VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202112-1084 No CVE H3C GR1108-P has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
H3C GR1108-P is a new generation of high-performance enterprise-class router launched by H3C. H3C GR1108-P has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202112-0943 CVE-2021-39998 plural  Huawei  Vulnerabilities in smartphone products CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei. A security vulnerability exists in the Huawei HarmonyOS HwConnectivityExService service. Huawei HarmonyOS is an operating system. Provide a microkernel-based full-scenario distributed operating system
VAR-202112-0946 CVE-2021-40000 HarmonyOS  Out-of-bounds write vulnerability in CVSS V2: 5.8
CVSS V3: 8.8
Severity: HIGH
The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end. HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
VAR-202112-1085 No CVE H3C GR1100-P has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
H3C GR1100-P is a new generation of high-performance enterprise-class router launched by H3C. H3C GR1100-P has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202112-0944 CVE-2021-39996 plural  Huawei  Out-of-bounds write vulnerability in smartphone products CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
VAR-202112-0951 CVE-2021-40003 HarmonyOS  Past traversal vulnerability in CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
HwPCAssistant has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in a past traversal vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
VAR-202112-0950 CVE-2021-40001 HarmonyOS  Past traversal vulnerability in CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable. HarmonyOS Exists in a past traversal vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
VAR-202112-0395 CVE-2021-44352 Tenda AC15  Out-of-bounds write vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A Stack-based Buffer Overflow vulnerability exists in the Tenda AC15 V15.03.05.18_multi device via the list parameter in a post request in goform/SetIpMacBind. Tenda AC15 Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC15 is a wireless router made by Tenda in China. Tenda AC15 15.03.05.18_multi version has security vulnerabilities
VAR-202112-0132 CVE-2021-44518 Android  for  eGeeTouch 3rd Generation Travel Padlock  Vulnerability related to transmission of sensitive information in plain text in applications CVSS V2: 2.9
CVSS V3: 6.8
Severity: MEDIUM
An issue was discovered in the eGeeTouch 3rd Generation Travel Padlock application for Android. The lock sends a pairing code before each operation (lock or unlock) activated via the companion app. The code is sent unencrypted, allowing any attacker with the same app (either Android or iOS) to add the lock and take complete control. For successful exploitation, the attacker must be able to touch the lock's power button, and must be able to capture BLE network communication
VAR-202112-0188 CVE-2021-33267 D-Link DIR-809  Out-of-bounds write vulnerabilities in devices CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80034d60 in /formStaticDHCP. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. Attackers can use the vulnerability to submit special requests to crash the application or execute arbitrary code
VAR-202112-0021 CVE-2021-20863 Multiple vulnerabilities in ELECOM router CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
OS command injection vulnerability in ELECOM routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent authenticated attackers to execute an arbitrary OS command with the root privilege via unspecified vectors. The following vulnerabilities exist in multiple router products provided by ELECOM Corporation. It was * CSRF Insufficient access restrictions for countermeasure tokens (CWE-284) - CVE-2021-20862 ‥ * OS Command injection (CWE-78) ‥ * telnet Inadequate access control to services (CWE-284) - CVE-2021-20864 This vulnerability information is from Zero Zero One Co., Ltd. Mr. Katsuhiko Sato (gooh_kun), Hayakawa Soraya Mr Report directly to the product developer, and after coordinating with the product developer, for the purpose of disseminating it to the product user JVN It was announced in.The expected impact depends on each vulnerability, but it may be affected as follows. * Used in the product by a third party on an adjacent network CSRF There is a possibility that the token will be obtained illegally and the settings will be changed. - CVE-2021-20862 ‥ * By a third party who has access to the management screen of the product root Arbitrary with authority OS The command may be executed - CVE-2021-20863 ‥ * By a third party on the adjacent network, the device telnet Service enabled, root Arbitrary with authority OS The command may be executed - CVE-2021-20864. Elecom Edwrc is a series of routers from Japan's Elecom company. Elecom Edwrc has an operating system command injection vulnerability. The vulnerability originates from the fact that the network system or product does not properly filter special elements in the process of constructing executable commands from external input data of the ELECOM router. Attackers can use this vulnerability to execute illegal commands
VAR-202112-0175 CVE-2021-33270 D-Link DIR-809  Out-of-bounds write vulnerabilities in devices CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_800462c4 in /formAdvFirewall. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. Attackers can use POST requests to cause buffer overflow, resulting in denial of service or code execution
VAR-202112-0186 CVE-2021-33274 D-Link DIR-809  Out-of-bounds write vulnerabilities in devices CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80040af8 in /formWlanSetup. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. Attackers can use POST requests to cause buffer overflow, resulting in denial of service or code execution
VAR-202112-0176 CVE-2021-33269 D-Link DIR-809  Out-of-bounds write vulnerabilities in devices CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_8004776c in /formVirtualServ. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. An attacker can cause a buffer overflow through a POST request, resulting in a denial of service or code execution
VAR-202112-0177 CVE-2021-33268 D-Link DIR-809  Out-of-bounds write vulnerabilities in devices CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function sub_8003183C in /fromLogin. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. An attacker can cause a buffer overflow through a POST request, resulting in a denial of service or code execution
VAR-202112-0011 CVE-2021-33265 D-Link DIR-809  Out-of-bounds write vulnerabilities in devices CVSS V2: 7.2
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80046eb4 in /formSetPortTr. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. Attackers can use POST requests to cause buffer overflow, resulting in denial of service or code execution
VAR-202112-0187 CVE-2021-33271 D-Link DIR-809  Out-of-bounds write vulnerabilities in devices CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function sub_80046EB4 in /formSetPortTr. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. There is a buffer error vulnerability in D-Link DIR-809, which is caused by the failure of the sub_80046EB4 function in the product/formSetPortTr link to effectively determine the data boundary. Attackers can use POST requests to cause buffer overflow, resulting in denial of service or code execution
VAR-202112-0189 CVE-2021-33266 D-Link DIR-809  Out-of-bounds write vulnerabilities in devices CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_8004776c in /formVirtualApp. This vulnerability is triggered via a crafted POST request. D-Link DIR-809 The device contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-809 is a dual-band router of China D-Link. An attacker can use this vulnerability to gain control of the server
VAR-202112-0813 CVE-2021-39999 Huawei ESE620X vESS Buffer error vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
There is a buffer overflow vulnerability in eSE620X vESS V100R001C10SPC200 and V100R001C20SPC200. An attacker can exploit this vulnerability by sending a specific message to the target device due to insufficient validation of packets. Successful exploit could cause a denial of service condition
VAR-202112-0195 CVE-2021-42711 Barracuda Network Access Client  Vulnerability regarding improper default permissions in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Barracuda Network Access Client before 5.2.2 creates a Temporary File in a Directory with Insecure Permissions. This file is executed with SYSTEM privileges when an unprivileged user performs a repair operation. (DoS) It may be in a state. Used to control network and VPN client access based on rules and policies