VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202108-2525 No CVE Shou Nei'an Information Technology (Shanghai) Co., Ltd. SPAM SQR mail security gateway has arbitrary file reading vulnerabilities CVSS V2: 2.1
CVSS V3: -
Severity: LOW
SPAM SQR mail security gateway is a new generation mail filtering system that separates spam and threat mail, and provides differentiated behavior management functions. Shou Nei An Information Technology (Shanghai) Co., Ltd. SPAM SQR mail security gateway has an arbitrary file reading vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202108-2582 No CVE Unauthorized access vulnerability exists in Janitza UMG604 CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Janitza UMG604 is a power quality analyzer. Janitza UMG604 has an unauthorized access vulnerability. Attackers can use this vulnerability to gain unauthorized access to obtain sensitive information and perform unauthorized operations.
VAR-202108-1786 CVE-2021-34433 Eclipse Californium  Digital Signature Verification Vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
In Eclipse Californium version 2.0.0 to 2.6.4 and 3.0.0-M1 to 3.0.0-M3, the certificate based (x509 and RPK) DTLS handshakes accidentally succeeds without verifying the server side's signature on the client side, if that signature is not included in the server's ServerKeyExchange. Eclipse Californium Exists in a digital signature verification vulnerability.Information may be tampered with. Eclipse Californium is a Java-based code library of the Eclipse Foundation that provides Coap back-end support for the Internet of Things. Eclipse Californium has a data forgery vulnerability. The following products and versions are affected: Eclipse Californium 2.0.0 to 2.6.4 versions, Eclipse Californium 3.0.0-M1 to 3.0.0-M3 versions
VAR-202108-1778 CVE-2021-34215 TOTOLINK A3002R  Cross-site scripting vulnerability in firmware CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting in tcpipwan.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Service Name" field. TOTOLINK A3002R Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. TOTOLINK A3002RU is an AC1200 wireless dual-band gigabit router
VAR-202108-1779 CVE-2021-34218 TOTOLINK A702R  Vulnerability in CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Directory Indexing in Login Portal of Login Portal of TOTOLINK-A702R-V1.0.0-B20161227.1023 allows attacker to access /add/ , /img/, /js/, and /mobile directories via GET Parameter. TOTOLINK A702R Exists in unspecified vulnerabilities.Information may be tampered with. TOTOLINK A702r is a router device from China TOTOLINK Company. The TOTOLINK A702r has a security vulnerability that stems from the product's login page not adding effective permission controls to directory access
VAR-202108-1780 CVE-2021-34220 TOTOLINK A3002R  Cross-site scripting vulnerability in firmware CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting in tr069config.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "User Name" field or "Password" field. TOTOLINK A3002R Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. TOTOLINK A3002RU is a wireless router product from Taiwan TOTOLINK Company
VAR-202108-1781 CVE-2021-34223 TOTOLINK A3002R  Cross-site scripting vulnerability in firmware CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting in urlfilter.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "URL Address" field. TOTOLINK A3002R Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Totolink TOTOLINK A3002RU is a wireless router product from Totolink Company in Taiwan, China. TOTOLINK A3002R V1.1.1-B20200824 has a cross-site scripting vulnerability, which is caused by the lack of proper authentication of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-202108-1777 CVE-2021-34207 TOTOLINK A3002R  Cross-site scripting vulnerability in firmware CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting in ddns.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Domain Name" field, "Server Address" field, "User Name/Email", or "Password/Key" field. TOTOLINK A3002R Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. TOTOLINK A3002RU is an AC1200 wireless dual-band gigabit router. There is a cross-site scripting vulnerability in ddns.htm in TOTOLINK A3002R 1.1.1-B20200824
VAR-202108-1782 CVE-2021-34228 TOTOLINK A3002R  Cross-site scripting vulnerability in firmware CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting in parent_control.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Description" field and "Service Name" field. TOTOLINK A3002R Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. TOTOLINK A3002RU is a wireless router product from Taiwan TOTOLINK Company. There is a cross-site scripting vulnerability in TOTOLINK A3002RU, which is caused by the lack of effective validation of client data in the function of the product to modify the Description and Service Name fields. An attacker could use this vulnerability to execute client-side code
VAR-202108-2476 No CVE Pulian Technology Co., Ltd. TP-LINK video surveillance management storage integrated machine has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
TP-LINK Technology Co., Ltd. (hereinafter referred to as "TP-LINK") is a supplier of network communication equipment. The TP-LINK Video Surveillance, Management and Storage Integrated Machine of Prolink Technology Co., Ltd. has a weak password vulnerability. Attackers use weak passwords to log in to the background to obtain sensitive information.
VAR-202108-2478 No CVE An arbitrary file download vulnerability exists in the network gateway of Hangzhou Hikvision Digital Technology Co., Ltd. CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
Hangzhou Hikvision Digital Technology Co., Ltd. is a video-centric IoT solution provider, providing comprehensive security, smart business and big data services. The network gateway of Hangzhou Hikvision Digital Technology Co., Ltd. has an arbitrary file download vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202108-2334 No CVE SINDOH P411_P416 has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
SINDOH P411_P416 is a printer. SINDOH P411_P416 has an unauthorized access vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202108-2335 No CVE SINDOH D410 has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
SINDOH D410 is a printer. SINDOH D410 has an unauthorized access vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202108-2526 No CVE Hangzhou Hikvision Digital Technology Co., Ltd. IVMS-8201E-NCG has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
IVMS-8201E-NCG is a carrier-grade networking gateway device that integrates signaling gateway services, media gateway services, security authentication, authority management, log management, and network management functions. It can realize video based on GB/T 28181-2011 networking standards Cascade and interconnection between monitoring platforms. Hangzhou Hikvision Digital Technology Co., Ltd. IVMS-8201E-NCG has a weak password vulnerability. Attackers use weak passwords to log in to the background to obtain sensitive information.
