VARIoT IoT vulnerabilities database

VAR-202106-0711 | CVE-2021-21559 | Dell EMC NetWorker Vulnerability in Certificate Verification |
CVSS V2: 2.9 CVSS V3: 5.3 Severity: MEDIUM |
Dell EMC NetWorker, versions 18.x, 19.1.x, 19.2.x 19.3.x, 19.4, and 19.4.0.1 contain an Improper Certificate Validation vulnerability in the client (NetWorker Management Console) components which uses SSL encrypted connection in order to communicate with the application server. An unauthenticated attacker in the same network collision domain as the NetWorker Management Console client could potentially exploit this vulnerability to perform man-in-the-middle attacks to intercept and tamper the traffic between the client and the application server. Dell EMC NetWorker Contains a certificate validation vulnerability.Information may be tampered with. The software provides backup and recovery, deduplication, backup reporting, and more
VAR-202106-0710 | CVE-2021-21558 | Dell EMC NetWorker Vulnerability related to information disclosure from log files |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
Dell EMC NetWorker, 18.x, 19.1.x, 19.2.x 19.3.x, 19.4 and 19.4.0.1, contains an Information Disclosure vulnerability. A local administrator of the gstd system may potentially exploit this vulnerability to read LDAP credentials from local logs and use the stolen credentials to make changes to the network domain. The software provides backup and recovery, deduplication, backup reporting, and more
VAR-202105-1605 | No CVE | Fiberhome FR2600-420 router has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Fiberhome FR2600-420 is a router from Fiberhome Communication Technology Co., Ltd.
Fiberhome FR2600-420 router has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202105-1701 | No CVE | An SQL injection vulnerability exists in the business control system of Taiyuan Easysoft Technology Co., Ltd. |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Taiyuan Yisi Software Technology Co., Ltd. is an Internet software development and system integration enterprise that relies on Internet information and Internet of Things technology to provide enterprises with complete smart factory solutions.
An SQL injection vulnerability exists in the business management and control system of Taiyuan Yisi Software Technology Co., Ltd., which can be exploited by attackers to obtain sensitive information in the database.
VAR-202105-1603 | No CVE | Tenda enterprise-level AP management router has a command execution vulnerability (CNVD-2021-30044) |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
Shenzhen Jixiang Tengda Technology Co., Ltd. (hereinafter referred to as "Tengda") was founded in 1999. It is a professional supplier of network communication equipment and solutions, as well as a high-tech enterprise integrating R&D, production, supply, sales and service.
Tenda enterprise-level AP management routers have command execution vulnerabilities. An attacker can use this vulnerability to gain server permissions.
VAR-202105-1602 | No CVE | Tenda enterprise-level AP management router has a command execution vulnerability (CNVD-2021-26174) |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
Shenzhen Jixiang Tengda Technology Co., Ltd. (hereinafter referred to as "Tengda") was founded in 1999. It is a professional supplier of network communication equipment and solutions, as well as a high-tech enterprise integrating R&D, production, supply, sales and service.
Tenda enterprise-level AP management routers have command execution vulnerabilities. An attacker can use this vulnerability to gain server permissions.
VAR-202105-1606 | No CVE | Chengdu Feiyuxing Technology Co., Ltd. Feiyuxing home smart router has logic flaws and vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Chengdu Feiyuxing Technology Co., Ltd. specializes in serving corporate, commercial and home users, providing intelligent and easy-to-use network communication management equipment and innovative technology value-added services. The company's existing IoT cloud, smart power box, smart power controller, Security monitoring switches, Nebulas platforms, full-scenario wireless solutions, public security audit solutions, smart home solutions and other products and solutions.
Chengdu Feiyuxing Technology Co., Ltd. Feiyuxing home intelligent router has logic flaws and loopholes. Attackers can use vulnerabilities to bypass login and obtain sensitive information.
VAR-202105-1604 | No CVE | Tenda enterprise-level AP management router has command execution vulnerabilities |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
Shenzhen Jixiang Tengda Technology Co., Ltd. (hereinafter referred to as "Tengda") was founded in 1999. It is a professional supplier of network communication equipment and solutions, as well as a high-tech enterprise integrating R&D, production, supply, sales and service.
Tenda enterprise-level AP management routers have command execution vulnerabilities. An attacker can use this vulnerability to gain server permissions.
