VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202501-0024 CVE-2024-13106 D-Link Systems, Inc.  of  DIR-816  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210 and classified as critical. Affected by this issue is some unknown functionality of the file /goform/form2IPQoSTcAdd of the component IP QoS Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-816 There are unspecified vulnerabilities in the firmware.Information may be tampered with. D-Link DIR-816 A2 is a wireless router from D-Link of China. Attackers can exploit this vulnerability to set the QoS settings of the device
VAR-202501-0054 CVE-2024-13105 D-Link Systems, Inc.  of  DIR-816  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability has been found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/form2Dhcpd.cgi of the component DHCPD Setting Handler. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-816 There are unspecified vulnerabilities in the firmware.Information may be tampered with. D-Link DIR-816 A2 is a wireless router from D-Link of China. Attackers can use this vulnerability to set up the dhcp service of the device
VAR-202501-0004 CVE-2024-13104 D-Link Systems, Inc.  of  DIR-816  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability, which was classified as critical, was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. Affected is an unknown function of the file /goform/form2AdvanceSetup.cgi of the component WiFi Settings Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-816 There are unspecified vulnerabilities in the firmware.Information may be tampered with. D-Link DIR-816 A2 is a wireless router from D-Link of China. Attackers can use this vulnerability to set the device's 2.4G and 5G advanced settings
VAR-202501-0033 CVE-2024-13103 D-Link Systems, Inc.  of  DIR-816  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability, which was classified as critical, has been found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. This issue affects some unknown processing of the file /goform/form2AddVrtsrv.cgi of the component Virtual Service Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-816 There are unspecified vulnerabilities in the firmware.Information may be tampered with. D-Link DIR-816 is a wireless router from D-Link of China. Attackers can use this vulnerability to set up virtual services on the device
VAR-202501-0005 CVE-2024-13102 D-Link Systems, Inc.  of  DIR-816  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability classified as critical was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. This vulnerability affects unknown code of the file /goform/DDNS of the component DDNS Service. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-816 There are unspecified vulnerabilities in the firmware.Information may be tampered with. D-Link DIR-816 A2 is a wireless router from Taiwan's D-Link. Attackers can exploit this vulnerability to access and operate the DDNS service of the affected router, tamper with the DDNS settings, and obtain sensitive information
VAR-202412-2435 CVE-2024-13030 D-Link DIR-823G Web Management Interface HNAP1 SetVirtualServerSettings Improper Access Control Vulnerability CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability was found in D-Link DIR-823G 1.0.2B05_20181207. It has been rated as critical. This issue affects the function SetAutoRebootSettings/SetClientInfo/SetDMZSettings/SetFirewallSettings/SetParentsControlInfo/SetQoSSettings/SetVirtualServerSettings of the file /HNAP1/ of the component Web Management Interface. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link DIR-823G is a wireless router that provides network connectivity and management capabilities for home and small offices. An attacker can exploit this vulnerability to cause unauthorized access control
VAR-202412-3017 CVE-2023-7266 plural  Huawei  Product vulnerabilities CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Some Huawei home routers have a connection hijacking vulnerability. Successful exploitation of this vulnerability may cause DoS or information leakage.(Vulnerability ID:HWPSIRT-2023-76605) This vulnerability has been assigned a (CVE)ID:CVE-2023-7266. Huawei of TC7001-10 firmware, WS7200-10 firmware, WS7206-10 There are unspecified vulnerabilities in the firmware.Information is obtained and service operation is interrupted (DoS) It may be in a state
VAR-202412-2475 CVE-2024-12988 of netgear  R6900P  firmware and  R7000P  Out-of-bounds write vulnerability in firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability has been found in Netgear R6900P and R7000P 1.3.3.154 and classified as critical. Affected by this vulnerability is the function sub_16C4C of the component HTTP Header Handler. The manipulation of the argument Host leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. of netgear R6900P firmware and R7000P An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. NETGEAR R6900P and R7000P are wireless routers launched by NETGEAR, providing high-speed Internet connection and network management functions. Attackers can exploit this vulnerability to cause the service to crash
VAR-202412-2441 CVE-2024-12987 DrayTek Corporation  of  Vigor300b  firmware and  Vigor2960  Command injection vulnerability in firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component. DrayTek Corporation of Vigor300b firmware and Vigor2960 The firmware contains a command injection vulnerability. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202412-2377 CVE-2024-12986 DrayTek Corporation  of  Vigor300b  firmware and  Vigor2960  Command injection vulnerability in firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability, which was classified as critical, has been found in DrayTek Vigor2960 and Vigor300B 1.5.1.3/1.5.1.4. This issue affects some unknown processing of the file /cgi-bin/mainfunction.cgi/apmcfgupptim of the component Web Management Interface. The manipulation of the argument session leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component. DrayTek Corporation of Vigor300b firmware and Vigor2960 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202412-3262 CVE-2020-9253 Huawei  of  Lion-AL00C  Out-of-bounds write vulnerability in firmware CVSS V2: 7.5
