VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202106-2076 No CVE DrayTek Vigor2912 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Vigor 2912 is a high-performance firewall router product for small and medium-sized enterprises. DrayTek Vigor2912 has a weak password vulnerability. The attacker uses a weak password to log in to the background to obtain sensitive information.
VAR-202106-2080 No CVE DrayTek Vigor2922 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Vigor2922 is a high-performance Internet behavior management VPN router product for small and medium-sized enterprises. DrayTek Vigor2922 has a weak password vulnerability. The attacker uses a weak password to log in to the background to obtain sensitive information.
VAR-202106-2298 No CVE An arbitrary file reading vulnerability exists in the video conferencing terminal of Saida Technology Cloud Vision CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The business of Anhui Saida Technology Co., Ltd. focuses on the smart cloud video industry, relying on the network of communication operators, adopting a new generation of information technology to create a "cloud video application engine", focusing on the research and development of big data application platforms and smart terminal products, and providing professional Comprehensive information solutions effectively support various livelihood applications in smart cities, and empower smart homes, government affairs, agriculture, ecology, the Internet of Things, information security and other industries. There are arbitrary file reading vulnerabilities in the video conferencing terminal of Sida Technology Cloud Vision. Attackers can use vulnerabilities to read arbitrary files on the server.
VAR-202106-2326 No CVE A command execution vulnerability exists in the integrated security system of Hangzhou Hikvision Digital Technology Co., Ltd. CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Hikvision is a video-centric intelligent IoT solution and big data service provider. A command execution vulnerability exists in the integrated security system of Hangzhou Hikvision Digital Technology Co., Ltd. An attacker can use this vulnerability to gain server permissions.
VAR-202106-2327 No CVE China Consumer Cloud Technology Co., Ltd. has logic flaws and loopholes in the fire-fighting first-level platform CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
China Consumer Cloud Technology Co., Ltd. is an enterprise that invests in the construction and operation of smart city safety emergency service projects based on the Internet of Things, cloud computing, and big data. The smart city safety emergency service projects cover emergency response, public security, safety supervision, fire protection, environmental protection, Medical, health and epidemic prevention, natural disasters and other fields are the core components of smart cities/safe cities. China Consumer Cloud Technology Co., Ltd.'s fire-fighting first-level platform has logic flaws and loopholes. Attackers can use this vulnerability to obtain sensitive information.
VAR-202106-2072 No CVE Ruijie Networks Co., Ltd. NBR1300G has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
NBR1300G is an enterprise router launched by Ruijie Networks Co., Ltd. Ruijie Networks Co., Ltd. NBR1300G has a command execution vulnerability. Attackers can use this vulnerability to execute arbitrary commands.
VAR-202106-2073 No CVE Ruijie Networks Co., Ltd. NBR1000G has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
NBR1000G is a router launched by Ruijie Networks Co., Ltd. Ruijie Networks Co., Ltd. NBR1000G has a command execution vulnerability. Attackers can use this vulnerability to execute arbitrary commands.
VAR-202106-2074 No CVE Panasonic Electric (China) Co., Ltd. Network Camera BB-ST162A and BB-ST162 have unauthorized access vulnerabilities CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Matsushita Electric (China) Co., Ltd. is mainly responsible for the sales and after-sales service activities of home appliances, systems, environment, components and other commodities. Matsushita Electric (China) Co., Ltd. Network Camera BB-ST162A and BB-ST162 have unauthorized access vulnerabilities, which can be exploited by attackers to obtain sensitive information.
VAR-202106-2075 No CVE Ruijie Networks Co., Ltd. RG-NBR700G has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
RG-NBR700G is an Internet behavior management router launched by Ruijie. It is a router designed for all office scenarios. Ruijie Networks Co., Ltd. RG-NBR700G has a weak password vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202106-2077 No CVE Sapido router has command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Sapido specializes in the design and development of smart full wireless security systems and hardware devices. At the same time, it has the R&D capabilities of APP. It covers smart home SMART HOME TOTAL SOLUTION and smart manufacturing & ERP and other comprehensive enterprise integration solutions. It provides wireless sharing devices, Netcom products, and smart sockets. , Monitoring and security products. The Sapido router has a command execution vulnerability, which can be used by attackers to execute arbitrary commands.
