VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202106-2003 No CVE Multiple TPLINK routers have binary vulnerabilities CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
TP-LINK Technology Co., Ltd. ("TP-LINK" for short) is the world's leading supplier of network communication equipment. Many TPLINK routers have binary vulnerabilities, which can be exploited by attackers to cause denial of service.
VAR-202106-2004 No CVE FAST FWB201S, FWB505, FAC1203R, FWB200 have denial of service vulnerabilities CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Shenzhen Xunjie Communication Technology Co., Ltd. (hereinafter referred to as FAST) is a provider of user-end network and communication technology and equipment in China. Founded in 2002, headquartered in Shenzhen High-tech Industrial Zone. It is a high-tech enterprise with a complete independent research and development, manufacturing and marketing system. FAST FWB201S, FWB505, FAC1203R, and FWB200 have a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-2005 No CVE Many TPLINK routers have stack overflow vulnerabilities CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
TP-Link TL-WDR5620 is an intelligent router. TP-Link TL-WDR5650 is a dual-band wireless router. TP-LINK TL-WR842N is a wireless router. TP-link TL-WDR7660, TL-WDR7620, TL-WDR7661, TL-WDR7650 and TL-R470P-AC are all gigabit routers. TP-link TL-WA933RE is a wireless extender for mobile phones. Many TPLINK routers have stack overflow vulnerabilities. Attackers can use the vulnerability to cause stack buffer overflow.
VAR-202106-2037 No CVE FAST FWB201S, FWB505, FAC1203R, FWB200 have denial of service vulnerabilities CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Shenzhen Xunjie Communication Technology Co., Ltd. (hereinafter referred to as FAST) is a provider of user-end network and communication technology and equipment in China. Founded in 2002, headquartered in Shenzhen High-tech Industrial Zone. It is a high-tech enterprise with a complete independent research and development, manufacturing and marketing system. FAST FWB201S, FWB505, FAC1203R, and FWB200 have a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202106-2038 No CVE MERCURY M6G, D196G, MW310RE, MIAP1200GP have a denial of service vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Shenzhen Meikexing Communication Technology Co., Ltd. (hereinafter referred to as MERCURY) was established in 2001. Its business scope includes: general business items are: computer wireless local area network products, computer software and hardware, communication equipment, electronic products, network security equipment technology development, etc. . MERCURY M6G, D196G, MW310RE, MIAP1200GP have a denial of service vulnerability. Attackers can use this vulnerability to cause a denial of service.
VAR-202106-2039 No CVE MERCURY D121G, MW310R, M6G, D196G have a denial of service vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Shenzhen Meikexing Communication Technology Co., Ltd. (hereinafter referred to as MERCURY) was established in 2001. Its business scope includes: general business items are: computer wireless local area network products, computer software and hardware, communication equipment, electronic products, network security equipment technology development, etc. . MERCURY D121G, MW310R, M6G, and D196G have a denial of service vulnerability. Attackers can use this vulnerability to cause a denial of service.
VAR-202106-2040 No CVE MERCURY M6G, D196G, D12A, D121G have binary vulnerabilities CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Shenzhen Meikexing Communication Technology Co., Ltd. (hereinafter referred to as MERCURY) was established in 2001, with a well-known independent brand "MERCURY (Mercury)", focusing on providing excellent products and solutions in the field of network communications and security monitoring. MERCURY M6G, D196G, D12A, and D121G have binary vulnerabilities, which can be exploited by attackers to cause denial of service.
VAR-202106-2041 No CVE FAST FAC1203R, FR100P-AC, FAC1900R, FAC1200R have denial of service vulnerabilities CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Shenzhen Xunjie Communication Technology Co., Ltd. (hereinafter referred to as FAST) is a provider of user-end network and communication technology and equipment in China. Founded in 2002, headquartered in Shenzhen High-tech Industrial Zone. It is a high-tech enterprise with a complete independent research and development, manufacturing and marketing system. FAST FAC1203R, FR100P-AC, FAC1900R, and FAC1200R have a denial of service vulnerability. Attackers can use this vulnerability to cause a denial of service.
