VARIoT IoT vulnerabilities database
| VAR-202111-0870 | CVE-2021-37025 | Huawei Input validation vulnerability in smartphones |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
| VAR-202111-0853 | CVE-2021-37007 | Huawei Out-of-Bounds Read Vulnerability in Smartphones |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the fact that the program does not check the message
| VAR-202111-0852 | CVE-2021-37008 | Huawei Input validation vulnerability in smartphones |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
| VAR-202111-0851 | CVE-2021-37009 | Huawei Vulnerabilities in smartphones |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
There is a Configuration vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
| VAR-202111-0850 | CVE-2021-37010 | Huawei Information disclosure vulnerability in smartphones |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones are vulnerable to information disclosure.Information may be obtained
| VAR-202111-0849 | CVE-2021-37012 | Huawei Vulnerabilities in smartphones |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
| VAR-202111-0848 | CVE-2021-37013 | Huawei Input validation vulnerability in smartphones |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the availability of users is affected. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
| VAR-202111-0847 | CVE-2021-37015 | Huawei Out-of-Bounds Read Vulnerability in Smartphones |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202111-0846 | CVE-2021-37016 | Huawei Out-of-Bounds Read Vulnerability in Smartphones |
CVSS V2: 8.5 CVSS V3: 9.1 Severity: CRITICAL |
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause Information Disclosure or Denial of Service. Huawei Smartphones contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the fact that the program does not check the message
| VAR-202111-1858 | No CVE | Shenzhen Anjia Vision Information Technology Co., Ltd. smart camera has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Shenzhen Anjoy Vision Information Technology Co., Ltd. (hereinafter referred to as: Anjoy Vision Information Technology Co., Ltd.) is a high-tech enterprise integrating R&D, production, sales and service.
Shenzhen Anjia Vision Information Technology Co., Ltd. smart camera has a weak password vulnerability. Attackers can use the vulnerability to log in to the background to obtain sensitive information.
| VAR-202111-1282 | CVE-2021-43557 | Apache APISIX command injection vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The uri-block plugin in Apache APISIX before 2.10.2 uses $request_uri without verification. The $request_uri is the full original request URI without normalization. This makes it possible to construct a URI to bypass the block list on some occasions. For instance, when the block list contains "^/internal/", a URI like `//internal/` can be used to bypass it. Some other plugins also have the same issue. And it may affect the developer's custom plugin. Apache APISIX Contains a command injection vulnerability.Information may be obtained. Apache Apisix is a cloud-native microservice API gateway service of the Apache Foundation in the United States. The software is implemented based on OpenResty and etcd, with dynamic routing and plug-in hot loading, suitable for API management under the microservice system.
Apache APISIX has a security vulnerability, which stems from improper design or implementation issues in the code development process of network systems or products. No detailed vulnerability details are currently provided
| VAR-202111-1762 | CVE-2021-21928 | R-SeeNet In SQL Injection vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘mac_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery
| VAR-202111-1761 | CVE-2021-21927 | R-SeeNet In SQL Injection vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘loc_filter’ parameter
| VAR-202111-1760 | CVE-2021-21925 | R-SeeNet In SQL Injection vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘firm_filter’ parameter
| VAR-202111-1759 | CVE-2021-21924 | R-SeeNet In SQL Injection vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘desc_filter’ parameter
| VAR-202111-1758 | CVE-2021-21917 | Advantech R-SeeNet In SQL Injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at '‘ord’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Advantech R-SeeNet for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202111-1757 | CVE-2021-21916 | Advantech R-SeeNet In SQL Injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at 'description_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Advantech R-SeeNet for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202111-1752 | CVE-2021-21919 | R-SeeNet In SQL Injection vulnerability |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ord’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack
| VAR-202111-1756 | CVE-2021-21915 | Advantech R-SeeNet In SQL Injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Advantech R-SeeNet for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202111-1751 | CVE-2021-21918 | R-SeeNet In SQL Injection vulnerability |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘name_filter’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack