference vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
There is a NULL pointer dereference in media/libcedarc/vdecoder of Allwinner R818 SoC Android Q SDK V1.0, which could cause a media crash (denial of service). R818 is a quad-core smart voice chip with screen.
Zhuhai Allwinner Technology Co., Ltd. R818 has a binary vulnerability that can be exploited by attackers to cause a denial of service
VAR-202108-2349 | CVE-2021-38783 | Allwinner R818 SoC Android Q SDK Out-of-bounds write vulnerability in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
There is a Out-of-Bound Write in the Allwinner R818 SoC Android Q SDK V1.0 camera driver "/dev/cedar_dev" through iotcl cmd IOCTL_SET_PROC_INFO and IOCTL_COPY_PROC_INFO, which could cause a system crash or EoP. R818 is a quad-core smart voice chip with screen.
Zhuhai Allwinner Technology Co., Ltd. R818 has a binary vulnerability that can be exploited by attackers to cause a denial of service
VAR-202108-2345 | No CVE | Brother (China) Commercial Co., Ltd. Brother DCP-J940N has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Brother DCP-J940N is a laser printer.
Brother (China) Commercial Co., Ltd. Brother DCP-J940N has an unauthorized access vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202108-2512 | No CVE | Hong Kong Broadband Network Co., Ltd. IAD601D has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Hong Kong Broadband Network Limited is a leading provider of integrated telecommunications and technology solutions.
Hong Kong Broadband Network Co., Ltd. IAD601D has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2521 | No CVE | HP OfficeJet Pro 8210 has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The HP OfficeJet Pro 8210 is an all-in-one printer.
HP OfficeJet Pro 8210 has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.