VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202107-1707 No CVE Visual Tools DVR has an unauthorized command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Visual Tools is a brand of AX Solutions. AX Solutions is a company with high-tech features and unique video solutions. It is well-known for its innovative capabilities, product quality and service mission. Visual Tools DVR has an unauthorized command execution vulnerability. Attackers can use this vulnerability to escalate apache privileges to root. Combined with the vulnerability, they can execute arbitrary commands on the target device with root privileges.
VAR-202107-0077 CVE-2020-20211 Mikrotik RouterOs  Reachable assertion vulnerabilities in CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Mikrotik RouterOs 6.44.5 (long-term tree) suffers from an assertion failure vulnerability in the /nova/bin/console process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet. Mikrotik RouterOs Exists in a reachable assertion vulnerability.Denial of service (DoS) It may be put into a state. MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality. Re: Two vulnerabilities found in MikroTik's RouterOS
VAR-202107-0085 CVE-2020-20225 Mikrotik RouterOs  Reachable assertion vulnerabilities in CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Mikrotik RouterOs before 6.47 (stable tree) suffers from an assertion failure vulnerability in the /nova/bin/user process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet. Mikrotik RouterOs Exists in a reachable assertion vulnerability.Denial of service (DoS) It may be put into a state. MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality. Re: Two vulnerabilities found in MikroTik's RouterOS
VAR-202107-0080 CVE-2020-20215 Mikrotik RouterOs  Buffer Error Vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/diskd process. An authenticated remote attacker can cause a Denial of Service due to invalid memory access. Mikrotik RouterOs Is vulnerable to a buffer error.Denial of service (DoS) It may be put into a state. MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality. There is a buffer error vulnerability in Mikrotik RouterOs. The following products and versions are affected: Mikrotik RouterOs prior to 6.44.6. Re: Three vulnerabilities found in MikroTik's RouterOS
VAR-202107-0079 CVE-2020-20213 Mikrotik RouterOs  Resource Depletion Vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Mikrotik RouterOs 6.44.5 (long-term tree) suffers from an stack exhaustion vulnerability in the /nova/bin/net process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU. Mikrotik RouterOs Is vulnerable to a resource exhaustion.Denial of service (DoS) It may be put into a state. MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality. Re: Three vulnerabilities found in MikroTik's RouterOS
VAR-202107-0081 CVE-2020-20216 Mikrotik RouterOs  In  NULL  Pointer dereference vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/graphing process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference). MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality. Re: Three vulnerabilities found in MikroTik's RouterOS
VAR-202107-0078 CVE-2020-20212 Mikrotik RouterOs  In  NULL  Pointer dereference vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Mikrotik RouterOs 6.44.5 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/console process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference). MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality. Re: Two vulnerabilities found in MikroTik's RouterOS
VAR-202107-1792 No CVE Phicomm router K1 version has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shanghai Phicomm Data Communication Technology Co., Ltd. is a technologically innovative enterprise that provides users with smart products and cloud services in the field of smart homes. Phicomm router K1 version has weak password vulnerability. Attackers can use this vulnerability to log in to the background to obtain sensitive information.
VAR-202107-1794 No CVE KGuard DVR has unauthorized access vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Yingying Information actively creates a smart road monitoring integration platform, and has been earnestly operating its own brand KGuard for many years. Its main products include home security combokits for digital surveillance video recorders (Home Security ComboKit), etc. KGuard DVR has an unauthorized access vulnerability. Attackers can use this vulnerability to obtain sensitive information and provide arbitrary command execution.
VAR-202107-1651 CVE-2021-33020 Philips Vue PACS  Vulnerability regarding lack of encryption of critical data in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Philips Vue PACS versions 12.2.x.x and prior uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key. Philips Vue PACS There is a vulnerability in the lack of encryption of critical data.Information may be obtained
VAR-202107-1649 CVE-2021-27497 Philips Vue PACS  Vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Philips Vue PACS versions 12.2.x.x and prior does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. Philips Vue PACS Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202107-1648 CVE-2021-33018 Philips Vue PACS  Vulnerability in using cryptographic algorithms in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The use of a broken or risky cryptographic algorithm in Philips Vue PACS versions 12.2.x.x and prior is an unnecessary risk that may result in the exposure of sensitive information
VAR-202107-1647 CVE-2021-27501 Philips Vue PACS  Vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Philips Vue PACS versions 12.2.x.x and prior does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the severity of the associated vulnerabilities. Philips Vue PACS Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202107-1646 CVE-2021-27493 Philips Vue PACS  Injection vulnerability CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
Philips Vue PACS versions 12.2.x.x and prior does not ensure or incorrectly ensures structured messages or data are well formed and that certain security properties are met before being read from an upstream component or sent to a downstream component. Philips Vue PACS Is vulnerable to injection.Information may be obtained and information may be tampered with
VAR-202107-1645 CVE-2021-33022 Philips Vue PACS  Vulnerability in plaintext transmission of important information in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. Philips Vue PACS Contains a vulnerability in the transmission of important information in clear text.Information may be obtained
VAR-202107-1644 CVE-2021-33024 Philips Vue PACS  Vulnerability regarding inadequate protection of credentials in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Philips Vue PACS versions 12.2.x.x and prior transmits or stores authentication credentials, but it uses an insecure method susceptible to unauthorized interception and/or retrieval. Philips Vue PACS Exists in an inadequate protection of credentials.Information may be obtained
VAR-202107-1926 No CVE (0Day) Advantech WebAccess Node BwFreRPT Stack-based Buffer Overflow Remote Code Execution Vulnerability CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within BwFreRPT.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user.
VAR-202107-1927 No CVE (0Day) Advantech WebAccess Node BwImgExe Stack-based Buffer Overflow Remote Code Execution Vulnerability CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within BwImgExe.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user.
VAR-202107-1793 No CVE Weak Password Vulnerability in China Mobile Enterprise Gateway CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
China Mobile Enterprise Gateway is a gateway management software that can be used for wifi settings and detailed status. The China Mobile Enterprise Gateway has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202107-1683 CVE-2021-22434 plural  Huawei  Buffer error vulnerability in the product CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state