VAR-202108-2559 No CVE A SQL injection vulnerability exists in the pollution source online monitoring system of Beijing Wanwei Yingchuang Technology Development Co., Ltd. (CNVD-2021-51841) CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Beijing Wanwei Yingchuang Technology Development Co., Ltd. is committed to the R&D and application of products and technologies in the field of environmental protection Internet of Things. It is an enterprise integrating R&D, production and sales. Beijing Wanwei Yingchuang Technology Development Co., Ltd. pollution source online monitoring system has SQL injection vulnerabilities, attackers can use vulnerabilities to obtain database sensitive information.
VAR-202109-0588 CVE-2021-32959 AVEVA  Made  SuiteLink Server  Multiple vulnerabilities in CVSS V2: 7.5
CVSS V3: 7.5
Severity: High
Heap-based buffer overflow in SuiteLink server while processing commands 0x05/0x06. AVEVA Provided by the company SuiteLink Server The following multiple vulnerabilities exist in. * Heap-based buffer overflow (CWE-122) - CVE-2021-32959 ‥ * NULL Pointer reference (CWE-476) - CVE-2021-32963 , CVE-2021-32971 , CVE-2021-32979 , CVE-2021-32987 ‥ * Improper handling of exception conditions (CWE-755) - CVE-2021-32999The expected impact depends on each vulnerability, but if a specific command process is executed by a remote third party, it may be affected as follows. Twice * Execution of arbitrary code or disruption of service operation ( DoS ) Be in a state - CVE-2021-32959 ‥ * Denial of service ( DoS ) Be in a state - CVE-2021-32963 , CVE-2021-32971 , CVE-2021-32979 , CVE-2021-32987 , CVE-2021-32999
VAR-202109-0590 CVE-2021-32971 AVEVA  Made  SuiteLink Server  Multiple vulnerabilities in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Null pointer dereference in SuiteLink server while processing command 0x07. AVEVA Provided by the company SuiteLink Server The following multiple vulnerabilities exist in. * Heap-based buffer overflow (CWE-122) - CVE-2021-32959 ‥ * NULL Pointer reference (CWE-476) - CVE-2021-32963 , CVE-2021-32971 , CVE-2021-32979 , CVE-2021-32987 ‥ * Improper handling of exception conditions (CWE-755) - CVE-2021-32999The expected impact depends on each vulnerability, but if a specific command process is executed by a remote third party, it may be affected as follows. Twice * Execution of arbitrary code or disruption of service operation ( DoS ) Be in a state - CVE-2021-32959 ‥ * Denial of service ( DoS ) Be in a state - CVE-2021-32963 , CVE-2021-32971 , CVE-2021-32979 , CVE-2021-32987 , CVE-2021-32999
VAR-202108-0934 CVE-2021-29280 TP-Link Wireless N Router WR840N  Vulnerability in leaking resources to the wrong area in CVSS V2: 4.3
CVSS V3: 6.4
Severity: MEDIUM
In TP-Link Wireless N Router WR840N an ARP poisoning attack can cause buffer overflow. TP-Link Wireless N Router WR840N Exists in a vulnerability related to the leakage of resources to the wrong area.Information is tampered with and service operation is interrupted (DoS) It may be in a state
VAR-202109-0592 CVE-2021-32987 AVEVA  Made  SuiteLink Server  Multiple vulnerabilities in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Null pointer dereference in SuiteLink server while processing command 0x0b. AVEVA Provided by the company SuiteLink Server The following multiple vulnerabilities exist in. * Heap-based buffer overflow (CWE-122) - CVE-2021-32959 ‥ * NULL Pointer reference (CWE-476) - CVE-2021-32963 , CVE-2021-32971 , CVE-2021-32979 , CVE-2021-32987 ‥ * Improper handling of exception conditions (CWE-755) - CVE-2021-32999The expected impact depends on each vulnerability, but if a specific command process is executed by a remote third party, it may be affected as follows. Twice * Execution of arbitrary code or disruption of service operation ( DoS ) Be in a state - CVE-2021-32959 ‥ * Denial of service ( DoS ) Be in a state - CVE-2021-32963 , CVE-2021-32971 , CVE-2021-32979 , CVE-2021-32987 , CVE-2021-32999
VAR-202109-0591 CVE-2021-32979 AVEVA  Made  SuiteLink Server  Multiple vulnerabilities in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Null pointer dereference in SuiteLink server while processing commands 0x04/0x0a. AVEVA Provided by the company SuiteLink Server The following multiple vulnerabilities exist in. * Heap-based buffer overflow (CWE-122) - CVE-2021-32959 ‥ * NULL Pointer reference (CWE-476) - CVE-2021-32963 , CVE-2021-32971 , CVE-2021-32979 , CVE-2021-32987 ‥ * Improper handling of exception conditions (CWE-755) - CVE-2021-32999The expected impact depends on each vulnerability, but if a specific command process is executed by a remote third party, it may be affected as follows. Twice * Execution of arbitrary code or disruption of service operation ( DoS ) Be in a state - CVE-2021-32959 ‥ * Denial of service ( DoS ) Be in a state - CVE-2021-32963 , CVE-2021-32971 , CVE-2021-32979 , CVE-2021-32987 , CVE-2021-32999