VARIoT IoT vulnerabilities database
| VAR-202104-0678 | CVE-2021-21537 | Dell Hybrid Client Information disclosure vulnerability |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Dell Hybrid Client versions prior to 1.5 contain an information exposure vulnerability. A local unauthenticated attacker may exploit this vulnerability in order to view and exfiltrate sensitive information on the system. DELL Dell Hybrid Client is an application software of Dell (DELL). Provides a client computing software with hybrid cloud management capabilities
| VAR-202104-0677 | CVE-2021-21536 | Dell Hybrid Client Information disclosure vulnerability |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Dell Hybrid Client versions prior to 1.5 contain an information exposure vulnerability. A local unauthenticated attacker may exploit this vulnerability in order to register the client to a server in order to view sensitive information. DELL Dell Hybrid Client is an application software of Dell (DELL). Provides a client computing software with hybrid cloud management capabilities
| VAR-202104-0676 | CVE-2021-21535 | Dell Hybrid Client Access control error vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Dell Hybrid Client versions prior to 1.5 contain a missing authentication for a critical function vulnerability. A local unauthenticated attacker may exploit this vulnerability in order to gain root level access to the system. DELL Dell Hybrid Client is an application software of Dell (DELL). Provides a client computing software with hybrid cloud management capabilities
| VAR-202104-0675 | CVE-2021-21534 | Dell Hybrid Client Information disclosure vulnerability |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: LOW |
Dell Hybrid Client versions prior to 1.5 contain an information exposure vulnerability. A local unauthenticated attacker may exploit this vulnerability in order to gain access to sensitive information via the local API. DELL Dell Hybrid Client is an application software of Dell (DELL). Provides a client computing software with hybrid cloud management capabilities
| VAR-202104-0099 | CVE-2020-24918 | Ambarella Oryx RTSP Server Buffer Overflow Vulnerability in Linux |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A buffer overflow in the RTSP service of the Ambarella Oryx RTSP Server 2020-01-07 allows an unauthenticated attacker to send a crafted RTSP request, with a long digest authentication header, to execute arbitrary code in parse_authentication_header() in libamprotocol-rtsp.so.1 in rtsp_svc (or cause a crash). This allows remote takeover of a Furbo Dog Camera, for example. NOTE: The vendor states that the RTSP library is used for DEMO only, using it in product is a customer's behavior. Ambarella has emphasized that RTSP is DEMO only library, should NOT be used in product in our document. Because Ambarella's SDK is proprietary, we didn't publish our SDK source code in public network. Ambarella Oryx RTSP Server Contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202104-2046 | No CVE | BRIC Communication Technology Co., Ltd. brickcom camera has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Brickcom Corporation (Brickcom Corporation) is composed of a research and development team with rich experience in the surveillance industry, and develops digital surveillance products with advanced technology. Including millions of video network cameras, wireless network cameras, video servers, 3G video transmission (NVR) embedded network hard disk video recorders, CMS client platform systems, etc.
The brickcom camera of BRICS Communication Technology Co., Ltd. has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202104-2006 | No CVE | Shanghai Aitai Technology Co., Ltd. aggressive 750W has a command execution vulnerability (CNVD-2021-22732) |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
Enterprising 750W is an enterprise-class wireless router.
Shanghai Aitai Technology Co., Ltd. enterprising 750W has a command execution vulnerability, which can be exploited by attackers to gain control of the server.
| VAR-202104-2010 | No CVE | DIR-816 750M11AC wireless router has a command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
DIR-816 750M11AC wireless router is a wireless router of DEXUN Electronic Equipment (Shanghai) Co., Ltd.
The DIR-816 750M11AC wireless router has a command execution vulnerability. Attackers can use this vulnerability to execute commands remotely.
| VAR-202104-2011 | No CVE | ZTE Corporation ZXHN F427 has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ZTE Corporation is the world's leading provider of integrated communications solutions.
