VARIoT IoT vulnerabilities database
| VAR-202106-1170 | CVE-2021-33184 | Synology Download Station Server-side Request Forgery Vulnerability |
CVSS V2: 4.0 CVSS V3: 7.7 Severity: HIGH |
Server-Side request forgery (SSRF) vulnerability in task management component in Synology Download Station before 3.8.15-3563 allows remote authenticated users to read arbitrary files via unspecified vectors. Synology Download Station Contains a server-side request forgery vulnerability.Information may be obtained. Synology Download Station is a browser extension. You can browse the downloading and downloaded tasks of the download center package without visiting the web version of Synology, and you can also add tasks
| VAR-202106-1169 | CVE-2021-33183 | Synology Docker Traversal Vulnerability in Japan |
CVSS V2: 3.6 CVSS V3: 7.9 Severity: HIGH |
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability container volume management component in Synology Docker before 18.09.0-0515 allows local users to read or write arbitrary files via unspecified vectors. Synology Docker Contains a path traversal vulnerability.Information may be obtained and information may be tampered with. Docker is an open source application container engine developed by American Docker Company. This product supports the creation of a container (lightweight virtual machine) on a Linux system and the deployment and operation of applications, as well as the automatic installation, deployment and upgrade of applications through configuration files
| VAR-202106-1168 | CVE-2021-33182 | Synology DiskStation Manager Traversal Vulnerability in Japan |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in PDF Viewer component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows remote authenticated users to read limited files via unspecified vectors. Synology DiskStation Manager (DSM) Contains a path traversal vulnerability.Information may be obtained. Synology DiskStation Manager (DSM) is an operating system for network storage servers (NAS) developed by Synology, Taiwan. The operating system can manage data, documents, photos, music and other information
| VAR-202106-1167 | CVE-2021-33181 | Synology Video Station Server-side Request Forgery Vulnerability |
CVSS V2: 6.5 CVSS V3: 9.1 Severity: CRITICAL |
Server-Side Request Forgery (SSRF) vulnerability in webapi component in Synology Video Station before 2.4.10-1632 allows remote authenticated users to send arbitrary request to intranet resources via unspecified vectors. Synology Video Station is a video management center. All movies, TV shows and home videos on your Synology NAS can be managed
| VAR-202106-1166 | CVE-2021-33180 | Synology Media Server In SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in cgi component in Synology Media Server before 1.8.1-2876 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. Synology Media Server Has SQL An injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Synology Media Server is a media server
| VAR-202105-1575 | No CVE | A weak password vulnerability exists in the D-Link router management page |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
D-Link Electronic Equipment (Shanghai) Co., Ltd. was established on August 13, 2002. The company's business scope includes routers, network cards, hubs, switches, converters, etc. in the region.
The D-Link router management page has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202105-1576 | No CVE | Leguang equipment management system has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Leguang is a brand of wireless network products independently developed by Shenzhen Chaohenghui Network Technology Co., Ltd.
Leguang equipment management system has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202105-1581 | No CVE | Feiyuxing home smart router has logic flaws and loopholes |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Chengdu Feiyuxing Technology Co., Ltd. was established in 2002 as a high-tech enterprise focusing on product innovation and research and development in the data communication industry and the Internet of Things industry.
Feiyuxing home intelligent routing has logic flaws and loopholes. Attackers can use the vulnerability to bypass the login by modifying the return packet and view sensitive information.
| VAR-202105-1684 | No CVE | Unauthorized access vulnerability exists in Cisco Wireless-G Internet Home Monitoring Camera |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco is the world's leading provider of network solutions.
Cisco Wireless-G Internet Home Monitoring Camera has an unauthorized access vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
| VAR-202105-1709 | No CVE | Panasonic-SF335 camera has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Matsushita Electric (China) Co., Ltd. is an electronics manufacturer engaged in the production and sales of various electrical products.
The Panasonic-SF335 camera has an unauthorized access vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
| VAR-202106-0642 | CVE-2021-20731 | Buffalo router WSR-1166DHP3 and WSR-1166DHP4 Multiple vulnerabilities in |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
WSR-1166DHP3 firmware Ver.1.16 and prior and WSR-1166DHP4 firmware Ver.1.02 and prior allow an attacker to execute arbitrary OS commands with root privileges via unspecified vectors. Provided by Buffalo Inc. WSR-1166DHP3 and WSR-1166DHP4 The following multiple vulnerabilities exist in. * Inadequate access restrictions (CWE-284) - CVE-2021-20730 ‥ * OS Command injection (CWE-78) - CVE-2021-20731 The following is the vulnerability information JPCERT/CC Report to JPCERT/CC Coordinated with the developers. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows. * Device configuration information stolen by an attacker on an adjacent network - CVE-2021-20730 ‥ * By an attacker on an adjacent network root Some with authority OS Command is executed - CVE-2021-20731.
