VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202105-1690 No CVE INVT Designer has a memory corruption vulnerability (CNVD-2021-24485) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
VT Designer is a screen editing software developed by Shenzhen INVT Electric Co., Ltd. for VK/VT series touch screens. INVT VT Designer has a memory corruption vulnerability. Attackers can use this vulnerability to cause the program to crash.
VAR-202105-1691 No CVE INVT VT Designer has a null pointer dereference vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
VT Designer is a screen editing software developed by Shenzhen INVT Electric Co., Ltd. for VK/VT series touch screens. INVT VT Designer has a null pointer dereference vulnerability. Attackers can use this vulnerability to cause the program to crash.
VAR-202105-1693 No CVE INVT VT Designer has a memory corruption vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
VT Designer is a screen editing software developed by Shenzhen INVT Electric Co., Ltd. for VK/VT series touch screens. INVT VT Designer has a memory corruption vulnerability. Attackers can use this vulnerability to cause the program to crash.
VAR-202105-1696 No CVE ATO Technology Co., Ltd. NATouch touch screen has an integer overflow vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Nanda Autotech Jiangsu Co., Ltd. is committed to independent research and development and production of cutting-edge industrial control products with reliable performance, excellent quality and advanced technology. There is an integer overflow vulnerability in the NATouch touch screen of Autotop Technology Co., Ltd. Attackers can use this vulnerability to cause the program to crash.
VAR-202105-1697 No CVE Hollysys Group AutoThink has a denial of service vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
AutoThink is a professional PLC programming software for Hollysys le series. Hollysys Group AutoThink has a denial of service vulnerability. Attackers can use the vulnerability to construct malicious library files to cause a denial of service.
VAR-202105-1698 No CVE Hollysys Group AutoThink has a certification bypass vulnerability CVSS V2: 3.6
CVSS V3: -
Severity: LOW
AutoThink is a professional PLC programming software for Hollysys le series. Hollysys Group AutoThink has a certification bypass vulnerability. Attackers can use the vulnerability to directly bypass the file opening password verification process by modifying the content of the library file.
VAR-202105-1617 No CVE Shanghai Aitai Technology Co., Ltd. aggressive 750W has a command execution vulnerability CVSS V2: 8.3
CVSS V3: -
Severity: HIGH
Enterprising 750W is an enterprise-class wireless router. Shanghai Aitai Technology Co., Ltd. enterprising 750W has a command execution vulnerability. An attacker can use this vulnerability to gain server permissions.
VAR-202105-1618 No CVE Tenda wireless router has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise integrating independent research and development, production and sales of network equipment. Tenda wireless router has an unauthorized access vulnerability. Attackers can use vulnerabilities to access the background and obtain sensitive information.
VAR-202104-2007 No CVE Shenzhen Meikexing Communication Technology Co., Ltd. MAC1200R has a directory traversal vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
MAC1200R is a wireless router. The MAC1200R of Shenzhen Meikexing Communication Technology Co., Ltd. has a directory traversal vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
VAR-202104-2008 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. 11AC 1200MBPS wireless panel AP has a command execution vulnerability (CNVD-2021-22530) CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise integrating independent research and development, production and sales of network equipment. Shenzhen Jixiang Tengda Technology Co., Ltd. 11AC 1200MBPS wireless panel AP has a command execution vulnerability. Attackers can use this vulnerability to execute system commands.
VAR-202104-2009 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. 11AC 1200MBPS wireless panel AP has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise integrating independent research and development, production and sales of network equipment. Shenzhen Jixiang Tengda Technology Co., Ltd. 11AC 1200MBPS wireless panel AP has a command execution vulnerability. Attackers can use this vulnerability to execute system commands.
VAR-202104-2079 No CVE Tiandi Weiye Technology Co., Ltd. web video browser has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Tiandi Weiye is an intelligent security solution provider. Based on artificial intelligence, big data, cloud computing, Internet of Things and other technologies, it provides intelligent video products, system solutions and High-quality technical services. Tiandi Weiye Technology Co., Ltd. network video browser has a weak password vulnerability. An attacker can use the vulnerability to log in with a weak password to view the monitoring system.
