VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202106-2131 No CVE NETGEAR WGR614v7 has an information disclosure vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
WGR614v7 is a wireless router device. NETGEAR WGR614v7 has an information disclosure vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2029 No CVE D-Link DIR-809 has a binary vulnerability (CNVD-2021-36487) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
D-Link DIR-809 is a wireless router using RTOS. D-Link DIR-809 has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-2025 No CVE Shenzhen Xunjie Communication Technology Co., Ltd. FAST 300M has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
FAST 300M is a wireless broadband router. Shenzhen Xunjie Communication Technology Co., Ltd. FAST 300M has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2026 No CVE D-Link DIR-809 has a binary vulnerability (CNVD-2021-36483) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
D-Link DIR-809 is a wireless router using RTOS. D-Link DIR-809 has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-2031 No CVE D-Link DIR-809 has a binary vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
D-Link DIR-809 is a wireless router using RTOS. D-Link DIR-809 has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-2028 No CVE D-Link DIR-809 has a binary vulnerability (CNVD-2021-36486) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
D-Link DIR-809 is a wireless router using RTOS. D-Link DIR-809 has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-2027 No CVE D-Link DIR-809 has a binary vulnerability (CNVD-2021-36485) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
D-Link DIR-809 is a wireless router using RTOS. D-Link DIR-809 has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-2030 No CVE D-Link DIR-809 has a binary vulnerability (CNVD-2021-36484) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
D-Link DIR-809 is a wireless router using RTOS. D-Link DIR-809 has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-1208 CVE-2021-33539 plural  Weidmueller Industrial WLAN  Authentication vulnerability in device CVSS V2: 6.5
CVSS V3: 7.2
Severity: HIGH
In Weidmueller Industrial WLAN devices in multiple versions an exploitable authentication bypass vulnerability exists in the hostname processing. A specially configured device hostname can cause the device to interpret selected remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability. plural Weidmueller Industrial WLAN There is an authentication vulnerability in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Weidmueller Industrial WLAN devices is an industrial control WIAN of Weidmueller company in Germany. Attackers can use this vulnerability to bypass Web authentication
VAR-202106-2310 No CVE Unauthorized access vulnerability exists in Axis P1354 Network Camera CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Axis is an IT company that specializes in providing network video solutions. Axis P1354 Network Camera has an unauthorized access vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202106-2127 No CVE CommScope ARRIS Touchstone Telephony Modem has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
CommScope Technology (Suzhou) Co., Ltd. is mainly engaged in research, development, manufacturing, and promotion of communication optical cables, components and raw materials, optical cables, cables, broadband access network communication system equipment and materials, etc. CommScope's ARRIS Touchstone Telephony Modem has an unauthorized access vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
VAR-202106-1218 CVE-2021-33534 plural  Weidmueller Industrial WLAN  In the device  OS  Command injection vulnerability CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability. Weidmueller Industrial WLAN devices is an industrial control WIAN of Weidmueller company in Germany
VAR-202106-2309 No CVE Unauthorized access vulnerability exists in Axis P1346 Network Camera CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Axis is an IT company that specializes in providing network video solutions. Axis P1346 Network Camera has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-1217 CVE-2021-33533 plural  Weidmueller Industrial WLAN  In the device  OS  Command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability. Weidmueller Industrial WLAN devices is an industrial control WIAN of Weidmueller company in Germany
VAR-202106-2132 No CVE Electro Industries/GaugeTech Total Web Solutions has an unauthorized access vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Electro Industries/GuageTech (abbreviated as "EIG Corporation of America") is a manufacturer of microprocessor-based digital power meters. Electro Industries/GaugeTech Total Web Solutions has an unauthorized access vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
VAR-202106-1212 CVE-2021-33528 plural  Weidmueller Industrial WLAN  Vulnerability in improper compliance with coding standards on devices CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
In Weidmueller Industrial WLAN devices in multiple versions an exploitable privilege escalation vulnerability exists in the iw_console functionality. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability. plural Weidmueller Industrial WLAN Devices contain vulnerabilities to improper compliance with coding standards.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Weidmueller Industrial WLAN devices is an industrial control WIAN of Weidmueller company in Germany
VAR-202106-1215 CVE-2021-33531 plural  Weidmueller Industrial WLAN  Vulnerability in using hard-coded credentials on devices CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
In Weidmueller Industrial WLAN devices in multiple versions an exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities. The device operating system contains an undocumented encryption password, allowing for the creation of custom diagnostic scripts. An attacker can send diagnostic scripts while authenticated as a low privilege user to trigger this vulnerability. Weidmueller Industrial WLAN devices is an industrial control WIAN of Weidmueller company in Germany. Weidmueller Industrial WLAN devices have a trust management vulnerability
VAR-202106-1206 CVE-2021-33537 plural  Weidmueller Industrial WLAN  Classic buffer overflow vulnerability in device CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability. plural Weidmueller Industrial WLAN A classic buffer overflow vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Weidmueller Industrial WLAN devices is an industrial control WIAN of Weidmueller company in Germany
VAR-202106-2133 No CVE Unauthorized access vulnerability exists in Belkin Router CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Belkin is a supplier in the aftermarket, providing power, protection, production, connectivity, audio, security and home automation solutions for a wide range of consumer electronics and corporate environments. Belkin Router has an unauthorized access vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
VAR-202106-2128 No CVE XMDNS-6800 Dynamic System has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Simer Technology is a high-tech enterprise integrating R&D, production and sales. It is an equipment manufacturer focusing on Internet management and optimization. It is also a manufacturer of smart home products and solutions, smart locks, smart DNS, and other products. XMDNS-6800 Dynamic System has a command execution vulnerability. An attacker can use this vulnerability to gain server permissions.