VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202106-0358 CVE-2020-27339 InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM CVSS V2: 7.2
CVSS V3: 6.7
Severity: MEDIUM
In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe, and SdMmcDeviceDxe drivers are 05.16.25, 05.26.25, 05.35.25, 05.43.25, and 05.51.25 (for Kernel 5.1 through 5.5). The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count SMM Privilege Escalation 10 SMM Memory Corruption 12 DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202106-1459 CVE-2021-28858 TP-Link TL-WPA4220 information disclosure vulnerability CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 does not use SSL by default. Attacker on the local network can monitor traffic and capture the cookie and other sensitive information. TP-Link TL-WPA4220 Contains a vulnerability in the plaintext storage of important information.Information may be obtained. Tp-link TP-Link TL-WPA4220 is a domestic wireless WiFi bridge that can extend wireless signal from China's Tp-link company. The device can transmit data at high speed through the line, and expand the network to areas that cannot be covered at present. No detailed vulnerability details are currently provided
VAR-202106-1458 CVE-2021-28857 TP-Link TL-WPA4220  Vulnerability regarding inadequate protection of credentials in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 username and password are sent via the cookie. TP-Link TL-WPA4220 Exists in an inadequate protection of credentials.Information may be obtained. Tp-link TP-Link TL-WPA4220 is a domestic wireless WiFi bridge that can extend wireless signal from China's Tp-link company. The device can transmit data at high speed through the line, and expand the network to areas that cannot be covered at present. TP-Link TL-WPA4220 has an information disclosure vulnerability, which originates from TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064. No detailed vulnerability details are currently provided
VAR-202106-2182 No CVE TOPGate 200 (TG-21104-APP) has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Tianrongxin Technology Group (abbreviated as Tianrongxin) is a provider of network security, big data and cloud services. TopGate 200 (TG-21104-APP) has a command execution vulnerability. An attacker can use this vulnerability to gain server permissions.
VAR-202106-2188 No CVE TP-LINK TL-R402M router has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Prolink Technology Co., Ltd. is the world's leading supplier of network communication equipment. The TL-R402M router has a weak password vulnerability. Attackers can use this vulnerability to log in to the system background and perform unauthorized operations.
VAR-202106-2330 No CVE Zero Vision Technology (Shanghai) Co., Ltd. H5S video platform has an information disclosure vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Zero Vision Technology serves customers with video technology and is committed to simplifying the development of Internet of Things video. Zero Vision Technology (Shanghai) Co., Ltd. H5S video platform has an information disclosure vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202106-0971 CVE-2021-27388 plural  SINAMICS  Input validation vulnerabilities in medium voltage routerable products CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
SINAMICS medium voltage routable products are affected by a vulnerability in the Sm@rtServer component for remote access that could allow an unauthenticated attacker to cause a denial-of-service condition, and/or execution of limited configuration modifications and/or execution of limited control commands on the SINAMICS Medium Voltage Products, Remote Access (SINAMICS SL150: All versions, SINAMICS SM150: All versions, SINAMICS SM150i: All versions). SINAMICS SL150 , SINAMICS SM150 , SINAMICS SM150i Is vulnerable to input validation.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202106-2181 No CVE AXIS 2420 Network Camera has unauthorized access vulnerability CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Axis is an IT company that specializes in providing network video solutions. AXIS 2420 Network Camera has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2189 No CVE The intelligent transportation terminal management equipment of Zhejiang Dahua Technology Co., Ltd. has logic defects and vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Zhejiang Dahua Technology Co., Ltd. is a smart IoT solution provider and operation service provider with video as the core. The intelligent transportation terminal management equipment of Zhejiang Dahua Technology Co., Ltd. has a logic flaw vulnerability, which can be used by attackers to obtain sensitive information.
VAR-202106-2190 No CVE The camera of Zhejiang Dahua Technology Co., Ltd. has logic flaws and vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Zhejiang Dahua Technology Co., Ltd. is a leading monitoring product supplier and solution service provider. The camera of Zhejiang Dahua Technology Co., Ltd. has a logic flaw vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2191 No CVE AXIS 209MFD Network Camera has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Axis is an IT company that specializes in providing network video solutions. AXIS 209MFD Network Camera has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2192 No CVE AXIS 225FD Network Camera has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Axis is an IT company that specializes in providing network video solutions. AXIS 225FD Network Camera has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2193 No CVE AXIS M1125 Network Camera has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Axis is an IT company that specializes in providing network video solutions. AXIS M1125 Network Camera has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2194 No CVE AXIS M1124 Network Camera has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Axis is an IT company that specializes in providing network video solutions. AXIS M1124 Network Camera has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2195 No CVE Unauthorized access vulnerability exists in HP Officejet 5740 e-All-in-One Printer series CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
HP Officejet 5740 e-All-in-One Printer series is an all-in-one printer from HP Trading (Shanghai) Co., Ltd. The HP Officejet 5740 e-All-in-One Printer series has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2196 No CVE Unauthorized access vulnerability exists in HP Officejet 4630 e-All-in-One Printer series CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
HP Officejet 4630 e-All-in-One Printer series is an all-in-one printer from HP Trading (Shanghai) Co., Ltd. The HP Officejet 4630 e-All-in-One Printer series has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2197 No CVE H3C SecPath U200-M has SQL injection vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
H3C SecPath U200-M is a new generation of UTM (United Threat Management) equipment designed by H3C for small and medium-sized enterprises/branches. Xin H3C SecPath U200-M has a SQL injection vulnerability, which can be exploited by attackers to obtain sensitive information in the database.
VAR-202106-2198 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. AC11 has a denial of service vulnerability (CNVD-2021-35781) CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Tenda AC11 is a wireless router that uses RTOS operating system. Shenzhen Jixiang Tengda Technology Co., Ltd. AC11 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service attack.
VAR-202106-2199 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. AC11 has a denial of service vulnerability (CNVD-2021-35782) CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Tenda AC11 is a wireless router that uses RTOS operating system. Shenzhen Jixiang Tengda Technology Co., Ltd. AC11 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service attack.
VAR-202106-2200 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. AC11 has a denial of service vulnerability (CNVD-2021-35783) CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Tenda AC11 is a wireless router that uses RTOS operating system. Shenzhen Jixiang Tengda Technology Co., Ltd. AC11 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service attack.