VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202108-1372 CVE-2021-39509 D-Link DIR-816 DIR-816A2_FW  Command injection vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered in D-Link DIR-816 DIR-816A2_FWv1.10CNB05_R1B011D88210 The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metacharacters. D-Link DIR-816 DIR-816A2_FW Contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-816 is a wireless router made by D-Link in Taiwan. D-Link DIR-816 has a security vulnerability, which can be exploited by attackers to execute arbitrary php code through the typename parameter
VAR-202108-1373 CVE-2021-39510 D-Link DIR816_A1_FW  Command injection vulnerability in wireless router CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered in D-Link DIR816_A1_FW101CNB04 750m11ac wireless router, The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metacharacters. D-Link DIR816_A1_FW A command injection vulnerability exists in wireless routers.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-816 is a wireless router made by D-Link in Taiwan. D-Link DIR-816_A1_FW101CNB04 750m11ac has a security vulnerability. The vulnerability is caused by a flaw in the handler function of the /goform/form2userconfig.cgi route
VAR-202109-0791 CVE-2021-23040 BIG-IP AFM  In  SQL  Injection vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
On BIG-IP AFM version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3, 14.1.x before 14.1.4.2, 13.1.x before 13.1.4.1, and all versions of 12.1.x, a SQL injection vulnerability exists in an undisclosed page of the BIG-IP Configuration utility. This issue is exposed only when BIG-IP AFM is provisioned. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP AFM for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Both F5 BIG-IP and F5 BIG-IP AFM are products of F5 Company in the United States. F5 BIG-IP is an application delivery platform that integrates functions such as network traffic management, application security management, and load balancing. F5 BIG-IP AFM is an advanced firewall product used to protect against DDos attacks. A security vulnerability exists in F5 BIG-IP and F5 BIG-IP AFM
VAR-202109-0789 CVE-2021-23038 plural  F5 Networks  Cross-site scripting vulnerability in the product CVSS V2: 3.5
CVSS V3: 9.0
Severity: CRITICAL
On version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.2, 13.1.x before 13.1.4.1, and all versions of 12.1.x, a stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks A cross-site scripting vulnerability exists in the product.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP. The vulnerability stems from the fact that attackers can trigger cross-site scripting through F5 BIG-IP's TMUI to run JavaScript code in the context of a website
VAR-202109-0788 CVE-2021-23050 plural  F5 Networks  Product vulnerabilities CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
On BIG-IP Advanced WAF and BIG-IP ASM version 16.0.x before 16.0.1.2 and 15.1.x before 15.1.3 and NGINX App Protect on all versions before 3.5.0, when a cross-site request forgery (CSRF)-enabled policy is configured on a virtual server, an undisclosed HTML response may cause the bd process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP Advanced WAF , BIG-IP ASM , NGINX App Protect Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP. The vulnerability stems from the fact that an attacker can cause a fatal error through the CSRF policy of F5 BIG-IP WAF/ASM, thereby triggering a denial of service
VAR-202109-0787 CVE-2021-23049 plural  F5 Networks  Product resource exhaustion vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
On BIG-IP version 16.0.x before 16.0.1.2 and 15.1.x before 15.1.3, when the iRules RESOLVER::summarize command is used on a virtual server, undisclosed requests can cause an increase in Traffic Management Microkernel (TMM) memory utilization resulting in an out-of-memory condition and a denial-of-service (DoS). Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product contains a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP has a security vulnerability. The vulnerability stems from the ability to modify and increase the request or response body size when using decompressors, json transcoders, grpc web, or other proprietary extensions. An attacker could exploit this vulnerability to read invalid memory and cause a crash, resulting in a denial of service
VAR-202109-0783 CVE-2021-23034 plural  F5 Networks  Vulnerability related to resource disclosure to the wrong area in the product CVSS V2: 7.1
CVSS V3: 7.5
Severity: HIGH
On BIG-IP version 16.x before 16.1.0 and 15.1.x before 15.1.3.1, when a DNS profile using a DNS cache resolver is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product contains a resource disclosure vulnerability to the wrong area.Service operation interruption (DoS) It may be in a state
VAR-202109-0782 CVE-2021-23033 BIG-IP Advanced WAF  and  BIG-IP ASM  Vulnerability in CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
On BIG-IP Advanced WAF and BIG-IP ASM version 16.x before 16.1.0x, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.3, 13.1.x before 13.1.4.1, and all versions of 12.1.x, when a WebSocket profile is configured on a virtual server, undisclosed requests can cause bd to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP Advanced WAF and BIG-IP ASM Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP. The vulnerability stems from the fact that an attacker can cause a fatal error through F5 BIG-IP's WebSocket to trigger a denial of service
VAR-202109-0779 CVE-2021-23030 BIG-IP Advanced WAF  and  BIG-IP ASM  Input verification vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
On BIG-IP Advanced WAF and BIG-IP ASM version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.3, 13.1.x before 13.1.4.1, and all versions of 12.1.x, when a WebSocket profile is configured on a virtual server, undisclosed requests can cause bd to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP Advanced WAF and BIG-IP ASM There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP. The vulnerability stems from the fact that an attacker can cause a fatal error through the WebSocket of the F5 BIG-IP WAF/ASM to trigger a denial of service
VAR-202109-0778 CVE-2021-23029 F5 Advanced Web Application Firewall  and  BIG-IP ASM  Server-side request forgery vulnerability in CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
On version 16.0.x before 16.0.1.2, insufficient permission checks may allow authenticated users with guest privileges to perform Server-Side Request Forgery (SSRF) attacks through F5 Advanced Web Application Firewall (WAF) and the BIG-IP ASM Configuration utility. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP. The vulnerability stems from the fact that attackers can bypass data access restrictions and obtain sensitive information through TMUI SSRF of F5 BIG-IP WAF/ASM
