VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202501-0173 CVE-2025-20123 Cisco Crosswork Network Controller Cross-Site Scripting Vulnerability CVSS V2: 6.4
CVSS V3: 4.8
Severity: MEDIUM
Multiple vulnerabilities in the web-based management interface of Cisco Crosswork Network Controller could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against users of the interface of an affected system. These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by inserting malicious data into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid administrative credentials. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. Cisco Crosswork Network Controller is a network controller of Cisco. When the malicious data is viewed, sensitive information can be obtained or user sessions can be hijacked
VAR-202501-0453 CVE-2024-45555 Integer overflow vulnerability in multiple Qualcomm products CVSS V2: -
CVSS V3: 8.4
Severity: HIGH
Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image. MSM8996AU firmware, qam8255p firmware, QAM8295P Multiple Qualcomm products, including firmware, contain an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202501-1053 CVE-2024-33067 Out-of-bounds read vulnerability in multiple Qualcomm products CVSS V2: -
CVSS V3: 6.1
Severity: MEDIUM
Information disclosure while invoking callback function of sound model driver from ADSP for every valid opcode received from sound model driver. AR8035 firmware, c-v2x 9150 firmware, CSRB31024 Multiple Qualcomm products, such as firmware, contain an out-of-bounds read vulnerability.Information may be obtained
VAR-202501-2401 CVE-2024-20151 media tech's  nr16  and  NR17  Out-of-bounds write vulnerability in CVSS V2: -
CVSS V3: 6.7
Severity: MEDIUM
In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: MOLY01399339; Issue ID: MSV-1928. media tech's nr16 and NR17 Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202501-0708 CVE-2024-20150 Untrusted Data Deserialization Vulnerability in Multiple MediaTek Products CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01412526; Issue ID: MSV-2018. LR12A , LR13 , NR15 Multiple MediaTek products contain vulnerabilities related to the deserialization of untrusted data.Service operation interruption (DoS) It may be in a state
VAR-202501-0027 CVE-2024-13108 D-Link Systems, Inc.  of  DIR-816  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. It has been declared as critical. This vulnerability affects unknown code of the file /goform/form2NetSniper.cgi. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-816 There are unspecified vulnerabilities in the firmware.Information may be tampered with. D-Link DIR-816 A2 is a wireless router from D-Link of China. Attackers can exploit this vulnerability to set the device's NetSniper
VAR-202501-0010 CVE-2024-13107 D-Link Systems, Inc.  of  DIR-816  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. It has been classified as critical. This affects an unknown part of the file /goform/form2LocalAclEditcfg.cgi of the component ACL Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-816 There are unspecified vulnerabilities in the firmware.Information may be tampered with. D-Link DIR-816 A2 is a wireless router from D-Link of China. Attackers can exploit this vulnerability to set the local access control list of the device
VAR-202501-0024 CVE-2024-13106 D-Link Systems, Inc.  of  DIR-816  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210 and classified as critical. Affected by this issue is some unknown functionality of the file /goform/form2IPQoSTcAdd of the component IP QoS Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-816 There are unspecified vulnerabilities in the firmware.Information may be tampered with. D-Link DIR-816 A2 is a wireless router from D-Link of China. Attackers can exploit this vulnerability to set the QoS settings of the device
VAR-202501-0054 CVE-2024-13105 D-Link Systems, Inc.  of  DIR-816  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability has been found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/form2Dhcpd.cgi of the component DHCPD Setting Handler. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-816 There are unspecified vulnerabilities in the firmware.Information may be tampered with. D-Link DIR-816 A2 is a wireless router from D-Link of China. Attackers can use this vulnerability to set up the dhcp service of the device
VAR-202501-0004 CVE-2024-13104 D-Link Systems, Inc.  of  DIR-816  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability, which was classified as critical, was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. Affected is an unknown function of the file /goform/form2AdvanceSetup.cgi of the component WiFi Settings Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-816 There are unspecified vulnerabilities in the firmware.Information may be tampered with. D-Link DIR-816 A2 is a wireless router from D-Link of China. Attackers can use this vulnerability to set the device's 2.4G and 5G advanced settings
VAR-202501-0033 CVE-2024-13103 D-Link Systems, Inc.  of  DIR-816  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability, which was classified as critical, has been found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. This issue affects some unknown processing of the file /goform/form2AddVrtsrv.cgi of the component Virtual Service Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-816 There are unspecified vulnerabilities in the firmware.Information may be tampered with. D-Link DIR-816 is a wireless router from D-Link of China. Attackers can use this vulnerability to set up virtual services on the device
