VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202105-1672 No CVE Multiple Huawei products have weak password vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Secoway USG2160BSR is a firewall of Huawei Technologies Co., Ltd., Huawei SRG3230 is a gateway, and Huawei SRG1220 is a router of Huawei Technologies Co., Ltd. Many Huawei products have weak password vulnerabilities, which can be exploited by attackers to obtain sensitive information.
VAR-202105-1673 No CVE Many products of New H3C Technology Co., Ltd. have weak password vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
ER5100 is a high-performance gigabit downstream router. ER5200G2 is a new generation of enterprise-class gigabit high-performance router. GR5200 is a new generation of high-performance enterprise-class routers. Many products of New H3C Technology Co., Ltd. have weak password vulnerabilities, which can be exploited by attackers to obtain sensitive information.
VAR-202105-1674 No CVE HUAWEI SRG1220w has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
SRG1220w is a router. HUAWEI SRG1220w has a weak password vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202105-1675 No CVE HUAWEI SRG2210 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
SRG2210 is a router. HUAWEI SRG2210 has a weak password vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202105-1677 No CVE H3C ER6300 router has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
ER6300 is a high-performance all-gigabit dedicated router for Internet cafes launched by H3C. The H3C ER6300 router has a weak password vulnerability. Attackers can use this vulnerability to log in to the router background to obtain sensitive information.
VAR-202105-1127 CVE-2021-31756 Tenda AC11  Out-of-bounds write vulnerability in device CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copied to the stack variable. Tenda AC11 The device contains an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Tenda AC11 is an AC1200 dual-band Gigabit WiFi router
VAR-202105-1126 CVE-2021-31755 Tenda AC11  Out-of-bounds write vulnerability in device CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request. Tenda AC11 The device contains an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Tenda AC11 is an AC1200 dual-band Gigabit WiFi router
VAR-202105-1128 CVE-2021-31757 Tenda AC11  Out-of-bounds write vulnerability in device CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request. Tenda AC11 The device contains an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Tenda AC11 is an AC1200 dual-band Gigabit WiFi router
VAR-202105-1129 CVE-2021-31758 Tenda AC11  Out-of-bounds write vulnerability in device CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request. Tenda AC11 The device contains an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Tenda AC11 is an AC1200 dual-band Gigabit WiFi router
VAR-202105-1614 No CVE New H3C Technology Co., Ltd. WX3520H has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
WX3520H is an enterprise-level operating wireless controller. New H3C Technology Co., Ltd. WX3520H has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202105-1615 No CVE New H3C Technology Co., Ltd. WX2540H has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
WX2540H is a wireless controller. New H3C Technology Co., Ltd. WX2540H has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202105-1670 No CVE Many H3C MSR series routers have weak password vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The MSR series router is an enterprise-level router of Xinhua Three Technology Co., Ltd. Many H3C MSR series routers have weak password vulnerabilities, which can be exploited by attackers to obtain sensitive information.
VAR-202105-1676 No CVE Multiple wireless controller products of New H3C Technology Co., Ltd. have weak password vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
H3C WX3510H, H3C WX2510H, H3C WX3508H, H3C WX3540H are wireless controllers of H3C Technology Co., Ltd. Several wireless controller products of New H3C Technology Co., Ltd. have weak password vulnerabilities, which can be exploited by attackers to obtain sensitive information.
VAR-202105-1678 No CVE Prolink Technology Co., Ltd. TL-WR841HP has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
TL-WR841HP is a 300Mbps, high-power wireless router. Universal Technology Co., Ltd. TL-WR841HP has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202105-1679 No CVE Prolink Technology Co., Ltd. TL-WR940N has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
TL-WR940N is a wireless router. The TL-WR940N of Universal Technology Co., Ltd. has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202105-1680 No CVE New H3C Technology Co., Ltd. WX2560H has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
WX2560H is a gateway wireless controller independently developed by New H3C Technology Co., Ltd. New H3C Technology Co., Ltd. WX2560H has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202105-1682 No CVE H3C Beckham router has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The H3C Xiaobei router is an enterprise-level router dedicated to shops. The H3C Beckham router has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202105-1683 No CVE H3C WAC380-30 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
H3C WAC380-30 is a gateway wireless controller independently developed by New H3C Technology Co., Ltd. H3C WAC380-30 has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202105-1700 No CVE RG-UAC Ruijie's unified online behavior management and audit system has logic flaws and loopholes CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Ruijie Networks Co., Ltd. is a company that uses new technologies such as cloud computing, SDN, mobile internet, big data, and the Internet of Things to provide end-to-end solutions for users in various industries. RG-UAC Ruijie's unified online behavior management and audit system has a logic flaw vulnerability. Attackers can use this vulnerability to modify the administrator password.
VAR-202105-1346 CVE-2021-32030 ASUS GT-AC2900  Authentication vulnerabilities in devices CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 and Lyra Mini before 3.0.0.4_384_46630 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. Note: All versions of Lyra Mini and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability, Consumers can mitigate this vulnerability by disabling the remote access features from WAN. ASUS GT-AC2900 There is an authentication vulnerability in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The ASUS GT-AC2900 is a router from the Chinese company ASUS (ASUS)