VARIoT IoT vulnerabilities database
| VAR-202106-1482 | CVE-2021-29091 | Synology Photo Station Traversal Vulnerability in Japan |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in file management component in Synology Photo Station before 6.8.14-3500 allows remote authenticated users to write arbitrary files via unspecified vectors. Synology Photo Station Contains a path traversal vulnerability.Information may be tampered with. Synology Photo Station is a set of solutions for sharing pictures, videos and blogs on the Internet from Synology, a Taiwan-based company
| VAR-202106-1481 | CVE-2021-29090 | Synology Photo Station In SQL Injection vulnerability |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in PHP component in Synology Photo Station before 6.8.14-3500 allows remote authenticated users to execute arbitrary SQL command via unspecified vectors. Synology Photo Station Has SQL An injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Synology Photo Station is a set of solutions for sharing pictures, videos and blogs on the Internet from Synology, a Taiwan-based company
| VAR-202106-1480 | CVE-2021-29089 | Synology Photo Station In SQL Injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in thumbnail component in Synology Photo Station before 6.8.14-3500 allows remote attackers users to execute arbitrary SQL commands via unspecified vectors. Synology Photo Station Has SQL An injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Synology Photo Station is a set of solutions for sharing pictures, videos and blogs on the Internet from Synology, a Taiwan-based company
| VAR-202106-1479 | CVE-2021-29088 | Synology DiskStation Manager Traversal Vulnerability in Japan |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper limitation of a pathname to a restricted directory ('Path Traversal') in cgi component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows local users to execute arbitrary code via unspecified vectors. Synology DiskStation Manager (DSM) Contains a path traversal vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Synology DiskStation Manager (DSM) is an operating system for network storage servers (NAS) developed by Synology, Taiwan. The operating system can manage data, documents, photos, music and other information
| VAR-202106-1413 | CVE-2021-23018 | NGINX Controller Vulnerability in plaintext transmission of important information in |
CVSS V2: 5.8 CVSS V3: 7.4 Severity: HIGH |
Intra-cluster communication does not use TLS. The services within the NGINX Controller 3.x before 3.4.0 namespace are using cleartext protocols inside the cluster. NGINX Controller Contains a vulnerability in the transmission of important information in clear text.Information may be obtained and information may be tampered with. Nginx is a lightweight web server/reverse proxy server and email (IMAP/POP3) proxy server of Nginx Company in the United States. There is a security vulnerability in the Nginx controller. An attacker could exploit this vulnerability to read and modify data sent between services managed within an affected controller
| VAR-202106-1170 | CVE-2021-33184 | Synology Download Station Server-side Request Forgery Vulnerability |
CVSS V2: 4.0 CVSS V3: 7.7 Severity: HIGH |
Server-Side request forgery (SSRF) vulnerability in task management component in Synology Download Station before 3.8.15-3563 allows remote authenticated users to read arbitrary files via unspecified vectors. Synology Download Station Contains a server-side request forgery vulnerability.Information may be obtained. Synology Download Station is a browser extension. You can browse the downloading and downloaded tasks of the download center package without visiting the web version of Synology, and you can also add tasks
| VAR-202106-1169 | CVE-2021-33183 | Synology Docker Traversal Vulnerability in Japan |
CVSS V2: 3.6 CVSS V3: 7.9 Severity: HIGH |
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability container volume management component in Synology Docker before 18.09.0-0515 allows local users to read or write arbitrary files via unspecified vectors. Synology Docker Contains a path traversal vulnerability.Information may be obtained and information may be tampered with. Docker is an open source application container engine developed by American Docker Company. This product supports the creation of a container (lightweight virtual machine) on a Linux system and the deployment and operation of applications, as well as the automatic installation, deployment and upgrade of applications through configuration files
| VAR-202106-1168 | CVE-2021-33182 | Synology DiskStation Manager Traversal Vulnerability in Japan |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in PDF Viewer component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows remote authenticated users to read limited files via unspecified vectors. Synology DiskStation Manager (DSM) Contains a path traversal vulnerability.Information may be obtained. Synology DiskStation Manager (DSM) is an operating system for network storage servers (NAS) developed by Synology, Taiwan. The operating system can manage data, documents, photos, music and other information
| VAR-202106-1167 | CVE-2021-33181 | Synology Video Station Server-side Request Forgery Vulnerability |
CVSS V2: 6.5 CVSS V3: 9.1 Severity: CRITICAL |
Server-Side Request Forgery (SSRF) vulnerability in webapi component in Synology Video Station before 2.4.10-1632 allows remote authenticated users to send arbitrary request to intranet resources via unspecified vectors. Synology Video Station is a video management center. All movies, TV shows and home videos on your Synology NAS can be managed
| VAR-202106-1166 | CVE-2021-33180 | Synology Media Server In SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in cgi component in Synology Media Server before 1.8.1-2876 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. Synology Media Server Has SQL An injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Synology Media Server is a media server
| VAR-202105-1575 | No CVE | A weak password vulnerability exists in the D-Link router management page |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
D-Link Electronic Equipment (Shanghai) Co., Ltd. was established on August 13, 2002. The company's business scope includes routers, network cards, hubs, switches, converters, etc. in the region.
