VARIoT IoT vulnerabilities database
| VAR-202106-2054 | No CVE | ZTE Corporation ZXV10 W815N has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ZXV10 W815N is a wireless router of ZTE Corporation.
ZTE Corporation ZXV10 W815N has a weak password vulnerability. Attackers can use the vulnerability to obtain sensitive information.
| VAR-202106-2055 | No CVE | ZTE Corporation ZXHN E5500 has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ZXHN E5500 is a router of ZTE Corporation.
ZTE Corporation ZXHN E5500 has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202106-2056 | No CVE | RG-EG Easy Gateway web management system has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Ruijie Networks Co., Ltd. is a company mainly engaged in information system integration services; Internet virtual private network services; Internet management services.
RG-EG Easy Gateway web management system has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202106-2057 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability (CNVD-2021-32411) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Tenda AC11 is a wireless router that uses RTOS operating system.
Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202106-2058 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability (CNVD-2021-32412) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Tenda AC11 is a wireless router that uses RTOS operating system.
Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202106-2059 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability (CNVD-2021-32413) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Tenda AC11 is a wireless router that uses RTOS operating system.
Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202106-2060 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability (CNVD-2021-32415) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Tenda AC11 is a wireless router that uses RTOS operating system.
Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202106-2061 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability (CNVD-2021-32416) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Tenda AC11 is a wireless router that uses RTOS operating system.
Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202106-2062 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability (CNVD-2021-32414) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Tenda AC11 is a wireless router that uses RTOS operating system.
Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202106-2063 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability (CNVD-2021-32410) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Tenda AC11 is a wireless router that uses RTOS operating system.
Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202106-2064 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Tenda AC11 is a wireless router that uses RTOS operating system.
Shenzhen Jixiang Tengda Technology Co., Ltd. AC 11 has a binary vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202106-2065 | No CVE | Shenzhen Leike Industrial Co., Ltd. NR286 router has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Shenzhen Leike Industrial Co., Ltd. was established in 2000 and is one of the leading domestic manufacturers with core technologies of intelligent routing and managed switches.
Shenzhen Leike Industrial Co., Ltd. NR286 router has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202106-2243 | No CVE | ZTE ZXR10 1800-2S has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ZTE ZXR10 1800-2S is a router of ZTE Corporation.
ZTE ZXR10 1800-2S has a weak password vulnerability. Attackers can use the vulnerability to obtain sensitive information.
| VAR-202106-1909 | CVE-2017-20005 | NGINXÂ Integer overflow vulnerability in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module. NGINX Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Nginx is a lightweight web server/reverse proxy server and email (IMAP/POP3) proxy server of Nginx Company in the United States. NGINX has a security vulnerability before 1.13.6. The vulnerability stems from the fact that when the autoindex module encounters this file, it will cause an integer overflow. ==========================================================================
Ubuntu Security Notice USN-5109-1
October 18, 2021
nginx vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Summary:
A security issue was fixed in nginx.
Software Description:
- nginx: small, powerful, scalable web/proxy server
Details:
It was discovered that nginx incorrectly handled files with
certain modification dates. A remote attacker could possibly
use this issue to cause a denial of service or other unspecified
impact.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 ESM:
nginx 1.10.3-0ubuntu0.16.04.5+esm2
Ubuntu 14.04 ESM:
nginx 1.4.6-1ubuntu3.9+esm3
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5109-1
CVE-2017-20005
| VAR-202106-2066 | No CVE | Feiyuxing enterprise-level intelligent online behavior management system has logic flaws and loopholes |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Chengdu Feiyuxing Technology Co., Ltd. is a company dedicated to providing intelligent and easy-to-use network communication products and services, continuously improving the quality of network use through innovative technologies, and cooperating with users to create an intelligent and user-friendly network management platform.
The Feiyuxing enterprise-level intelligent online behavior management system has logic flaws and loopholes. Attackers can use vulnerabilities to bypass account passwords and directly log in to the management background to obtain sensitive information.
| VAR-202106-2067 | No CVE | D-Link DIR-816 has a denial of service vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
D-Link DIR-816 is a wireless router.
D-Link DIR-816 has a denial of service vulnerability. Attackers can use this vulnerability to cause the program to crash.
| VAR-202106-2068 | No CVE | Feiyuxing enterprise-level intelligent wireless Internet behavior management system has command execution loopholes |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Chengdu Feiyuxing Technology Co., Ltd. is a company dedicated to providing intelligent and easy-to-use network communication products and services, continuously improving the quality of network use through innovative technologies, and cooperating with users to create an intelligent and user-friendly network management platform.
Feiyuxing enterprise-level intelligent online behavior management system has command execution loopholes. An attacker can use this vulnerability to gain server permissions.
| VAR-202106-2069 | No CVE | China Insurance Unlimited router has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
China Insurance Technology Group provides full system security services ranging from security systems to smart security management, monitoring, and fire protection. It can be combined with graphic control software, monitoring and access control integration solutions, biotechnology identification systems, computer fire extinguishing systems, and alarm systems for different needs of customers. And all-in-one card integration services.
A weak password vulnerability exists in Zhongbao Infinite Router. The attacker uses a weak password to log in to the background to obtain sensitive information.
| VAR-202106-2070 | No CVE | UTP UTP-R3050-5GP has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Established in 2005, UTEPO is an industrial communication and intelligent Internet of Things solution provider with "Internet and Electricity Speed Connection" technology as the core. Based on technological innovation, it is a smart park, smart security, smart city, Provide smart IoT solutions in fields such as smart agriculture and smart manufacturing.
UTP UTP-R3050-5GP has weak password vulnerability. Attackers can use weak passwords to log in to the system to obtain sensitive information.
| VAR-202106-2071 | No CVE | Smart WIFI leader has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Henan Pangu Technology Development Co., Ltd. is a professional enterprise organization that provides enterprises with network and information construction.
The smart WIFI leader has a weak password vulnerability. The attacker uses a weak password to log in to the background to obtain sensitive information.