VARIoT IoT vulnerabilities database
| VAR-202106-1773 | CVE-2021-34203 | D-Link DIR-2640-US Authentication Vulnerability in Microsoft |
CVSS V2: 4.8 CVSS V3: 8.1 Severity: HIGH |
D-Link DIR-2640-US 1.01B04 is vulnerable to Incorrect Access Control. Router ac2600 (dir-2640-us), when setting PPPoE, will start quagga process in the way of whole network monitoring, and this function uses the original default password and port. An attacker can easily use telnet to log in, modify routing information, monitor the traffic of all devices under the router, hijack DNS and phishing attacks. In addition, this interface is likely to be questioned by customers as a backdoor, because the interface should not be exposed. D-Link DIR-2640-US Contains an improper authentication vulnerability.Information may be obtained and information may be tampered with. D-Link DIR-2640-US is a network router device.
D-Link DIR-2640-US has security vulnerabilities
| VAR-202106-0266 | CVE-2020-25752 | Enphase Envoy Vulnerability in Using Hard Coded Credentials |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
An issue was discovered on Enphase Envoy R3.x and D4.x devices. There are hardcoded web-panel login passwords for the installer and Enphase accounts. The passwords for these accounts are hardcoded values derived from the MD5 hash of the username and serial number mixed with some static strings. The serial number can be retrieved by an unauthenticated user at /info.xml. These passwords can be easily calculated by an attacker; users are unable to change these passwords. Enphase Envoy Is vulnerable to the use of hard-coded credentials.Information may be obtained. Enphase Energy Envoy is a gateway device used to connect smart home devices from Enphase Energy in the United States.
Enphase Energy Envoy has a trust management vulnerability
| VAR-202106-0267 | CVE-2020-25753 | Enphase Envoy Vulnerabilities in devices |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml. Enphase Envoy An unspecified vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Enphase Energy Envoy is a gateway device used to connect smart home devices from Enphase Energy in the United States.
Enphase Energy Envoy has security vulnerabilities. No detailed vulnerability details are currently provided
| VAR-202106-1771 | CVE-2021-34201 | D-Link DIR-2640-US Out-of-bounds Vulnerability in Microsoft |
CVSS V2: 3.6 CVSS V3: 7.1 Severity: HIGH |
D-Link DIR-2640-US 1.01B04 is vulnerable to Buffer Overflow. There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640). Local ordinary users can overwrite the global variables in the .bss section, causing the process crashes or changes. D-Link DIR-2640-US Is vulnerable to an out-of-bounds write.Information is tampered with and denial of service (DoS) It may be put into a state. D-Link DIR-2640-US is a smart AC2600 high-power Wi-Fi gigabit router
| VAR-202106-1774 | CVE-2021-34204 | D-Link DIR-2640-US Vulnerability regarding inadequate protection of credentials in |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges. D-Link DIR-2640-US Exists in an inadequate protection of credentials.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. D-Link DIR-2640-US is a network router device.
D-Link DIR-2640-US has security vulnerabilities
| VAR-202106-2172 | No CVE | Belkin WRT1900ACS has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
WRT1900ACS is a router product of Belkin Company.
Belkin's WRT1900ACS has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
| VAR-202106-2173 | No CVE | Belkin company EA6500 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
EA6500 is a router product of Belkin Company.
Belkin's EA6500 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
| VAR-202106-2174 | No CVE | Belkin EA2700 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
EA2700 is a router product of Belkin Company.
Belkin's EA2700 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
| VAR-202106-2175 | No CVE | Belkin EA6400 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
EA6400 is a router product of Belkin Company.
Belkin's EA6400 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
| VAR-202106-2176 | No CVE | Belkin EA6300 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
EA6300 is a router product of Belkin Company.
Belkin's EA6300 has a weak password vulnerability. Attackers can use the vulnerability to log in to the system background and perform unauthorized operations.
| VAR-202106-2177 | No CVE | Belkin EA7300 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
EA7300 is a router product of Belkin Company.
Belkin's EA7300 has a weak password vulnerability. Attackers can use the vulnerability to log in to the system background and perform unauthorized operations.
| VAR-202106-2178 | No CVE | Belkin EA6100 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
EA6100 is a router product of Belkin Company.
Belkin's EA6100 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
| VAR-202106-2179 | No CVE | Belkin EA6350 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
EA6350 is a router product of Belkin Company.
Belkin's EA6350 has a weak password vulnerability. Attackers can use the vulnerability to log in to the system background and perform unauthorized operations.
| VAR-202106-2183 | No CVE | Unauthorized access vulnerabilities exist in many products of Shanghai Jinhongge International Trade Co., Ltd. |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Shanghai Jinhongge International Trade Co., Ltd. is a company whose main business is the distribution of embedded controllers.
Many products of Shanghai Jinhongge International Trade Co., Ltd. have unauthorized access vulnerabilities. Attackers can use the vulnerabilities to obtain sensitive information.
| VAR-202106-2184 | No CVE | Belkin EA6900 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
EA6900 is a router product of Belkin Company.
Belkin's EA6900 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
| VAR-202106-2185 | No CVE | Belkin EA9200 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
EA9200 is a router product of Belkin Company.
Belkin's EA9200 has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
| VAR-202106-2186 | No CVE | TP-LINK TL-ER8820T has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
TL-ER8820T is a new generation of high-performance 10-Gigabit enterprise router launched by TP-LINK.
TP-LINK TL-ER8820T has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202106-2187 | No CVE | D-Link DI-7300G and DI-7200G have weak password vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
DI-7300G and DI-7200G are both D-Link router products.
D-Link DI-7300G and DI-7200G have a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202106-2296 | No CVE | Unauthorized access vulnerabilities exist in many Dell printer products |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
MFP S2815dn, etc. are all Dell color laser printers.
Many Dell printer products have unauthorized access vulnerabilities, which can be exploited by attackers to obtain sensitive information.
| VAR-202106-2324 | No CVE | Unauthorized access vulnerability exists in HP OfficeJet Pro series products |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
OfficeJet Pro is HP's all-in-one printer series.
HP OfficeJet Pro series products have an unauthorized access vulnerability. Attackers can use the vulnerability to access the configuration page without authorization to obtain sensitive information.