Buffalo WSR-1166DHP3 and WSR-1166DHP4 have operating system command injection vulnerability
| VAR-202106-0641 | CVE-2021-20730 | Buffalo router WSR-1166DHP3 and WSR-1166DHP4 Multiple vulnerabilities in |
CVSS V2: 3.3 CVSS V3: 4.3 Severity: MEDIUM |
Improper access control vulnerability in WSR-1166DHP3 firmware Ver.1.16 and prior and WSR-1166DHP4 firmware Ver.1.02 and prior allows an attacker to obtain configuration information via unspecified vectors. Provided by Buffalo Inc. WSR-1166DHP3 and WSR-1166DHP4 The following multiple vulnerabilities exist in. * Inadequate access restrictions (CWE-284) - CVE-2021-20730 ‥ * OS Command injection (CWE-78) - CVE-2021-20731 The following is the vulnerability information JPCERT/CC Report to JPCERT/CC Coordinated with the developers. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows. * Device configuration information stolen by an attacker on an adjacent network - CVE-2021-20730 ‥ * By an attacker on an adjacent network root Some with authority OS Command is executed - CVE-2021-20731. in Japan.
Buffalo WSR-1166DHP3 and WSR-1166DHP4 have an access control error vulnerability
| VAR-202105-1577 | No CVE | Lenovo NetMaster Security Gateway has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Beijing Wangyu Xingyun Information Technology Co., Ltd. was renamed from Lenovo Wangyu Technology (Beijing) Co., Ltd., and its predecessor was Lenovo Group Information Security Division. The main business covers network boundary security protection, application and data security protection, and network-wide security risk management.
The Lenovo Netmaster Security Gateway has weak password vulnerabilities. The attacker uses a weak password to log in to the background to obtain sensitive information.
| VAR-202105-1579 | No CVE | Ruijie Networks ASME access shared management engine has logic flaws and vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ASME Access Sharing Management Engine is an anti-agent product based on DPI application layer detection.
Ruijie Networks’ ASME access shared management engine has logic flaws and vulnerabilities. The attacker can view and modify the returned packet by capturing the packet, fill in the password at will, and successfully log in to the background to obtain sensitive information.
| VAR-202105-1580 | No CVE | Huawei S9306 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
S9306 is a routing switch, POE switch.
Huawei S9306 has a weak password vulnerability. The attacker uses a weak password to log in to the background to obtain sensitive information.
| VAR-202105-1582 | No CVE | Shenzhen Tenghu IOT Technology Co., Ltd. AC9563 has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Shenzhen Tenghu IOT Technology Co., Ltd. was established in August 2013. It is an Internet technology company integrating R&D, manufacturing, sales and service of commercial wireless network products.
Shenzhen Tenghu IOT Technology Co., Ltd. AC9563 has a weak password vulnerability. Attackers can use weak passwords to log in to the background to obtain sensitive information.
| VAR-202105-1583 | No CVE | Huawei S9312 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
S9312 is a switch.
Huawei S9312 has a weak password vulnerability. The attacker uses a weak password to log in to the background to obtain sensitive information.
| VAR-202105-1584 | No CVE | Feiyuxing router has an information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Chengdu Feiyuxing Technology Co., Ltd. was established in 2002 as a high-tech enterprise focusing on product innovation and research and development in the data communication industry and the Internet of Things industry.
The Feiyuxing router has an information disclosure vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
| VAR-202105-1578 | No CVE | Vigor series products have logic flaws and vulnerabilities |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Shanghai Juyi Technology Development Co., Ltd., legal representative: Wang Nan, registered capital: 1 million yuan, address: JT1225, Room 2201, No. 888 Moyu South Road, Anting Town, Jiading District, Shanghai, Business Scope: General Projects: Technical Services, Technical Development , Technology consultation, technology exchange, technology transfer, technology promotion; software development; computer software and hardware and auxiliary equipment wholesale, etc.
Vigor series products have logic flaws, which can be exploited by attackers to obtain sensitive information.
| VAR-202105-1585 | No CVE | Network Video Server network video server has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Network Video Server is a network video server.
The Network Video Server network video server has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.