VAR-202106-2078 No CVE D-Link DCS-4622 has an information disclosure vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
DCS-4622 is a three-megapixel 360-degree fisheye network camera. D-Link DCS-4622 has an information disclosure vulnerability, which can be exploited by attackers to obtain account passwords.
VAR-202106-2079 No CVE Hanbo Technology Co., Ltd. PA-5500-U06 has a weak password vulnerability CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Opzoon Technology Co., Ltd. (English: Opzoon) is a world-leading provider of cloud computing data center solutions and the first high-tech enterprise in China to establish an enterprise-level applied mathematics laboratory. Hanbo Technology Co., Ltd. PA-5500-U06 has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-0373 CVE-2020-29323 D-link DIR-885L MFC Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The D-link router DIR-885L-MFC 1.15b02, v1.21b05 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data. D-link Router DIR-885L-MFC Exists in an inadequate protection of credentials.Information may be obtained. D-Link DIR-885L MFC is a wireless router produced by D-Link in Taiwan. D-link DIR-885L-MFC 1.15b02, v1.21b05 has an information disclosure vulnerability. This vulnerability originates from DIR-885L-MFC 1.15b02, v1.21b05
VAR-202106-0374 CVE-2020-29324 D-Link DIR-895L MFC Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The DLink Router DIR-895L MFC v1.21b05 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data. DLink Router DIR-895L MFC Contains a vulnerability in the plaintext storage of important information.Information may be obtained. D-Link DIR-895L MFC is a wireless router produced by D-Link in Taiwan. DLink DIR-895L MFC v1.21b05 has an information disclosure vulnerability
VAR-202106-0372 CVE-2020-29322 D-Link  Router  DIR-880L  Vulnerability regarding inadequate protection of credentials in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The D-Link router DIR-880L 1.07 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data. D-Link Router DIR-880L Exists in an inadequate protection of credentials.Information may be obtained. D-Link DIR-880L is a wireless AC1900 dual-band gigabit cloud router. D-Link DIR-880L version 1.07 has a credential disclosure vulnerability
VAR-202106-0371 CVE-2020-29321 D-Link DIR-868L Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The D-Link router DIR-868L 3.01 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data. D-Link Router DIR-868L Exists in an inadequate protection of credentials.Information may be obtained. D-Link DIR-868L is a wireless AC1750 dual-band gigabit cloud router. D-Link DIR-868L version 3.01 has a credential disclosure vulnerability
VAR-202106-2301 No CVE ATO Technology Co., Ltd. NA400PLC has industrial control equipment vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
NA400PLC is a high-performance programmable controller launched by Autotop Technology Co., Ltd. The NA400PLC of Autotop Technology Co., Ltd. has a vulnerability in industrial control equipment. Attackers can use the vulnerability to modify user passwords.
VAR-202106-2325 No CVE China Telecom's NB-IOT smart device management platform has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
China Telecom's NB-IOT smart device management platform is an IoT management platform. China Telecom's NB-IOT smart device management platform has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202106-0716 CVE-2020-5008 IBM DataPower Gateway  Vulnerability in insecure storage of important information in CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
IBM DataPower Gateway 10.0.0.0 through 10.0.1.0 and 2018.4.1.0 through 2018.4.1.14 stores sensitive information in GET request parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 193033. Vendor exploits this vulnerability IBM X-Force ID: 193033 Is published as.Information may be obtained. IBM DataPower Gateway is a security and integration platform specially designed for mobile, cloud, application programming interface (API), network, service-oriented architecture (SOA), B2B and cloud workloads. The platform secures, integrates and optimizes access across channels with a dedicated gateway platform
VAR-202106-1498 CVE-2021-31252 plural  CHIYU Technology  Open redirect vulnerability in the product CVSS V2: 5.8
CVSS V3: 6.1
Severity: MEDIUM
An open redirect vulnerability exists in BF-630, BF-450M, BF-430, BF-431, BF631-W, BF830-W, Webpass, and SEMAC devices from CHIYU Technology that can be exploited by sending a link that has a specially crafted URL to convince the user to click on it. plural CHIYU Technology The product contains an open redirect vulnerability.Information may be obtained and information may be tampered with