VAR-202501-0005 CVE-2024-13102 D-Link Systems, Inc.  of  DIR-816  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability classified as critical was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. This vulnerability affects unknown code of the file /goform/DDNS of the component DDNS Service. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-816 There are unspecified vulnerabilities in the firmware.Information may be tampered with. D-Link DIR-816 A2 is a wireless router from Taiwan's D-Link. Attackers can exploit this vulnerability to access and operate the DDNS service of the affected router, tamper with the DDNS settings, and obtain sensitive information
VAR-202412-2435 CVE-2024-13030 D-Link DIR-823G Web Management Interface HNAP1 SetVirtualServerSettings Improper Access Control Vulnerability CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability was found in D-Link DIR-823G 1.0.2B05_20181207. It has been rated as critical. This issue affects the function SetAutoRebootSettings/SetClientInfo/SetDMZSettings/SetFirewallSettings/SetParentsControlInfo/SetQoSSettings/SetVirtualServerSettings of the file /HNAP1/ of the component Web Management Interface. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link DIR-823G is a wireless router that provides network connectivity and management capabilities for home and small offices. An attacker can exploit this vulnerability to cause unauthorized access control
VAR-202412-3017 CVE-2023-7266 plural  Huawei  Product vulnerabilities CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Some Huawei home routers have a connection hijacking vulnerability. Successful exploitation of this vulnerability may cause DoS or information leakage.(Vulnerability ID:HWPSIRT-2023-76605) This vulnerability has been assigned a (CVE)ID:CVE-2023-7266. Huawei of TC7001-10 firmware, WS7200-10 firmware, WS7206-10 There are unspecified vulnerabilities in the firmware.Information is obtained and service operation is interrupted (DoS) It may be in a state
VAR-202412-2475 CVE-2024-12988 of netgear  R6900P  firmware and  R7000P  Out-of-bounds write vulnerability in firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability has been found in Netgear R6900P and R7000P 1.3.3.154 and classified as critical. Affected by this vulnerability is the function sub_16C4C of the component HTTP Header Handler. The manipulation of the argument Host leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. of netgear R6900P firmware and R7000P An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. NETGEAR R6900P and R7000P are wireless routers launched by NETGEAR, providing high-speed Internet connection and network management functions. Attackers can exploit this vulnerability to cause the service to crash
VAR-202412-2441 CVE-2024-12987 DrayTek Corporation  of  Vigor300b  firmware and  Vigor2960  Command injection vulnerability in firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component. DrayTek Corporation of Vigor300b firmware and Vigor2960 The firmware contains a command injection vulnerability. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202412-2377 CVE-2024-12986 DrayTek Corporation  of  Vigor300b  firmware and  Vigor2960  Command injection vulnerability in firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability, which was classified as critical, has been found in DrayTek Vigor2960 and Vigor300B 1.5.1.3/1.5.1.4. This issue affects some unknown processing of the file /cgi-bin/mainfunction.cgi/apmcfgupptim of the component Web Management Interface. The manipulation of the argument session leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component. DrayTek Corporation of Vigor300b firmware and Vigor2960 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202412-3262 CVE-2020-9253 Huawei  of  Lion-AL00C  Out-of-bounds write vulnerability in firmware CVSS V2: 7.5
CVSS V3: 6.3
Severity: MEDIUM
There is a stack overflow vulnerability in some Huawei smart phone. An attacker can craft specific packet to exploit this vulnerability. Due to insufficient verification, this could be exploited to tamper with the information to affect the availability. (Vulnerability ID: HWPSIRT-2019-11030) This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9253. Huawei of Lion-AL00C An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. Huawei Lion-AL00C is a smartphone from Huawei, a Chinese company
VAR-202412-2693 CVE-2020-9210 Huawei  of  Myna  Vulnerability related to insufficient data integrity verification in firmware CVSS V2: 10.0
CVSS V3: 6.8
Severity: MEDIUM
There is an insufficient integrity vulnerability in Huawei products. A module does not perform sufficient integrity check in a specific scenario. Attackers can exploit the vulnerability by physically install malware. This could compromise normal service of the affected device. (Vulnerability ID: HWPSIRT-2020-00145) This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9210. Huawei of Myna Firmware contains a vulnerability related to insufficient data integrity validation.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Myna is a smart speaker from Huawei, a Chinese company
VAR-202412-3294 CVE-2024-54907 TOTOLINK  of  A3002R  Code injection vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK A3002R V4.0.0-B20230531.1404 is vulnerable to Remote Code Execution in /bin/boa via formWsc. TOTOLINK of A3002R A code injection vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R is a wireless dual-band Gigabit router. An attacker can exploit this vulnerability to remotely execute malicious code in the target