VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202107-1819 No CVE Information disclosure vulnerability exists in Meizu 16s pro CVSS V2: 4.7
CVSS V3: -
Severity: MEDIUM
Meizu 16s pro is a smart phone produced by Zhuhai Meizu Technology Co., Ltd. Meizu 16s pro has an information disclosure vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202107-0021 CVE-2020-12731 Android  for  MagicMotion Flamingo 2  Vulnerability in plaintext storage of critical information in applications CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The MagicMotion Flamingo 2 application for Android stores data on an sdcard under com.vt.magicmotion/files/Pictures, whence it can be read by other applications. MagicMotion Flamingo is a wearable vibrator produced by MagicMotion company in China. Attackers can use this vulnerability to make it read by other applications
VAR-202107-1867 No CVE OnePlus 8T has an information disclosure vulnerability CVSS V2: 4.7
CVSS V3: -
Severity: MEDIUM
OnePlus 8T is a smart phone. OnePlus8T has an information disclosure vulnerability. Attackers can use to obtain sensitive user information.
VAR-202107-0020 CVE-2020-12730 MagicMotion Flamingo 2  Vulnerability regarding lack of encryption of critical data in CVSS V2: 2.9
CVSS V3: 5.3
Severity: MEDIUM
MagicMotion Flamingo 2 lacks BLE encryption, enabling data sniffing and packet forgery. MagicMotion Flamingo 2 There is a vulnerability in the lack of encryption of critical data.Information may be obtained. MagicMotion Flamingo is a wearable vibrator produced by MagicMotion company in China. Attackers can use this vulnerability to sniff data and forge data packets
VAR-202107-1814 No CVE Finetree 5MP Network Camera has logic flaw vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
5MP Network Camera is a camera product. Finetree 5MP Network Camera has a logic flaw vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202107-0019 CVE-2020-12729 MagicMotion Flamingo information disclosure vulnerability CVSS V2: 2.1
CVSS V3: 4.6
Severity: MEDIUM
MagicMotion Flamingo 2 has a lack of access control for reading from device descriptors. MagicMotion Flamingo 2 There is a vulnerability related to information leakage.Information may be obtained. MagicMotion Flamingo is a wearable vibrator produced by MagicMotion company in China
VAR-202107-1809 No CVE Ruijie RG-UAC 6000-ISG video access security gateway has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
RG-UAC 6000-ISG series video surveillance security gateway is a video surveillance network security reinforcement product independently developed by Ruijie Networks. The RG-UAC 6000-ISG video access security gateway has a weak password vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202107-1813 No CVE Unauthorized access vulnerability exists in Finetree-5MP-Network-Camera CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Finetree-5MP-Network-Camera is a network camera. Unauthorized access vulnerability exists in Finetree-5MP-Network-Camera. Attackers can use this vulnerability to obtain sensitive information.
VAR-202107-1808 No CVE Unauthorized access vulnerabilities in multiple Dell printers CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Dell is known for its production, design, and sales of home and office computers, but it is also involved in the high-end computer market, producing and selling servers, data storage equipment, and network equipment. Many Dell printers have unauthorized access vulnerabilities. Attackers can use vulnerabilities to obtain sensitive information and perform unauthorized operations.
VAR-202107-0573 CVE-2021-21587 Dell Wyse Management Suite  Vulnerability regarding information leakage in CVSS V2: 2.1
CVSS V3: 3.3
Severity: LOW
Dell Wyse Management Suite versions 3.2 and earlier contain a full path disclosure vulnerability. A local unauthenticated attacker could exploit this vulnerability in order to obtain the path of files and folders. The offering includes Wyse endpoint centralized management, asset tracking and automatic device discovery
VAR-202107-0572 CVE-2021-21586 Wyse Management Suite  Past traversal vulnerability in CVSS V2: 6.8
CVSS V3: 6.5
Severity: MEDIUM
Wyse Management Suite versions 3.2 and earlier contain an absolute path traversal vulnerability. A remote authenticated malicious user could exploit this vulnerability in order to read arbitrary files on the system
VAR-202107-1688 No CVE Ruijie Networks Co., Ltd. EG Easy Gateway has a file upload vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Ruijie Networks Co., Ltd. is a professional network manufacturer with a full range of network equipment product lines and solutions including switches, routers, software, security firewalls, wireless products, and storage. Ruijie Networks Co., Ltd. EG Easy Gateway has a file upload vulnerability. Attackers can use this vulnerability to gain control of the server.
VAR-202107-1690 No CVE Guangzhou Tongjucheng Electronic Technology Co., Ltd. TGS-AGW gateway has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Guangzhou Tongjucheng Electronic Technology Co., Ltd. is a "TGS-AGW" series of security gateway products with independent intellectual property rights. It has stable performance and powerful functions. It has passed the authority certification of public information network security; products also include WIFI wireless products and switching networks Products, network security products, etc. The TGS-AGW gateway of Guangzhou Tongjucheng Electronic Technology Co., Ltd. has a weak password vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202107-1689 No CVE Bihaiwei L7 cloud router wireless operation version has a command execution vulnerability (CNVD-2021-41531) CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Bihaiwei L7 Cloud Road Wireless Operation Edition is a dedicated network equipment customized for commercial wireless managers such as hotels, resorts, shopping malls and stations. The device has multiple functions such as routing, firewall, flow control, wireless AC controller, and WeChat authentication. Bihaiwei L7 cloud router wireless operation version has command execution vulnerabilities. Attackers can use this vulnerability to execute arbitrary system commands on the device and obtain device permissions.
VAR-202107-1810 No CVE Ruijie Networks Co., Ltd. EG Easy Gateway has logic flaws and vulnerabilities CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Ruijie Networks Co., Ltd. is a professional network manufacturer with a full range of network equipment product lines and solutions including switches, routers, software, security firewalls, wireless products, and storage. Ruijie Networks Co., Ltd. EG Easy Gateway has a logic flaw vulnerability. Attackers can use this vulnerability to delete arbitrary files on the server.
VAR-202107-0087 CVE-2020-20231 Mikrotik RouterOs  Out-of-bounds Vulnerability in Microsoft CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Mikrotik RouterOs through stable version 6.48.3 suffers from a memory corruption vulnerability in the /nova/bin/detnet process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference). MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality
VAR-202107-1202 CVE-2021-35469 plural  Lexmark  Vulnerabilities in unquoted search paths or elements in products CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
The Lexmark Printer Software G2, G3 and G4 Installation Packages have a local escalation of privilege vulnerability due to a registry entry that has an unquoted service path
VAR-202107-0371 CVE-2021-22318 Huawei HarmonyOS Code problem vulnerability CVSS V2: 4.9
CVSS V3: 5.5
Severity: MEDIUM
A component of the HarmonyOS 2.0 has a Null Pointer Dereference Vulnerability. Local attackers may exploit this vulnerability to cause system denial of service
VAR-202107-1411 CVE-2021-34316 JT2Go  and  Teamcenter Visualization  Input confirmation vulnerability CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The DL180CoolType.dll library in affected applications lacks proper validation of user-supplied data when parsing PDF files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13380). JT2Go and Teamcenter Visualization There is an input verification vulnerability and an out-of-bounds write vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-13380 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files
VAR-202107-1379 CVE-2021-34295 JT2Go  and  Teamcenter Visualization  Input confirmation vulnerability CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The Gif_loader.dll library in affected applications lacks proper validation of user-supplied data when parsing GIF files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13024). JT2Go and Teamcenter Visualization There is an input verification vulnerability and an out-of-bounds write vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-13024 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of GIF files