VAR-202109-0777 CVE-2021-23028 F5 Advanced Web Application Firewall  and  BIG-IP ASM  Input verification vulnerability in CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
On version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.2, and 13.1.x before 13.1.4, when JSON content profiles are configured for URLs as part of an F5 Advanced Web Application Firewall (WAF)/BIG-IP ASM security policy and applied to a virtual server, undisclosed requests may cause the BIG-IP ASM bd process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP. The vulnerability stems from the fact that an attacker can cause a fatal error through the JSON content configuration file of F5 BIG-IP WAF/ASM to trigger a denial of service
VAR-202109-0776 CVE-2021-23027 plural  BIG-IP  Cross-site scripting vulnerability in the product CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
On version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3.1, and 14.1.x before 14.1.4.3, a DOM based cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural BIG-IP A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP. The vulnerability stems from the fact that attackers can trigger cross-site scripting through F5 BIG-IP's TMUI to run JavaScript code in the context of a website
VAR-202109-0774 CVE-2021-23053 BIG-IP Advanced WAF  and  BIG-IP ASM  Resource exhaustion vulnerability in CVSS V2: 4.3
CVSS V3: 5.3
Severity: MEDIUM
On version 15.1.x before 15.1.3, 14.1.x before 14.1.3.1, and 13.1.x before 13.1.3.6, when the brute force protection feature of BIG-IP Advanced WAF or BIG-IP ASM is enabled on a virtual server and the virtual server is under brute force attack, the MySQL database may run out of disk space due to lack of row limit on undisclosed tables in the MYSQL database. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP Advanced WAF and BIG-IP ASM Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP. The vulnerability stems from the fact that attackers can use the Brute Force of F5 BIG-IP WAF/ASM to fill the database and cause fatal errors to trigger denial of service
VAR-202109-0772 CVE-2021-23051 plural  F5 Networks  Product vulnerabilities CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
On BIG-IP versions 15.1.0.4 through 15.1.3, when the Data Plane Development Kit (DPDK)/Elastic Network Adapter (ENA) driver is used with BIG-IP on Amazon Web Services (AWS) systems, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. This is due to an incomplete fix for CVE-2020-5862. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product contains unspecified vulnerabilities. This vulnerability is CVE-2020-5862 This is a vulnerability caused by an incomplete fix for.Service operation interruption (DoS) It may be in a state
VAR-202109-0534 CVE-2021-23036 BIG-IP ASM  and  DataSafe  Input validation vulnerability in profiles CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
On version 16.0.x before 16.0.1.2, when a BIG-IP ASM and DataSafe profile are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP ASM and DataSafe Profiles contain an input validation vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP. The vulnerability stems from the fact that an attacker can cause a fatal error through F5 BIG-IP's TMM virtual server configuration file to trigger a denial of service
VAR-202109-0535 CVE-2021-23037 plural  F5 Networks  Cross-site scripting vulnerability in the product CVSS V2: 4.3
CVSS V3: 9.6
Severity: CRITICAL
On all versions of 16.1.x, 16.0.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x, a reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks A cross-site scripting vulnerability exists in the product.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP
VAR-202109-0533 CVE-2021-23035 plural  F5 Networks  Product vulnerabilities CVSS V2: 7.1
CVSS V3: 7.5
Severity: HIGH
On BIG-IP 14.1.x before 14.1.4.4, when an HTTP profile is configured on a virtual server, after a specific sequence of packets, chunked responses can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks There are unspecified vulnerabilities in the product.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP. The vulnerability stems from the fact that an attacker can cause a fatal error through F5 BIG-IP's HTTP configuration file chunked response to trigger a denial of service
VAR-202109-0532 CVE-2021-23026 BIG-IP  and  BIG-IQ  Cross-site request forgery vulnerability in CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
BIG-IP version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3, 14.1.x before 14.1.4.2, 13.1.x before 13.1.4.1, and all versions of 12.1.x and 11.6.x and all versions of BIG-IQ 8.x, 7.x, and 6.x are vulnerable to cross-site request forgery (CSRF) attacks through iControl SOAP. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP and BIG-IQ Contains a cross-site request forgery vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP. The vulnerability stems from the fact that an attacker can trigger a cross-site request forgery through F5 BIG-IP's iControl SOAP, forcing the victim to perform an action
VAR-202109-0531 CVE-2021-23043 plural  F5 Networks  Past traversal vulnerabilities in products CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
On BIG-IP, on all versions of 16.1.x, 16.0.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x, a directory traversal vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to access arbitrary files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product contains a path traversal vulnerability.Information may be obtained. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in F5 BIG-IP due to a vulnerability in the product's HTTP configuration file chunking responses. An attacker could exploit this vulnerability to cause a denial of service
VAR-202109-0530 CVE-2021-23042 plural  F5 Networks  Product resource exhaustion vulnerability CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
On BIG-IP version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3, 14.1.x before 14.1.4, 13.1.x before 13.1.4, and 12.1.x before 12.1.6, when an HTTP profile is configured on a virtual server, undisclosed requests can cause a significant increase in system resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product contains a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP. The vulnerability stems from the fact that an attacker can trigger an overload through F5 BIG-IP's HTTP configuration file to trigger a denial of service