VARIoT IoT vulnerabilities database

VAR-202106-1320 | CVE-2021-31663 | RIOT-OS Buffer Overflow Vulnerability in Linux |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
RIOT-OS 2021.01 before commit bc59d60be60dfc0a05def57d74985371e4f22d79 contains a buffer overflow which could allow attackers to obtain sensitive information. RIOT RIOT-OS is a set of operating systems used in the field of Internet of Things
VAR-202106-1321 | CVE-2021-31664 | RIOT-OS Buffer Overflow Vulnerability in Linux |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information. RIOT RIOT-OS is a set of operating systems used in the field of Internet of Things
VAR-202106-2170 | No CVE | Ruijie Networks EG2000CE has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Ruijie Networks is a provider of ICT infrastructure and industry solutions. Its main business is the research and development, design and sales of network equipment, network security products and cloud desktop solutions.
Ruijie Networks EG2000CE has a weak password vulnerability. The attacker uses the default weak password to log in to the background to obtain sensitive information.
VAR-202106-2180 | No CVE | Arbitrary file reading vulnerability exists in GlassFish |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
GlassFish is a robust commercial compatible application server.
GlassFish has an arbitrary file reading vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-1668 | CVE-2021-32424 | TrendNet TW100-S4W1CA cross-site request forgery vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
In TrendNet TW100-S4W1CA 2.3.32, due to a lack of proper session controls, a threat actor could make unauthorized changes to an affected router via a specially crafted web page. If an authenticated user were to interact with a malicious web page it could allow for a complete takeover of the router. TrendNet TW100-S4W1CA Contains a cross-site request forgery vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. TrendNet TW100-S4W1CA is a four-port broadband router.
TrendNet TW100-S4W1CA version 2.3.32 has a cross-site request forgery vulnerability. The vulnerability stems from the lack of proper session control
VAR-202106-1669 | CVE-2021-32426 | TrendNet TW100-S4W1CA cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
In TrendNet TW100-S4W1CA 2.3.32, it is possible to inject arbitrary JavaScript into the router's web interface via the "echo" command. TrendNet TW100-S4W1CA Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. TrendNet TW100-S4W1CA is a four-port broadband router.
TrendNet TW100-S4W1CA version 2.3.32 has a cross-site scripting vulnerability
VAR-202106-2166 | No CVE | H3C ER3100 VPN router has a binary vulnerability |
CVSS V2: 8.3 CVSS V3: - Severity: HIGH |
H3C ER3100 is a high-performance VPN router, mainly positioned in the SMB market of Ethernet/optical/ADSL access and network environments such as government, corporate institutions, and Internet cafes.
The H3C ER3100 VPN router has a binary vulnerability, which can be exploited by an attacker to gain control of the server.
VAR-202106-1226 | CVE-2021-34811 | Synology Download Station Server-side Request Forgery Vulnerability |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
Server-Side Request Forgery (SSRF) vulnerability in task management component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to access intranet resources via unspecified vectors. Synology Download Station Contains a server-side request forgery vulnerability.Information may be obtained. Synology Download Station is a browser extension. You can browse the downloading and downloaded tasks of the download center package without visiting the web version of Synology, and you can also add tasks
VAR-202106-1225 | CVE-2021-34810 | Synology Download Station Vulnerability in privilege management |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Improper privilege management vulnerability in cgi component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to execute arbitrary code via unspecified vectors. Synology Download Station Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Synology Download Station is a browser extension. You can browse the downloading and downloaded tasks of the download center package without visiting the web version of Synology, and you can also add tasks. Versions earlier than Synology Download Station 3.8.16-3566 have a security vulnerability
VAR-202106-1223 | CVE-2021-34808 | Synology Media Server Server-side Request Forgery Vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Server-Side Request Forgery (SSRF) vulnerability in cgi component in Synology Media Server before 1.8.3-2881 allows remote attackers to access intranet resources via unspecified vectors. Synology Media Server is a media server. Synology Media Server versions prior to 1.8.3-2881 have a code problem vulnerability. The vulnerability stems from the Server-Server Request Forgery (SSRF) vulnerability of the cgi component
VAR-202106-1224 | CVE-2021-34809 | Synology Download Station Command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Improper neutralization of special elements used in a command ('Command Injection') vulnerability in task management component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to execute arbitrary code via unspecified vectors. Synology Download Station Contains a command injection vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Synology Download Station is a browser extension. You can browse the downloading and downloaded tasks of the download center package without visiting the web version of Synology, and you can also add tasks
VAR-202106-0899 | CVE-2021-0143 | Intel(R) Brand Verification Tool Inappropriate Default Permission Vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper permissions in the installer for the Intel(R) Brand Verification Tool before version 11.0.0.1225 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) Brand Verification Tool Is vulnerable to incorrect default permissions.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Brand Verification Tool (BVT) is a tool used by Intel Corporation to test vPro and generate reports. After the test is passed, the customer can obtain the qualification to stick the vPro Logo by submitting the report
VAR-202106-2187 | No CVE | D-Link DI-7300G and DI-7200G have weak password vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
DI-7300G and DI-7200G are both D-Link router products.
D-Link DI-7300G and DI-7200G have a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2296 | No CVE | Unauthorized access vulnerabilities exist in many Dell printer products |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
MFP S2815dn, etc. are all Dell color laser printers.
Many Dell printer products have unauthorized access vulnerabilities, which can be exploited by attackers to obtain sensitive information.
VAR-202106-1772 | CVE-2021-34202 | D-Link AC2600 Out-of-bounds Vulnerability in Microsoft |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640) 1.01B04. Ordinary permissions can be elevated to administrator permissions, resulting in local arbitrary code execution. An attacker can combine other vulnerabilities to further achieve the purpose of remote code execution. D-Link AC2600(DIR-2640) Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. D-Link AC2600 is a wireless device produced by D-Link in Taiwan.
D-Link AC2600 has security vulnerabilities
VAR-202106-2184 | No CVE | Belkin EA6900 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
EA6900 is a router product of Belkin Company.
Belkin's EA6900 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
VAR-202106-2178 | No CVE | Belkin EA6100 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
EA6100 is a router product of Belkin Company.
Belkin's EA6100 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
VAR-202106-2186 | No CVE | TP-LINK TL-ER8820T has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
TL-ER8820T is a new generation of high-performance 10-Gigabit enterprise router launched by TP-LINK.
TP-LINK TL-ER8820T has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2185 | No CVE | Belkin EA9200 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
EA9200 is a router product of Belkin Company.
Belkin's EA9200 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
VAR-202106-0267 | CVE-2020-25753 | Enphase Envoy Vulnerabilities in devices |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml. Enphase Envoy An unspecified vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Enphase Energy Envoy is a gateway device used to connect smart home devices from Enphase Energy in the United States.
Enphase Energy Envoy has security vulnerabilities. No detailed vulnerability details are currently provided