CVSS V3: 6.3
Severity: MEDIUM
There is a stack overflow vulnerability in some Huawei smart phone. An attacker can craft specific packet to exploit this vulnerability. Due to insufficient verification, this could be exploited to tamper with the information to affect the availability. (Vulnerability ID: HWPSIRT-2019-11030) This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9253. Huawei of Lion-AL00C An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. Huawei Lion-AL00C is a smartphone from Huawei, a Chinese company
VAR-202412-2693 CVE-2020-9210 Huawei  of  Myna  Vulnerability related to insufficient data integrity verification in firmware CVSS V2: 10.0
CVSS V3: 6.8
Severity: MEDIUM
There is an insufficient integrity vulnerability in Huawei products. A module does not perform sufficient integrity check in a specific scenario. Attackers can exploit the vulnerability by physically install malware. This could compromise normal service of the affected device. (Vulnerability ID: HWPSIRT-2020-00145) This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9210. Huawei of Myna Firmware contains a vulnerability related to insufficient data integrity validation.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Myna is a smart speaker from Huawei, a Chinese company
VAR-202412-3294 CVE-2024-54907 TOTOLINK  of  A3002R  Code injection vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK A3002R V4.0.0-B20230531.1404 is vulnerable to Remote Code Execution in /bin/boa via formWsc. TOTOLINK of A3002R A code injection vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R is a wireless dual-band Gigabit router. An attacker can exploit this vulnerability to remotely execute malicious code in the target
VAR-202412-2591 CVE-2024-51471 IBM  of  IBM MQ Appliance  Out-of-bounds read vulnerability in CVSS V2: 4.9
CVSS V3: 5.3
Severity: MEDIUM
IBM MQ Appliance 9.3 LTS, 9.3 CD, and 9.4 LTS web console could allow an authenticated user to cause a denial-of-service when trace is enabled due to information being written into memory outside of the intended buffer size. IBM of IBM MQ Appliance Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. IBM MQ Appliance is an all-in-one device for rapid deployment of enterprise-level messaging middleware from International Business Machines (IBM). IBM MQ Appliance 9.3 LTS, 9.3 CD, and 9.4 LTS versions have a buffer overflow vulnerability. The vulnerability is caused by the information being written into the memory exceeding the expected buffer size. Attackers can exploit this vulnerability to cause a denial of service attack
VAR-202412-2559 CVE-2023-4617 Vulnerability in Govee Home mobile application (Android & iOS) CVSS V2: -
CVSS V3: 10.0
Severity: CRITICAL
Incorrect authorization vulnerability in HTTP POST method in Govee Home application on Android and iOS allows remote attacker to control devices owned by other users via changing "device", "sku" and "type" fields' values.   This issue affects Govee Home applications on Android and iOS in versions before 5.9
VAR-202412-2770 CVE-2024-12569 Siemens Siveillance Video Camera Driver Information Disclosure Vulnerability CVSS V2: 5.6
CVSS V3: 7.8
Severity: Medium
Disclosure of sensitive information in a Milestone XProtect Device Pack driver’s log file for third-party cameras, allows an attacker to read camera credentials stored in the Recording Server under specific conditions. Siveillance Video (formerly known as Siveillance VMS) is a powerful IP video management software designed for deployments ranging from small and simple to large and high security. The Siveillance Video portfolio includes four versions: Siveillance Video Core, Core Plus, Advanced and Pro, which can meet specific needs from small and medium solutions to large and complex deployments
VAR-202412-2528 CVE-2024-12175 Rockwell Automation  of  Arena  Vulnerability in using free memory in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. (DoS) It may be in a state. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Rockwell Automation Arena Simulation is a set of simulation software from Rockwell Automation, an American company, that provides 3D animation and graphics functions
VAR-202412-2454 CVE-2024-12371 Rockwell Automation Power Monitor 1000 Device Takeover Vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: Critical
A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset. Rockwell Automation Power Monitor 1000 versions prior to 4.020 have a security vulnerability that can be exploited by attackers to configure new policy holder users without any authentication through the API
VAR-202412-2453 CVE-2023-34990 fortinet's  FortiWLM  relative path traversal vulnerability in CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests. fortinet's FortiWLM contains a relative path traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiWLM is a wireless manager of Fortinet, an American company. Fortinet FortiWLM has a path traversal vulnerability, which is caused by the program failing to properly filter special elements in resource or file paths
VAR-202412-0615 CVE-2024-37607 D-Link Systems, Inc.  of  DAP-2555  Classic buffer overflow vulnerability in firmware CVSS V2: 6.1
CVSS V3: 6.5
Severity: MEDIUM
A Buffer overflow vulnerability in D-Link DAP-2555 REVA_FIRMWARE_1.20 allows remote attackers to cause a Denial of Service (DoS) via a crafted HTTP request. D-Link Systems, Inc. of DAP-2555 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. D-Link DAP-2555 is a wireless access point of D-Link, a Chinese company. D-Link DAP-2555 REVA_FIRMWARE_1.20 version has a denial of service vulnerability, which is caused by null pointer dereference