ZTE Corporation ZXHN F427 has an unauthorized access vulnerability. Attackers can use the vulnerability to obtain sensitive information.
| VAR-202104-2012 | No CVE | Mi Router 4A Gigabit Edition has a denial of service vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Mi Router 4A Gigabit Edition is a gigabit router of Xiaomi Technology Co., Ltd.
Mi Router 4A Gigabit Edition has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202104-2013 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. 11AC 1200MBPS wireless panel AP has a command execution vulnerability (CNVD-2021-22529) |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise integrating independent research and development, production and sales of network equipment.
Shenzhen Jixiang Tengda Technology Co., Ltd. 11AC 1200MBPS wireless panel AP has a command execution vulnerability. Attackers can use this vulnerability to execute system commands.
| VAR-202104-2014 | No CVE | Unauthorized access vulnerability exists in the enterprise router of Chengdu Zhifeng Technology Co., Ltd. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Chengdu Zhifeng Technology Co., Ltd. was established in October 2016. It is an emerging high-tech company integrating R&D, production and sales.
An unauthorized access vulnerability exists in the enterprise router of Chengdu Zhifeng Technology Co., Ltd., which can be exploited by attackers to obtain sensitive information.
| VAR-202104-2015 | No CVE | China Telecom Tianyi Kandian camera has information leakage vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Established in September 2000, China Telecom is a large-scale state-owned communications company in China and a global partner of the Shanghai World Expo. It has been selected as one of the "Fortune 500 Companies" for many consecutive years.
China Telecom Tianyi Kandian camera has an information disclosure vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202104-2016 | No CVE | TL-WR845N has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
TL-WR845N is a router from Prolink Technology Co., Ltd.
TL-WR845N has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202104-2074 | No CVE | Any file download vulnerability exists in Hikvision's video and environmental integrated monitoring and management system |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Hikvision is a video-centric IoT solution provider, providing comprehensive security, smart business and big data services.
Hikvision's video and environmental integrated monitoring and management system has an arbitrary file download vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202104-2077 | No CVE | Hikvision's video and environmental integrated monitoring and management system has arbitrary password reset vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Hikvision is a video-centric IoT solution provider, providing comprehensive security, smart business and big data services.
Hikvision's video and environmental integrated monitoring and management system has an arbitrary password reset vulnerability, which can be exploited by attackers to affect the integrity of the system.
| VAR-202104-2078 | No CVE | Guangdong Jinggong Intelligent System Co., Ltd. Jinggong Cloud MES has a SQL injection vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Seiko Cloud MES is mainly aimed at on-site management of small and medium-sized manufacturing workshops. Based on the industrial Internet, microservices, cloud computing, Internet of Things, and big data technology architecture, it provides low-cost, fast deployment, and easy-to-operate SAAS applications.
Guangdong Jinggong Intelligent System Co., Ltd. Jinggong Cloud MES has a SQL injection vulnerability. Attackers can use the vulnerability to obtain sensitive information in the database.
| VAR-202104-2080 | No CVE | Feiyuxing router WEB configuration system has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Chengdu Feiyuxing Technology Co., Ltd. was established in 2002 and was listed in 2014 (stock code: 831002). It is headquartered in Chengdu Tianfu Software Park. It is one of the few local companies in the industry with independent intellectual property rights and independent research and development capabilities. A high-tech enterprise focusing on product innovation and research and development in the data communication industry and the Internet of Things industry.
Feiyuxing router WEB configuration system has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202104-0087 | CVE-2020-22807 | vtiger crm SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An issue was dicovered in vtiger crm 7.2. Union sql injection in the calendar exportdata feature. Vtiger CRM is a customer relationship management system (CRM) based on SugarCRM developed by American Vtiger Company. The management system provides functions such as management, collection, and analysis of customer information
| VAR-202104-1125 | CVE-2021-25811 | MERCUSYS Mercury X18G Security hole |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
MERCUSYS Mercury X18G 1.0.5 devices allow Denial of service via a crafted value to the POST listen_http_lan parameter. Upon subsequent device restarts after this vulnerability is exploted the device will not be able to access the webserver unless the listen_http_lan parameter to uhttpd.json is manually fixed