VAR-202105-0076 | CVE-2020-17891 | TP-Link Archer C1200 Cross-site scripting vulnerability in firmware |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
TP-Link Archer C1200 firmware version 1.13 Build 2018/01/24 rel.52299 EU has a XSS vulnerability allowing a remote attacker to execute arbitrary code. TP-Link Archer C1200 A cross-site scripting vulnerability exists in the firmware.Information may be obtained and information may be tampered with. TP-Link Archer C1200 is a wireless dual-band Gigabit router
VAR-202105-1351 | CVE-2021-32054 | Firely/Incendi Spark Incorrectly resolved name and reference usage vulnerabilities in |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Firely/Incendi Spark before 1.5.5-r4 lacks Content-Disposition headers in certain situations, which may cause crafted files to be delivered to clients such that they are rendered directly in a victim's web browser. Firely/Incendi Spark There is a vulnerability in the use of incorrectly resolved names and references.Information may be obtained and information may be tampered with. Spark is a public domain FHIR server developed using C#.
Firely/Incendi Spark versions prior to 1.5.5-r4 have security vulnerabilities. Render directly in the browser. No detailed vulnerability details are currently provided
VAR-202105-0918 | CVE-2021-24195 | WordPress for Login as User or Customer Authorization vulnerabilities in plugins |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Low privileged users can use the AJAX action 'cp_plugins_do_button_job_later_callback' in the Login as User or Customer (User Switching) WordPress plugin before 1.8, to install any plugin (including a specific version) from the WordPress repository, as well as activate arbitrary plugin from then blog, which helps attackers install vulnerable plugins and could lead to more critical vulnerabilities like RCE. WordPress for Login as User or Customer (User Switching) The plugin contains an authorization vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. WordPress is a blogging platform developed by the Wordpress Foundation using PHP language. The platform supports setting up personal blog sites on PHP and MySQL servers. A WordPress plugin is an open source application plugin for WordPress
VAR-202105-0529 | CVE-2021-20994 | WAGO Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management. plural WAGO The product contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. WAGO is a 750-88x series programmable logic controller from WAGO. The device is a digital operation electronic system designed specifically for applications in an industrial environment.
WAGO has a cross-site scripting vulnerability. The vulnerability stems from the lack of correct verification of client data in WEB applications
VAR-202105-0533 | CVE-2021-20998 | plural WAGO Vulnerability in lack of authentication for critical features in the product |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
In multiple managed switches by WAGO in different versions without authorization and with specially crafted packets it is possible to create users. plural WAGO The product is vulnerable to a lack of authentication for critical features.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202105-0532 | CVE-2021-20997 | plural WAGO Inadequate protection of credentials in products |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In multiple managed switches by WAGO in different versions it is possible to read out the password hashes of all Web-based Management users. plural WAGO The product contains a vulnerability related to insufficient protection of credentials.Information may be obtained
VAR-202105-0531 | CVE-2021-20996 | plural WAGO Vulnerability in improper permission assignment for critical resources in the product |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
In multiple managed switches by WAGO in different versions special crafted requests can lead to cookies being transferred to third parties. plural WAGO The product contains a vulnerability in improper permission assignment for critical resources.Information may be obtained
VAR-202105-0530 | CVE-2021-20995 | plural WAGO Vulnerability in plaintext storage of important information in products |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In multiple managed switches by WAGO in different versions the webserver cookies of the web based UI contain user credentials. plural WAGO The product contains a vulnerability in the plaintext storage of important information.Information may be obtained
VAR-202105-0528 | CVE-2021-20993 | plural WAGO Information leakage vulnerabilities in products |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
In multiple managed switches by WAGO in different versions the activated directory listing provides an attacker with the index of the resources located inside the directory. plural WAGO The product contains a vulnerability related to information leakage.Information may be obtained
VAR-202105-1608 | No CVE | Huawei Technologies Co., Ltd. SRG3200 has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The SRG3200 router is a high-performance enterprise-class router launched by Huawei Technologies Co., Ltd.
Huawei Technologies Co., Ltd. SRG3200 has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202105-1607 | No CVE | Linksys E1000 router has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
LINKSYS E1000 is a router product.
The Linksys E1000 router has a denial of service vulnerability, which can be exploited by attackers to cause the service program to crash.
VAR-202111-0885 | CVE-2021-22356 | plural Huawei Vulnerabilities in the use of cryptographic algorithms in products |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
There is a weak secure algorithm vulnerability in Huawei products. A weak secure algorithm is used in a module. Attackers can exploit this vulnerability by capturing and analyzing the messages between devices to obtain information. This can lead to information leak.Affected product versions include: IPS Module V500R005C00SPC100, V500R005C00SPC200; NGFW Module V500R005C00SPC100, V500R005C00SPC200; Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; USG9500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200. plural Huawei The product contains vulnerabilities in the use of cryptographic algorithms.Information may be obtained