The D-Link router management page has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202105-1576 | No CVE | Leguang equipment management system has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Leguang is a brand of wireless network products independently developed by Shenzhen Chaohenghui Network Technology Co., Ltd.
Leguang equipment management system has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202105-1581 | No CVE | Feiyuxing home smart router has logic flaws and loopholes |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Chengdu Feiyuxing Technology Co., Ltd. was established in 2002 as a high-tech enterprise focusing on product innovation and research and development in the data communication industry and the Internet of Things industry.
Feiyuxing home intelligent routing has logic flaws and loopholes. Attackers can use the vulnerability to bypass the login by modifying the return packet and view sensitive information.
| VAR-202105-1684 | No CVE | Unauthorized access vulnerability exists in Cisco Wireless-G Internet Home Monitoring Camera |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco is the world's leading provider of network solutions.
Cisco Wireless-G Internet Home Monitoring Camera has an unauthorized access vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
| VAR-202105-1709 | No CVE | Panasonic-SF335 camera has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Matsushita Electric (China) Co., Ltd. is an electronics manufacturer engaged in the production and sales of various electrical products.
The Panasonic-SF335 camera has an unauthorized access vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
| VAR-202106-0642 | CVE-2021-20731 | Buffalo router WSR-1166DHP3 and WSR-1166DHP4 Multiple vulnerabilities in |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
WSR-1166DHP3 firmware Ver.1.16 and prior and WSR-1166DHP4 firmware Ver.1.02 and prior allow an attacker to execute arbitrary OS commands with root privileges via unspecified vectors. Provided by Buffalo Inc. WSR-1166DHP3 and WSR-1166DHP4 The following multiple vulnerabilities exist in. * Inadequate access restrictions (CWE-284) - CVE-2021-20730 ‥ * OS Command injection (CWE-78) - CVE-2021-20731 The following is the vulnerability information JPCERT/CC Report to JPCERT/CC Coordinated with the developers. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows. * Device configuration information stolen by an attacker on an adjacent network - CVE-2021-20730 ‥ * By an attacker on an adjacent network root Some with authority OS Command is executed - CVE-2021-20731.
Buffalo WSR-1166DHP3 and WSR-1166DHP4 have operating system command injection vulnerability
| VAR-202106-0641 | CVE-2021-20730 | Buffalo router WSR-1166DHP3 and WSR-1166DHP4 Multiple vulnerabilities in |
CVSS V2: 3.3 CVSS V3: 4.3 Severity: MEDIUM |
Improper access control vulnerability in WSR-1166DHP3 firmware Ver.1.16 and prior and WSR-1166DHP4 firmware Ver.1.02 and prior allows an attacker to obtain configuration information via unspecified vectors. Provided by Buffalo Inc. WSR-1166DHP3 and WSR-1166DHP4 The following multiple vulnerabilities exist in. * Inadequate access restrictions (CWE-284) - CVE-2021-20730 ‥ * OS Command injection (CWE-78) - CVE-2021-20731 The following is the vulnerability information JPCERT/CC Report to JPCERT/CC Coordinated with the developers. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows. * Device configuration information stolen by an attacker on an adjacent network - CVE-2021-20730 ‥ * By an attacker on an adjacent network root Some with authority OS Command is executed - CVE-2021-20731. in Japan.
Buffalo WSR-1166DHP3 and WSR-1166DHP4 have an access control error vulnerability
| VAR-202105-1577 | No CVE | Lenovo NetMaster Security Gateway has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Beijing Wangyu Xingyun Information Technology Co., Ltd. was renamed from Lenovo Wangyu Technology (Beijing) Co., Ltd., and its predecessor was Lenovo Group Information Security Division. The main business covers network boundary security protection, application and data security protection, and network-wide security risk management.
The Lenovo Netmaster Security Gateway has weak password vulnerabilities. The attacker uses a weak password to log in to the background to obtain sensitive information.
| VAR-202105-1579 | No CVE | Ruijie Networks ASME access shared management engine has logic flaws and vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ASME Access Sharing Management Engine is an anti-agent product based on DPI application layer detection.
Ruijie Networks’ ASME access shared management engine has logic flaws and vulnerabilities. The attacker can view and modify the returned packet by capturing the packet, fill in the password at will, and successfully log in to the background to obtain sensitive information.
| VAR-202105-1580 | No CVE | Huawei S9306 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
S9306 is a routing switch, POE switch.
Huawei S9306 has a weak password vulnerability. The attacker uses a weak password to log in to the background to obtain sensitive information.