VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202106-1773 CVE-2021-34203 D-Link DIR-2640-US  Authentication Vulnerability in Microsoft CVSS V2: 4.8
CVSS V3: 8.1
Severity: HIGH
D-Link DIR-2640-US 1.01B04 is vulnerable to Incorrect Access Control. Router ac2600 (dir-2640-us), when setting PPPoE, will start quagga process in the way of whole network monitoring, and this function uses the original default password and port. An attacker can easily use telnet to log in, modify routing information, monitor the traffic of all devices under the router, hijack DNS and phishing attacks. In addition, this interface is likely to be questioned by customers as a backdoor, because the interface should not be exposed. D-Link DIR-2640-US Contains an improper authentication vulnerability.Information may be obtained and information may be tampered with. D-Link DIR-2640-US is a network router device. D-Link DIR-2640-US has security vulnerabilities
VAR-202106-0266 CVE-2020-25752 Enphase Envoy  Vulnerability in Using Hard Coded Credentials CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
An issue was discovered on Enphase Envoy R3.x and D4.x devices. There are hardcoded web-panel login passwords for the installer and Enphase accounts. The passwords for these accounts are hardcoded values derived from the MD5 hash of the username and serial number mixed with some static strings. The serial number can be retrieved by an unauthenticated user at /info.xml. These passwords can be easily calculated by an attacker; users are unable to change these passwords. Enphase Envoy Is vulnerable to the use of hard-coded credentials.Information may be obtained. Enphase Energy Envoy is a gateway device used to connect smart home devices from Enphase Energy in the United States. Enphase Energy Envoy has a trust management vulnerability
VAR-202106-0267 CVE-2020-25753 Enphase Envoy  Vulnerabilities in devices CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml. Enphase Envoy An unspecified vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Enphase Energy Envoy is a gateway device used to connect smart home devices from Enphase Energy in the United States. Enphase Energy Envoy has security vulnerabilities. No detailed vulnerability details are currently provided
VAR-202106-1771 CVE-2021-34201 D-Link DIR-2640-US  Out-of-bounds Vulnerability in Microsoft CVSS V2: 3.6
CVSS V3: 7.1
Severity: HIGH
D-Link DIR-2640-US 1.01B04 is vulnerable to Buffer Overflow. There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640). Local ordinary users can overwrite the global variables in the .bss section, causing the process crashes or changes. D-Link DIR-2640-US Is vulnerable to an out-of-bounds write.Information is tampered with and denial of service (DoS) It may be put into a state. D-Link DIR-2640-US is a smart AC2600 high-power Wi-Fi gigabit router
VAR-202106-1774 CVE-2021-34204 D-Link DIR-2640-US  Vulnerability regarding inadequate protection of credentials in CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges. D-Link DIR-2640-US Exists in an inadequate protection of credentials.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. D-Link DIR-2640-US is a network router device. D-Link DIR-2640-US has security vulnerabilities
VAR-202106-2172 No CVE Belkin WRT1900ACS has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
WRT1900ACS is a router product of Belkin Company. Belkin's WRT1900ACS has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
VAR-202106-2173 No CVE Belkin company EA6500 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
EA6500 is a router product of Belkin Company. Belkin's EA6500 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
VAR-202106-2174 No CVE Belkin EA2700 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
EA2700 is a router product of Belkin Company. Belkin's EA2700 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
VAR-202106-2175 No CVE Belkin EA6400 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
EA6400 is a router product of Belkin Company. Belkin's EA6400 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
VAR-202106-2176 No CVE Belkin EA6300 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
EA6300 is a router product of Belkin Company. Belkin's EA6300 has a weak password vulnerability. Attackers can use the vulnerability to log in to the system background and perform unauthorized operations.
VAR-202106-2177 No CVE Belkin EA7300 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
EA7300 is a router product of Belkin Company. Belkin's EA7300 has a weak password vulnerability. Attackers can use the vulnerability to log in to the system background and perform unauthorized operations.
VAR-202106-2178 No CVE Belkin EA6100 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
EA6100 is a router product of Belkin Company. Belkin's EA6100 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
VAR-202106-2179 No CVE Belkin EA6350 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
EA6350 is a router product of Belkin Company. Belkin's EA6350 has a weak password vulnerability. Attackers can use the vulnerability to log in to the system background and perform unauthorized operations.
VAR-202106-2183 No CVE Unauthorized access vulnerabilities exist in many products of Shanghai Jinhongge International Trade Co., Ltd. CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Shanghai Jinhongge International Trade Co., Ltd. is a company whose main business is the distribution of embedded controllers. Many products of Shanghai Jinhongge International Trade Co., Ltd. have unauthorized access vulnerabilities. Attackers can use the vulnerabilities to obtain sensitive information.
VAR-202106-2184 No CVE Belkin EA6900 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
EA6900 is a router product of Belkin Company. Belkin's EA6900 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
VAR-202106-2185 No CVE Belkin EA9200 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
EA9200 is a router product of Belkin Company. Belkin's EA9200 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
VAR-202106-2186 No CVE TP-LINK TL-ER8820T has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
TL-ER8820T is a new generation of high-performance 10-Gigabit enterprise router launched by TP-LINK. TP-LINK TL-ER8820T has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2187 No CVE D-Link DI-7300G and DI-7200G have weak password vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
DI-7300G and DI-7200G are both D-Link router products. D-Link DI-7300G and DI-7200G have a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2296 No CVE Unauthorized access vulnerabilities exist in many Dell printer products CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
MFP S2815dn, etc. are all Dell color laser printers. Many Dell printer products have unauthorized access vulnerabilities, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2324 No CVE Unauthorized access vulnerability exists in HP OfficeJet Pro series products CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
OfficeJet Pro is HP's all-in-one printer series. HP OfficeJet Pro series products have an unauthorized access vulnerability. Attackers can use the vulnerability to access the configuration page without authorization to obtain sensitive information.