VARIoT IoT vulnerabilities database

VAR-202106-2022 | No CVE | D-Link DIR-809 has a denial of service vulnerability (CNVD-2021-37559) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
D-Link DIR-809 is a wireless router using RTOS.
D-Link DIR-809 has a denial of service vulnerability. An attacker can use this vulnerability to cause a denial of service.
VAR-202106-2311 | No CVE | FC-Series has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
FLIR Systems, Inc. focuses on the design, development, production, marketing and promotion of professional technologies for enhancing situational awareness. Through thermal imaging, visible light imaging, video analysis, measurement and diagnosis, and advanced threat detection systems, we bring innovative sensing solutions into daily life.
FC-Series has a weak password vulnerability. The attacker uses the default weak password to log in to the background to obtain sensitive information.
VAR-202106-2304 | No CVE | FC-Series has weak password vulnerability (CNVD-2021-37545) |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
FLIR Systems, Inc. focuses on the design, development, production, marketing and promotion of professional technologies for enhancing situational awareness. Through thermal imaging, visible light imaging, video analysis, measurement and diagnosis, and advanced threat detection systems, we bring innovative sensing solutions into daily life.
FC-Series has a weak password vulnerability. The attacker uses the default weak password to log in to the background to obtain sensitive information.
VAR-202106-2021 | No CVE | D-Link DIR-809 has a denial of service vulnerability (CNVD-2021-37564) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
D-Link DIR-809 is a wireless router using RTOS.
D-Link DIR-809 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202106-2312 | No CVE | FB-Series has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
FLIR Systems, Inc. focuses on the design, development, production, marketing and promotion of professional technologies for enhancing situational awareness. Through thermal imaging, visible light imaging, video analysis, measurement and diagnosis, and advanced threat detection systems, we bring innovative sensing solutions into daily life.
FB-Series has weak password vulnerability. The attacker uses the default weak password to log in to the background to obtain sensitive information.
VAR-202106-2020 | No CVE | Enterprise-level flow control cloud routers have logic flaws and vulnerabilities |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Chengdu Zhifeng Technology Co., Ltd. was established in October 2016. It is an emerging high-tech company integrating R&D, production and sales.
The enterprise-level flow control cloud router has a logic flaw vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2023 | No CVE | D-Link DIR-809 has a denial of service vulnerability (CNVD-2021-37558) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
D-Link DIR-809 is a wireless router using RTOS.
D-Link DIR-809 has a denial of service vulnerability. An attacker can use this vulnerability to cause a denial of service.
VAR-202106-2013 | No CVE | D-Link DIR-809 has a binary vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
D-Link DIR-809 is a wireless router using RTOS.
D-Link DIR-809 has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-2334 | No CVE | Tiandi Weiye Technology Co., Ltd. RAID management system has logic flaws and vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Tiandi Weiye is the world's leading provider of smart security solutions. Based on artificial intelligence, big data, cloud computing, Internet of Things and other technologies, it provides smart video products and systems for public security, politics and law, transportation, finance, education, water conservancy, environmental protection and other industries. Solutions and high-quality technical services.
The RAID management system of Tiandi Weiye Technology Co., Ltd. has a logic flaw vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2024 | No CVE | D-Link DIR-809 has a denial of service vulnerability (CNVD-2021-37560) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
D-Link DIR-809 is a wireless router using RTOS.
D-Link DIR-809 has a denial of service vulnerability. An attacker can use this leak to cause a denial of service.
VAR-202106-2030 | No CVE | D-Link DIR-809 has a binary vulnerability (CNVD-2021-36484) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
D-Link DIR-809 is a wireless router using RTOS.
D-Link DIR-809 has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-2031 | No CVE | D-Link DIR-809 has a binary vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
D-Link DIR-809 is a wireless router using RTOS.
D-Link DIR-809 has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-2028 | No CVE | D-Link DIR-809 has a binary vulnerability (CNVD-2021-36486) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
D-Link DIR-809 is a wireless router using RTOS.
D-Link DIR-809 has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-2027 | No CVE | D-Link DIR-809 has a binary vulnerability (CNVD-2021-36485) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
D-Link DIR-809 is a wireless router using RTOS.
D-Link DIR-809 has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-2026 | No CVE | D-Link DIR-809 has a binary vulnerability (CNVD-2021-36483) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
D-Link DIR-809 is a wireless router using RTOS.
D-Link DIR-809 has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-2029 | No CVE | D-Link DIR-809 has a binary vulnerability (CNVD-2021-36487) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
D-Link DIR-809 is a wireless router using RTOS.
D-Link DIR-809 has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-2025 | No CVE | Shenzhen Xunjie Communication Technology Co., Ltd. FAST 300M has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
FAST 300M is a wireless broadband router.
Shenzhen Xunjie Communication Technology Co., Ltd. FAST 300M has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2131 | No CVE | NETGEAR WGR614v7 has an information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
WGR614v7 is a wireless router device.
NETGEAR WGR614v7 has an information disclosure vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-1219 | CVE-2021-33535 | plural Weidmueller Industrial WLAN Device string formatting vulnerabilities |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
In Weidmueller Industrial WLAN devices in multiple versions an exploitable format string vulnerability exists in the iw_console conio_writestr functionality. A specially crafted time server entry can cause an overflow of the time server buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability. Weidmueller Industrial WLAN devices is an industrial control WIAN of Weidmueller company in Germany. Attackers can use this vulnerability to cause remote code execution
VAR-202106-1217 | CVE-2021-33533 | plural Weidmueller Industrial WLAN In the device OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability. Weidmueller Industrial WLAN devices is an industrial control WIAN of Weidmueller company in Germany