VARIoT IoT vulnerabilities database
| VAR-202112-1084 | No CVE | H3C GR1108-P has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
H3C GR1108-P is a new generation of high-performance enterprise-class router launched by H3C.
H3C GR1108-P has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202112-0943 | CVE-2021-39998 | plural Huawei Vulnerabilities in smartphone products |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei.
A security vulnerability exists in the Huawei HarmonyOS HwConnectivityExService service. Huawei HarmonyOS is an operating system. Provide a microkernel-based full-scenario distributed operating system
| VAR-202112-0946 | CVE-2021-40000 | HarmonyOS Out-of-bounds write vulnerability in |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end. HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
| VAR-202112-1085 | No CVE | H3C GR1100-P has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
H3C GR1100-P is a new generation of high-performance enterprise-class router launched by H3C.
H3C GR1100-P has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202112-0944 | CVE-2021-39996 | plural Huawei Out-of-bounds write vulnerability in smartphone products |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
| VAR-202112-0951 | CVE-2021-40003 | HarmonyOS Past traversal vulnerability in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
HwPCAssistant has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in a past traversal vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
| VAR-202112-0950 | CVE-2021-40001 | HarmonyOS Past traversal vulnerability in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable. HarmonyOS Exists in a past traversal vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
| VAR-202112-0395 | CVE-2021-44352 | Tenda AC15 Out-of-bounds write vulnerability in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A Stack-based Buffer Overflow vulnerability exists in the Tenda AC15 V15.03.05.18_multi device via the list parameter in a post request in goform/SetIpMacBind. Tenda AC15 Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC15 is a wireless router made by Tenda in China.
Tenda AC15 15.03.05.18_multi version has security vulnerabilities
| VAR-202112-0132 | CVE-2021-44518 | Android for eGeeTouch 3rd Generation Travel Padlock Vulnerability related to transmission of sensitive information in plain text in applications |
CVSS V2: 2.9 CVSS V3: 6.8 Severity: MEDIUM |
An issue was discovered in the eGeeTouch 3rd Generation Travel Padlock application for Android. The lock sends a pairing code before each operation (lock or unlock) activated via the companion app. The code is sent unencrypted, allowing any attacker with the same app (either Android or iOS) to add the lock and take complete control. For successful exploitation, the attacker must be able to touch the lock's power button, and must be able to capture BLE network communication
| VAR-202112-0188 | CVE-2021-33267 | D-Link DIR-809 Out-of-bounds write vulnerabilities in devices |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80034d60 in /formStaticDHCP. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. Attackers can use the vulnerability to submit special requests to crash the application or execute arbitrary code
| VAR-202112-0021 | CVE-2021-20863 | Multiple vulnerabilities in ELECOM router |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
OS command injection vulnerability in ELECOM routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent authenticated attackers to execute an arbitrary OS command with the root privilege via unspecified vectors. The following vulnerabilities exist in multiple router products provided by ELECOM Corporation. It was * CSRF Insufficient access restrictions for countermeasure tokens (CWE-284) - CVE-2021-20862 ‥ * OS Command injection (CWE-78) ‥ * telnet Inadequate access control to services (CWE-284) - CVE-2021-20864 This vulnerability information is from Zero Zero One Co., Ltd. Mr. Katsuhiko Sato (gooh_kun), Hayakawa Soraya Mr Report directly to the product developer, and after coordinating with the product developer, for the purpose of disseminating it to the product user JVN It was announced in.The expected impact depends on each vulnerability, but it may be affected as follows. * Used in the product by a third party on an adjacent network CSRF There is a possibility that the token will be obtained illegally and the settings will be changed. - CVE-2021-20862 ‥ * By a third party who has access to the management screen of the product root Arbitrary with authority OS The command may be executed - CVE-2021-20863 ‥ * By a third party on the adjacent network, the device telnet Service enabled, root Arbitrary with authority OS The command may be executed - CVE-2021-20864. Elecom Edwrc is a series of routers from Japan's Elecom company.
Elecom Edwrc has an operating system command injection vulnerability. The vulnerability originates from the fact that the network system or product does not properly filter special elements in the process of constructing executable commands from external input data of the ELECOM router. Attackers can use this vulnerability to execute illegal commands
| VAR-202112-0175 | CVE-2021-33270 | D-Link DIR-809 Out-of-bounds write vulnerabilities in devices |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_800462c4 in /formAdvFirewall. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. Attackers can use POST requests to cause buffer overflow, resulting in denial of service or code execution
| VAR-202112-0186 | CVE-2021-33274 | D-Link DIR-809 Out-of-bounds write vulnerabilities in devices |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80040af8 in /formWlanSetup. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. Attackers can use POST requests to cause buffer overflow, resulting in denial of service or code execution
| VAR-202112-0176 | CVE-2021-33269 | D-Link DIR-809 Out-of-bounds write vulnerabilities in devices |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_8004776c in /formVirtualServ. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. An attacker can cause a buffer overflow through a POST request, resulting in a denial of service or code execution
| VAR-202112-0177 | CVE-2021-33268 | D-Link DIR-809 Out-of-bounds write vulnerabilities in devices |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function sub_8003183C in /fromLogin. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. An attacker can cause a buffer overflow through a POST request, resulting in a denial of service or code execution
| VAR-202112-0011 | CVE-2021-33265 | D-Link DIR-809 Out-of-bounds write vulnerabilities in devices |
CVSS V2: 7.2 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80046eb4 in /formSetPortTr. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. Attackers can use POST requests to cause buffer overflow, resulting in denial of service or code execution
| VAR-202112-0187 | CVE-2021-33271 | D-Link DIR-809 Out-of-bounds write vulnerabilities in devices |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function sub_80046EB4 in /formSetPortTr. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link.
There is a buffer error vulnerability in D-Link DIR-809, which is caused by the failure of the sub_80046EB4 function in the product/formSetPortTr link to effectively determine the data boundary. Attackers can use POST requests to cause buffer overflow, resulting in denial of service or code execution
| VAR-202112-0189 | CVE-2021-33266 | D-Link DIR-809 Out-of-bounds write vulnerabilities in devices |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_8004776c in /formVirtualApp. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. An attacker can use this vulnerability to gain control of the server
| VAR-202112-0813 | CVE-2021-39999 | Huawei ESE620X vESS Buffer error vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
There is a buffer overflow vulnerability in eSE620X vESS V100R001C10SPC200 and V100R001C20SPC200. An attacker can exploit this vulnerability by sending a specific message to the target device due to insufficient validation of packets. Successful exploit could cause a denial of service condition
| VAR-202112-0195 | CVE-2021-42711 | Barracuda Network Access Client Vulnerability regarding improper default permissions in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Barracuda Network Access Client before 5.2.2 creates a Temporary File in a Directory with Insecure Permissions. This file is executed with SYSTEM privileges when an unprivileged user performs a repair operation. (DoS) It may be in a state. Used to control network and VPN client access based on rules and policies