VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202107-1706 No CVE Youku Tudou Roubao has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Youku Tudou Roubao is a smart router. Youku Tudou Roubao has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202107-1708 No CVE BYTEVALUE intelligent flow control router has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shenzhen Baiwei Tongda Technology Co., Ltd. is a supplier dedicated to providing leading network solutions for Internet cafes, communities, hotels, enterprises, and public Internet places. The BYTEVALUE intelligent flow control router has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202107-1789 No CVE China United Network Communications Group Co., Ltd. HG220G-U has an unauthorized access vulnerability CVSS V2: 5.8
CVSS V3: -
Severity: MEDIUM
HG220G-U is a fiber optic modem of China United Network Communications Group Co., Ltd. China United Network Communications Group Co., Ltd. HG220G-U has an unauthorized access vulnerability. Attackers can use this vulnerability to construct a specific URL request to open the telnet service without authorization.
VAR-202107-1826 No CVE The Lenovo Xiaoxin XY300 projector has a directory traversal vulnerability CVSS V2: 3.3
CVSS V3: -
Severity: LOW
Xiaoxin XY300 projector is a home, portable mini projector. The Lenovo Xiaoxin XY300 projector has a directory traversal vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202107-0082 CVE-2020-20217 MikroTik RouterOS Resource Management Error Vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Mikrotik RouterOs before 6.47 (stable tree) suffers from an uncontrolled resource consumption vulnerability in the /nova/bin/route process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU. MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality
VAR-202107-1301 CVE-2021-25440 SAMSUNG FactoryCameraFB Security hole CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Improper access control vulnerability in FactoryCameraFB prior to version 3.4.74 allows untrusted applications to access arbitrary files with an escalated privilege. Samsung FactoryCameraFB is a system application of Samsung Corporation. Samsung Mobile FactoryCameraFB has an access control error vulnerability
VAR-202107-1287 CVE-2021-25426 Samsung Message information leakage vulnerability (CNVD-2023-95335) CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Improper component protection vulnerability in SmsViewerActivity of Samsung Message prior to SMR July-2021 Release 1 allows untrusted applications to access Message files. Samsung Messages is an application for Samsung mobile devices. Provides a tool that comes pre-installed by default on all its official devices. Samsung Message has an information disclosure vulnerability. The vulnerability stems from the lack of appropriate protection permissions in the product's SmsViewerActivity component. An attacker can exploit this vulnerability to access the Message file
VAR-202107-1707 No CVE Visual Tools DVR has an unauthorized command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Visual Tools is a brand of AX Solutions. AX Solutions is a company with high-tech features and unique video solutions. It is well-known for its innovative capabilities, product quality and service mission. Visual Tools DVR has an unauthorized command execution vulnerability. Attackers can use this vulnerability to escalate apache privileges to root. Combined with the vulnerability, they can execute arbitrary commands on the target device with root privileges.
VAR-202107-0077 CVE-2020-20211 Mikrotik RouterOs  Reachable assertion vulnerabilities in CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Mikrotik RouterOs 6.44.5 (long-term tree) suffers from an assertion failure vulnerability in the /nova/bin/console process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet. Mikrotik RouterOs Exists in a reachable assertion vulnerability.Denial of service (DoS) It may be put into a state. MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality. Re: Two vulnerabilities found in MikroTik's RouterOS
VAR-202107-0085 CVE-2020-20225 Mikrotik RouterOs  Reachable assertion vulnerabilities in CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Mikrotik RouterOs before 6.47 (stable tree) suffers from an assertion failure vulnerability in the /nova/bin/user process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet. Mikrotik RouterOs Exists in a reachable assertion vulnerability.Denial of service (DoS) It may be put into a state. MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality. Re: Two vulnerabilities found in MikroTik's RouterOS
VAR-202107-0080 CVE-2020-20215 Mikrotik RouterOs  Buffer Error Vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/diskd process. An authenticated remote attacker can cause a Denial of Service due to invalid memory access. Mikrotik RouterOs Is vulnerable to a buffer error.Denial of service (DoS) It may be put into a state. MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality. There is a buffer error vulnerability in Mikrotik RouterOs. The following products and versions are affected: Mikrotik RouterOs prior to 6.44.6. Re: Three vulnerabilities found in MikroTik's RouterOS
VAR-202107-0079 CVE-2020-20213 Mikrotik RouterOs  Resource Depletion Vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Mikrotik RouterOs 6.44.5 (long-term tree) suffers from an stack exhaustion vulnerability in the /nova/bin/net process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU. Mikrotik RouterOs Is vulnerable to a resource exhaustion.Denial of service (DoS) It may be put into a state. MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality. Re: Three vulnerabilities found in MikroTik's RouterOS
VAR-202107-0081 CVE-2020-20216 Mikrotik RouterOs  In  NULL  Pointer dereference vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/graphing process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference). MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality. Re: Three vulnerabilities found in MikroTik's RouterOS
VAR-202107-0078 CVE-2020-20212 Mikrotik RouterOs  In  NULL  Pointer dereference vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Mikrotik RouterOs 6.44.5 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/console process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference). MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality. Re: Two vulnerabilities found in MikroTik's RouterOS
VAR-202107-1792 No CVE Phicomm router K1 version has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shanghai Phicomm Data Communication Technology Co., Ltd. is a technologically innovative enterprise that provides users with smart products and cloud services in the field of smart homes. Phicomm router K1 version has weak password vulnerability. Attackers can use this vulnerability to log in to the background to obtain sensitive information.
VAR-202107-1794 No CVE KGuard DVR has unauthorized access vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Yingying Information actively creates a smart road monitoring integration platform, and has been earnestly operating its own brand KGuard for many years. Its main products include home security combokits for digital surveillance video recorders (Home Security ComboKit), etc. KGuard DVR has an unauthorized access vulnerability. Attackers can use this vulnerability to obtain sensitive information and provide arbitrary command execution.
VAR-202107-1651 CVE-2021-33020 Philips Vue PACS  Vulnerability regarding lack of encryption of critical data in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Philips Vue PACS versions 12.2.x.x and prior uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key. Philips Vue PACS There is a vulnerability in the lack of encryption of critical data.Information may be obtained
VAR-202107-1649 CVE-2021-27497 Philips Vue PACS  Vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Philips Vue PACS versions 12.2.x.x and prior does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. Philips Vue PACS Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202107-1648 CVE-2021-33018 Philips Vue PACS  Vulnerability in using cryptographic algorithms in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The use of a broken or risky cryptographic algorithm in Philips Vue PACS versions 12.2.x.x and prior is an unnecessary risk that may result in the exposure of sensitive information
VAR-202107-1647 CVE-2021-27501 Philips Vue PACS  Vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Philips Vue PACS versions 12.2.x.x and prior does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the severity of the associated vulnerabilities. Philips Vue PACS Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state