VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202106-2121 No CVE TopVPN6000 has command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Tianrongxin Technology Group (abbreviated as Tianrongxin) is a network security, big data and security cloud service provider. TopVPN6000 has command execution vulnerabilities. An attacker can use this vulnerability to gain control of the server.
VAR-202106-2123 No CVE Rockwell Automation/Allen-Bradley 1756-EN2T/D PLC has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Rockwell Automation/Allen-Bradley 1756-EN2T/D PLC is a programmable controller. Rockwell Automation/Allen-Bradley 1756-EN2T/D PLC has a command execution vulnerability. An attacker can use this vulnerability to gain control of the website server.
VAR-202106-2124 No CVE Information disclosure vulnerability exists in Huawei HG8245 CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The HG8245 is a gateway-type home-side device for Huawei's FTTH solution. It uses G/EPON technology to achieve ultra-broadband access for home/SOHO users. The Huawei HG8245 has an information disclosure vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
VAR-202106-2331 No CVE Tiandiweiye electronic proctoring system has weak password loopholes CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Tiandi Weiye is an intelligent security solution provider. Based on artificial intelligence, big data, cloud computing, Internet of Things and other technologies, it provides intelligent video products, system solutions and High-quality technical services. Tiandiweiye electronic invigilation system has weak password loopholes. Attackers can use this vulnerability to obtain sensitive information.
VAR-202106-2126 No CVE Ruijie Networks Co., Ltd. EG2000SE has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Ruijie Networks is a professional network manufacturer with a full range of network equipment product lines and solutions including switches, routers, software, security firewalls, wireless products, storage, etc. Ruijie Networks Co., Ltd. EG2000SE has a command execution vulnerability. Attackers can use the vulnerability to gain control of the server.
VAR-202106-2322 No CVE Shenzhen Kexu Technology Co., Ltd. campus IoT intelligent management system has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The campus IoT intelligent management system can monitor and control all access devices in real time, centralized management, data statistics, and report presentation. Shenzhen Kexu Technology Co., Ltd. campus IoT intelligent management system has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2164 No CVE China Telecom Tianyi broadband government-enterprise gateway A8C 8+8 AP has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Tianyi broadband government-enterprise gateway is a terminal product customized by China Telecom specifically for brand customers, providing enterprise network solutions. Tianyi Broadband's government-enterprise gateway A8C 8+8 AP has a weak password vulnerability. Attackers use this vulnerability to obtain sensitive information.
VAR-202106-2165 No CVE China Telecom Tianyi broadband government-enterprise gateway A8-B has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Tianyi broadband government-enterprise gateway is a terminal product customized by China Telecom specifically for brand customers, providing enterprise network solutions. Tianyi Broadband's government-enterprise gateway A8-B has a weak password vulnerability. Attackers use this vulnerability to obtain sensitive information.
VAR-202106-2167 No CVE Ruijie Networks NBR1300G-E has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Ruijie Networks is a provider of ICT infrastructure and industry solutions. Its main business is the research and development, design and sales of network equipment, network security products and cloud desktop solutions. Ruijie Networks NBR1300G-E has a weak password vulnerability. The attacker uses the default weak password to log in to the background to obtain sensitive information.
VAR-202106-2168 No CVE Ruijie Networks NBR2100G-E has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Ruijie Networks is a provider of ICT infrastructure and industry solutions. Its main business is the research and development, design and sales of network equipment, network security products and cloud desktop solutions. Ruijie Networks NBR2100G-E has a weak password vulnerability. The attacker uses the default weak password to log in to the background to obtain sensitive information.
VAR-202106-2169 No CVE Ruijie Networks EG2000SE has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Ruijie Networks is a provider of ICT infrastructure and industry solutions. Its main business is the research and development, design and sales of network equipment, network security products and cloud desktop solutions. Ruijie Networks EG2000SE has a weak password vulnerability. The attacker uses the default weak password to log in to the background to obtain sensitive information.
VAR-202106-2170 No CVE Ruijie Networks EG2000CE has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Ruijie Networks is a provider of ICT infrastructure and industry solutions. Its main business is the research and development, design and sales of network equipment, network security products and cloud desktop solutions. Ruijie Networks EG2000CE has a weak password vulnerability. The attacker uses the default weak password to log in to the background to obtain sensitive information.
VAR-202106-2171 No CVE Ruijie Networks EG2000K has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Ruijie Networks is a provider of ICT infrastructure and industry solutions. Its main business is the research and development, design and sales of network equipment, network security products and cloud desktop solutions. Ruijie Networks EG2000K has a weak password vulnerability. The attacker uses the default weak password to log in to the background to obtain sensitive information.
VAR-202106-1321 CVE-2021-31664 RIOT-OS  Buffer Overflow Vulnerability in Linux CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information. RIOT RIOT-OS is a set of operating systems used in the field of Internet of Things
VAR-202106-1320 CVE-2021-31663 RIOT-OS  Buffer Overflow Vulnerability in Linux CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
RIOT-OS 2021.01 before commit bc59d60be60dfc0a05def57d74985371e4f22d79 contains a buffer overflow which could allow attackers to obtain sensitive information. RIOT RIOT-OS is a set of operating systems used in the field of Internet of Things
VAR-202106-1319 CVE-2021-31662 RIOT-OS  Buffer Overflow Vulnerability in Linux CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
RIOT-OS 2021.01 before commit 07f1254d8537497552e7dce80364aaead9266bbe contains a buffer overflow which could allow attackers to obtain sensitive information. RIOT RIOT-OS is a set of operating systems used in the field of Internet of Things
VAR-202106-1318 CVE-2021-31661 RIOT-OS  Buffer Overflow Vulnerability in Linux CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
RIOT-OS 2021.01 before commit 609c9ada34da5546cffb632a98b7ba157c112658 contains a buffer overflow that could allow attackers to obtain sensitive information. RIOT RIOT-OS is a set of operating systems used in the field of Internet of Things
VAR-202106-1317 CVE-2021-31660 RIOT-OS  Buffer Overflow Vulnerability in Linux CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information. RIOT RIOT-OS is a set of operating systems used in the field of Internet of Things
VAR-202106-1668 CVE-2021-32424 TrendNet TW100-S4W1CA cross-site request forgery vulnerability CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
In TrendNet TW100-S4W1CA 2.3.32, due to a lack of proper session controls, a threat actor could make unauthorized changes to an affected router via a specially crafted web page. If an authenticated user were to interact with a malicious web page it could allow for a complete takeover of the router. TrendNet TW100-S4W1CA Contains a cross-site request forgery vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. TrendNet TW100-S4W1CA is a four-port broadband router. TrendNet TW100-S4W1CA version 2.3.32 has a cross-site request forgery vulnerability. The vulnerability stems from the lack of proper session control
VAR-202106-1669 CVE-2021-32426 TrendNet TW100-S4W1CA cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
In TrendNet TW100-S4W1CA 2.3.32, it is possible to inject arbitrary JavaScript into the router's web interface via the "echo" command. TrendNet TW100-S4W1CA Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. TrendNet TW100-S4W1CA is a four-port broadband router. TrendNet TW100-S4W1CA version 2.3.32 has a cross-site scripting vulnerability