VAR-202104-0691 CVE-2021-21507 Dell EMC Networking X  Series and  Dell EMC PowerEdge VRTX Switch Module  Vulnerability in cryptography CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
Dell EMC Networking X-Series firmware versions prior to 3.0.1.8 and Dell EMC PowerEdge VRTX Switch Module firmware versions prior to 2.0.0.82 contain a Weak Password Encryption Vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable system with privileges of the compromised account. DELL Dell EMC Networking X-Series is an X-series Ethernet switch from Dell (DELL)
VAR-202104-0684 CVE-2021-21544 Dell EMC iDRAC9 Authorization problem vulnerability CVSS V2: 4.0
CVSS V3: 2.7
Severity: LOW
Dell EMC iDRAC9 versions prior to 4.40.00.00 contain an improper authentication vulnerability. A remote authenticated malicious user with high privileges could potentially exploit this vulnerability to manipulate the username field under the comment section and set the value to any user. DELL Dell EMC iDRAC9 is a set of system management solutions including hardware and software from Dell (DELL). This solution provides functions such as remote management, crash recovery and power control for Dell PowerEdge systems
VAR-202104-0683 CVE-2021-21543 Dell EMC iDRAC9 Cross-site scripting vulnerability CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
Dell EMC iDRAC9 versions prior to 4.40.00.00 contain multiple stored cross-site scripting vulnerabilities. A remote authenticated malicious user with high privileges could potentially exploit these vulnerabilities to store malicious HTML or JavaScript code through multiple affected parameters. When victim users access the submitted data through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. DELL Dell EMC iDRAC9 is a set of system management solutions including hardware and software from Dell (DELL). This solution provides functions such as remote management, crash recovery and power control for Dell PowerEdge systems
VAR-202104-0682 CVE-2021-21542 Dell EMC iDRAC9 Cross-site scripting vulnerability CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
Dell EMC iDRAC9 versions prior to 4.40.10.00 contain multiple stored cross-site scripting vulnerabilities. A remote authenticated malicious user with high privileges could potentially exploit these vulnerabilities to store malicious HTML or JavaScript code through multiple affected while generating a certificate. When victim users access the submitted data through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. DELL Dell EMC iDRAC9 is a set of system management solutions including hardware and software from Dell (DELL). This solution provides functions such as remote management, crash recovery and power control for Dell PowerEdge systems
VAR-202104-0681 CVE-2021-21541 Dell EMC iDRAC9 Cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Dell EMC iDRAC9 versions prior to 4.40.00.00 contain a DOM-based cross-site scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to supply malicious HTML or JavaScript code to DOM environment in the browser. The malicious code is then executed by the web browser in the context of the vulnerable web application. DELL Dell EMC iDRAC9 is a set of system management solutions including hardware and software from Dell (DELL). This solution provides functions such as remote management, crash recovery and power control for Dell PowerEdge systems
VAR-202104-0680 CVE-2021-21540 Dell EMC iDRAC9 Buffer error vulnerability CVSS V2: 5.5
CVSS V3: 8.1
Severity: HIGH
Dell EMC iDRAC9 versions prior to 4.40.00.00 contain a stack-based overflow vulnerability. A remote authenticated attacker could potentially exploit this vulnerability to overwrite configuration information by injecting arbitrarily large payload. DELL Dell EMC iDRAC9 is a set of system management solutions including hardware and software from Dell (DELL). This solution provides functions such as remote management, crash recovery and power control for Dell PowerEdge systems
VAR-202104-0679 CVE-2021-21539 Dell EMC iDRAC9 Security hole CVSS V2: 4.6
CVSS V3: 7.1
Severity: HIGH
Dell EMC iDRAC9 versions prior to 4.40.00.00 contain a Time-of-check Time-of-use (TOCTOU) race condition vulnerability. A remote authenticated attacker could potentially exploit this vulnerability to gain elevated privileges when a user with higher privileges is simultaneously accessing iDRAC through the web interface. DELL Dell EMC iDRAC9 is a set of system management solutions including hardware and software from Dell (DELL). This solution provides functions such as remote management, crash recovery and power control for Dell PowerEdge systems
VAR-202104-0686 CVE-2021-21547 plural  Dell EMC  Vulnerability in plaintext storage of important information in products CVSS V2: 2.1
CVSS V3: 6.7
Severity: MEDIUM
Dell EMC Unity, UnityVSA, and Unity XT versions prior to 5.0.7.0.5.008 contain a plain-text password storage vulnerability when the Dell Upgrade Readiness Utility is run on the system. The credentials of the Unisphere Administrator are stored in plain text. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user. DELL Dell EMC Unity and UnityVSA are both products of Dell (DELL). UnityVSA is a virtual Unity storage environment