VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202106-1482 CVE-2021-29091 Synology Photo Station  Traversal Vulnerability in Japan CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in file management component in Synology Photo Station before 6.8.14-3500 allows remote authenticated users to write arbitrary files via unspecified vectors. Synology Photo Station Contains a path traversal vulnerability.Information may be tampered with. Synology Photo Station is a set of solutions for sharing pictures, videos and blogs on the Internet from Synology, a Taiwan-based company
VAR-202106-1481 CVE-2021-29090 Synology Photo Station  In  SQL  Injection vulnerability CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in PHP component in Synology Photo Station before 6.8.14-3500 allows remote authenticated users to execute arbitrary SQL command via unspecified vectors. Synology Photo Station Has SQL An injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Synology Photo Station is a set of solutions for sharing pictures, videos and blogs on the Internet from Synology, a Taiwan-based company
VAR-202106-1480 CVE-2021-29089 Synology Photo Station  In  SQL  Injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in thumbnail component in Synology Photo Station before 6.8.14-3500 allows remote attackers users to execute arbitrary SQL commands via unspecified vectors. Synology Photo Station Has SQL An injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Synology Photo Station is a set of solutions for sharing pictures, videos and blogs on the Internet from Synology, a Taiwan-based company
VAR-202106-1479 CVE-2021-29088 Synology DiskStation Manager  Traversal Vulnerability in Japan CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Improper limitation of a pathname to a restricted directory ('Path Traversal') in cgi component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows local users to execute arbitrary code via unspecified vectors. Synology DiskStation Manager (DSM) Contains a path traversal vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Synology DiskStation Manager (DSM) is an operating system for network storage servers (NAS) developed by Synology, Taiwan. The operating system can manage data, documents, photos, music and other information
VAR-202106-1413 CVE-2021-23018 NGINX Controller  Vulnerability in plaintext transmission of important information in CVSS V2: 5.8
CVSS V3: 7.4
Severity: HIGH
Intra-cluster communication does not use TLS. The services within the NGINX Controller 3.x before 3.4.0 namespace are using cleartext protocols inside the cluster. NGINX Controller Contains a vulnerability in the transmission of important information in clear text.Information may be obtained and information may be tampered with. Nginx is a lightweight web server/reverse proxy server and email (IMAP/POP3) proxy server of Nginx Company in the United States. There is a security vulnerability in the Nginx controller. An attacker could exploit this vulnerability to read and modify data sent between services managed within an affected controller
VAR-202106-1170 CVE-2021-33184 Synology Download Station  Server-side Request Forgery Vulnerability CVSS V2: 4.0
CVSS V3: 7.7
Severity: HIGH
Server-Side request forgery (SSRF) vulnerability in task management component in Synology Download Station before 3.8.15-3563 allows remote authenticated users to read arbitrary files via unspecified vectors. Synology Download Station Contains a server-side request forgery vulnerability.Information may be obtained. Synology Download Station is a browser extension. You can browse the downloading and downloaded tasks of the download center package without visiting the web version of Synology, and you can also add tasks
VAR-202106-1169 CVE-2021-33183 Synology Docker  Traversal Vulnerability in Japan CVSS V2: 3.6
CVSS V3: 7.9
Severity: HIGH
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability container volume management component in Synology Docker before 18.09.0-0515 allows local users to read or write arbitrary files via unspecified vectors. Synology Docker Contains a path traversal vulnerability.Information may be obtained and information may be tampered with. Docker is an open source application container engine developed by American Docker Company. This product supports the creation of a container (lightweight virtual machine) on a Linux system and the deployment and operation of applications, as well as the automatic installation, deployment and upgrade of applications through configuration files
VAR-202106-1168 CVE-2021-33182 Synology DiskStation Manager  Traversal Vulnerability in Japan CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in PDF Viewer component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows remote authenticated users to read limited files via unspecified vectors. Synology DiskStation Manager (DSM) Contains a path traversal vulnerability.Information may be obtained. Synology DiskStation Manager (DSM) is an operating system for network storage servers (NAS) developed by Synology, Taiwan. The operating system can manage data, documents, photos, music and other information
VAR-202106-1167 CVE-2021-33181 Synology Video Station  Server-side Request Forgery Vulnerability CVSS V2: 6.5
CVSS V3: 9.1
Severity: CRITICAL
Server-Side Request Forgery (SSRF) vulnerability in webapi component in Synology Video Station before 2.4.10-1632 allows remote authenticated users to send arbitrary request to intranet resources via unspecified vectors. Synology Video Station is a video management center. All movies, TV shows and home videos on your Synology NAS can be managed
VAR-202106-1166 CVE-2021-33180 Synology Media Server  In  SQL  Injection vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in cgi component in Synology Media Server before 1.8.1-2876 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. Synology Media Server Has SQL An injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Synology Media Server is a media server
VAR-202105-1575 No CVE A weak password vulnerability exists in the D-Link router management page CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
D-Link Electronic Equipment (Shanghai) Co., Ltd. was established on August 13, 2002. The company's business scope includes routers, network cards, hubs, switches, converters, etc. in the region. The D-Link router management page has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202105-1576 No CVE Leguang equipment management system has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Leguang is a brand of wireless network products independently developed by Shenzhen Chaohenghui Network Technology Co., Ltd. Leguang equipment management system has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202105-1581 No CVE Feiyuxing home smart router has logic flaws and loopholes CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Chengdu Feiyuxing Technology Co., Ltd. was established in 2002 as a high-tech enterprise focusing on product innovation and research and development in the data communication industry and the Internet of Things industry. Feiyuxing home intelligent routing has logic flaws and loopholes. Attackers can use the vulnerability to bypass the login by modifying the return packet and view sensitive information.