VAR-202106-2335 No CVE Tiandiweiye Easy7 video surveillance platform has an information disclosure vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Tiandi Weiye Technology Co., Ltd. (TIANDY) is an Internet of Things enterprise focusing on the development, production and sales of video surveillance products. Tiandiweiye Easy7 video surveillance platform has an information disclosure vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-0619 CVE-2021-22329 plural  Huawei  Product vulnerabilities CVSS V2: 4.0
CVSS V3: 4.9
Severity: MEDIUM
There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10. plural Huawei The product contains unspecified vulnerabilities.Information may be tampered with. Huawei S12700, etc. are all enterprise-class switch products of China's Huawei (Huawei) company
VAR-202106-0620 CVE-2021-22338 eCNS280 code issue vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
There is an XXE injection vulnerability in eCNS280 V100R005C00 and V100R005C10. A module does not perform the strict operation to the input XML message. Attacker can send specific message to exploit this vulnerability, leading to the module denial of service. Huawei eCNS280 is the core network equipment of China's Huawei (Huawei) wireless broadband trunking system. In addition to providing the network functions of the traditional core network, it also provides capacity configuration for each network element according to the actual application by virtualizing the network element functions and sharing standardized hardware resources among multiple network elements, which improves the efficiency of network expansion and reduction. Business online efficiency There is a security vulnerability in eCNS280
VAR-202106-0605 CVE-2021-22340 ManageOne  and  SMC2.0  Race Vulnerability in CVSS V2: 4.7
CVSS V3: 4.1
Severity: MEDIUM
There is a multiple threads race condition vulnerability in Huawei product. A race condition exists for concurrent I/O read by multiple threads. An attacker with the root permission can exploit this vulnerability by performing some operations. Successful exploitation of this vulnerability may cause the system to crash. Affected product versions include: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2.0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931. ManageOne and SMC2.0 Is vulnerable to a race condition.Denial of service (DoS) It may be put into a state. Huawei Manageone is a set of cloud data center management solutions of China Huawei (Huawei). The product supports unified management of heterogeneous cloud resource pools, and provides functions such as multi-level VDC matching customer organization model, service catalog planning, self-service, centralized alarm analysis, and intelligent operation and maintenance. Many Huawei products have security vulnerabilities. 0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931
VAR-202106-2006 No CVE Internet Technology Co., Ltd. Downloop-G24M has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Downloop-G24M is a new generation ISP level L2 managed switch of Internet Technology Co., Ltd. Internet Technology Co., Ltd. Downloop-G24M has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2007 No CVE Suzhou Hamming Technology Co., Ltd. Howay SW-26242 has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Howay SW-26242 is a full Gigabit managed POE switch. Suzhou Hamming Technology Co., Ltd. Howay SW-26242 has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2008 No CVE Shenzhen Wanwang Broadcom Technology Co., Ltd. 26G-2F-MANAGED has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Committed to the development and application of network communication products and IoT security management and control platforms, it is a next-generation weak current intelligent network solution and IoT security solution manufacturer. Shenzhen Wanwang Broadcom Technology Co., Ltd. 26G-2F-MANAGED has a weak password vulnerability. The attacker uses a weak password to log in to the background to obtain sensitive information.
VAR-202106-2009 No CVE Shenzhen Wanwang Brocade Network Technology Co., Ltd. BK-S1000-24POE/BK-S1000-8POE has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shenzhen Wanwang Brocade Network Technology Co., Ltd. is a company mainly engaged in technology research and development, development, and sales of network communication equipment, computers, other electronic products, integrated circuits, and mechanical equipment. Shenzhen Wanwang Brocade Network Technology Co., Ltd. BK-S1000-24POE/BK-S1000-8POE has a weak password vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202106-2010 No CVE NETGEAR DGN2200v3 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
NETGEAR DGN2200v3 is a wireless router. NETGEAR DGN2200v3 has a weak password vulnerability. The attacker uses a weak password to log in to the background to obtain sensitive information.
VAR-202106-2011 No CVE NETGEAR DGN1000 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
NETGEAR DGN1000 is a wireless router. NETGEAR DGN1000 has a weak password vulnerability. The attacker uses a weak password to log in to the background to obtain sensitive information.
VAR-202106-2012 No CVE Airspace technology WIFISKY 7-layer flow control router has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shenzhen Airspace Technology Co., Ltd. is a network communication equipment supplier, dedicated to the research and development of network communication equipment. Airspace technology WIFISKY 7-layer flow control router has a weak password vulnerability. The attacker uses a weak password to log in to the background to obtain sensitive information.
VAR-202106-2014 No CVE FLIR-AX8 has an arbitrary file download vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Teledyne FLIR focuses on the design, development, production, marketing and promotion of professional technologies for enhancing situational awareness. FLIR-AX8 has an arbitrary file download vulnerability. Attackers can use vulnerabilities to download related system configuration files.