VAR-202105-1684 No CVE Unauthorized access vulnerability exists in Cisco Wireless-G Internet Home Monitoring Camera CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco is the world's leading provider of network solutions. Cisco Wireless-G Internet Home Monitoring Camera has an unauthorized access vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
VAR-202105-1709 No CVE Panasonic-SF335 camera has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Matsushita Electric (China) Co., Ltd. is an electronics manufacturer engaged in the production and sales of various electrical products. The Panasonic-SF335 camera has an unauthorized access vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
VAR-202106-0642 CVE-2021-20731 Buffalo router  WSR-1166DHP3  and  WSR-1166DHP4  Multiple vulnerabilities in CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
WSR-1166DHP3 firmware Ver.1.16 and prior and WSR-1166DHP4 firmware Ver.1.02 and prior allow an attacker to execute arbitrary OS commands with root privileges via unspecified vectors. Provided by Buffalo Inc. WSR-1166DHP3 and WSR-1166DHP4 The following multiple vulnerabilities exist in. * Inadequate access restrictions (CWE-284) - CVE-2021-20730 ‥ * OS Command injection (CWE-78) - CVE-2021-20731 The following is the vulnerability information JPCERT/CC Report to JPCERT/CC Coordinated with the developers. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows. * Device configuration information stolen by an attacker on an adjacent network - CVE-2021-20730 ‥ * By an attacker on an adjacent network root Some with authority OS Command is executed - CVE-2021-20731. Buffalo WSR-1166DHP3 and WSR-1166DHP4 have operating system command injection vulnerability
VAR-202106-0641 CVE-2021-20730 Buffalo router  WSR-1166DHP3  and  WSR-1166DHP4  Multiple vulnerabilities in CVSS V2: 3.3
CVSS V3: 4.3
Severity: MEDIUM
Improper access control vulnerability in WSR-1166DHP3 firmware Ver.1.16 and prior and WSR-1166DHP4 firmware Ver.1.02 and prior allows an attacker to obtain configuration information via unspecified vectors. Provided by Buffalo Inc. WSR-1166DHP3 and WSR-1166DHP4 The following multiple vulnerabilities exist in. * Inadequate access restrictions (CWE-284) - CVE-2021-20730 ‥ * OS Command injection (CWE-78) - CVE-2021-20731 The following is the vulnerability information JPCERT/CC Report to JPCERT/CC Coordinated with the developers. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows. * Device configuration information stolen by an attacker on an adjacent network - CVE-2021-20730 ‥ * By an attacker on an adjacent network root Some with authority OS Command is executed - CVE-2021-20731. in Japan. Buffalo WSR-1166DHP3 and WSR-1166DHP4 have an access control error vulnerability
VAR-202105-1577 No CVE Lenovo NetMaster Security Gateway has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Beijing Wangyu Xingyun Information Technology Co., Ltd. was renamed from Lenovo Wangyu Technology (Beijing) Co., Ltd., and its predecessor was Lenovo Group Information Security Division. The main business covers network boundary security protection, application and data security protection, and network-wide security risk management. The Lenovo Netmaster Security Gateway has weak password vulnerabilities. The attacker uses a weak password to log in to the background to obtain sensitive information.
VAR-202105-1579 No CVE Ruijie Networks ASME access shared management engine has logic flaws and vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
ASME Access Sharing Management Engine is an anti-agent product based on DPI application layer detection. Ruijie Networks’ ASME access shared management engine has logic flaws and vulnerabilities. The attacker can view and modify the returned packet by capturing the packet, fill in the password at will, and successfully log in to the background to obtain sensitive information.
VAR-202105-1580 No CVE Huawei S9306 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
S9306 is a routing switch, POE switch. Huawei S9306 has a weak password vulnerability. The attacker uses a weak password to log in to the background to obtain sensitive information.