VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202104-2037 No CVE An unauthorized access vulnerability exists in the access gateway of the video encoding equipment of Hangzhou Hikvision System Technology Co., Ltd. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Hangzhou Hikvision System Technology Co., Ltd. is a provider of security products and industry solutions. Hangzhou Hikvision System Technology Co., Ltd. video encoding equipment access gateway has an unauthorized access vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202104-2038 No CVE H8922 4G wireless router has a denial of service vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Shenzhen Hongdian Technology Co., Ltd. H8922 supports dual SIM card backup; built-in WiFi module, supports wired and wireless, wireless and wireless mutual backup; richer interfaces, stronger scalability (4 LAN ports, 1 WAN port); It is an industrial-grade VPN router with rich functions and a wide range of applications. The H8922 4G wireless router has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202104-2039 No CVE Shenzhen Jixiang Tenda Technology Co., Ltd. Tenda router has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise integrating independent research and development, production and sales of network equipment. Shenzhen Jixiang Tenda Technology Co., Ltd. Tenda router has an unauthorized access vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202104-2040 No CVE Shanghai Aitai Technology Co., Ltd. aggressive 750W has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Shanghai Aitai Technology Co., Ltd. enterprising 750W is an enterprise-class wireless router. Shanghai Aitai Technology Co., Ltd. enterprising 750W has a command execution vulnerability. Attackers can use this vulnerability to gain control of the website server.
VAR-202104-1681 CVE-2021-25326 Skyworth Digital Technology RN510  Cross-site Scripting Vulnerability CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Skyworth Digital Technology RN510 V.3.1.0.4 is affected by an incorrect access control vulnerability in/cgi-bin/test_version.asp. If Wi-Fi is connected but an unauthenticated user visits a URL, the SSID password and web UI password may be disclosed
VAR-202104-1683 CVE-2021-25328 Skyworth Digital Technology RN510  Buffer Overflow Vulnerability in Linux CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Skyworth Digital Technology RN510 V.3.1.0.4 RN510 V.3.1.0.4 contains a buffer overflow vulnerability in /cgi-bin/app-staticIP.asp. An authenticated attacker can send a specially crafted request to endpoint which can lead to a denial of service (DoS) or possible code execution on the device. RN510 is a dual-band wireless AC2100 access point launched by Skyworth Digital Technology
VAR-202104-1682 CVE-2021-25327 Skyworth Digital Technology RN510  Cross-site request forgery vulnerability in CVSS V2: 4.3
CVSS V3: 6.5
Severity: MEDIUM
Skyworth Digital Technology RN510 V.3.1.0.4 contains a cross-site request forgery (CSRF) vulnerability in /cgi-bin/net-routeadd.asp and /cgi-bin/sec-urlfilter.asp. Missing CSRF protection in devices can lead to XSRF, as the above pages are vulnerable to cross-site scripting (XSS). RN510 is a dual-band wireless AC2100 access point launched by Skyworth Digital Technology. No detailed vulnerability details are currently provided. Overview ======== Title:- Authenticated XSRF in RN510 Mesh Extender. CVE-ID :- CVE-2021-25327 Author: Kaustubh G. Padwad Vendor: Shenzhen Skyworth Digital Technology Company Ltd.(http://www.skyworthdigital.com/products) Products: 1. RN510 with firmware V.3.1.0.4 (Tested and verified) Potential 2.RN620 with respective firmware or below 3.RN410 With Respective firmwware or below. Integrated with two gigabit LAN ports, and a dual-band AP which supports 2x2 802.11n(300Mbps) and 4x4 802.11ac (1733Mbps) concurrently, RN510provides a stable & reliable high speed wired and wireless connectivity for home user and SOHO users. Utilizing state of art EasyMesh solution, two or more RN510 units could be easily teamed upwith Skyworth ONT gateway (e.g. GN543) and form an automatically organized network. RN510 could support either wired line backhaul or wireless backhaul to other mesh node. User could enjoy a wonderful zero-touch, robust and failure auto recovery, seamless connected wireless home networking experience. RN510 uses a system of units to achieve seamless whole-home Wi-Fi coverage, eliminate weak signal areas once and for all. RN510 work together to form a unified network with a single network name. Devices automatically switch between RN510s as you move through your home for the fastest possible speeds. A RN510 Dual-pack delivers Wi-Fi to an area of up to 2,800 square feet. And if that’s not enough, simply add more RN510 to the network anytime to increase coverage. RN510 provides fast and stable connections with speeds of up to 2100 Mbps and works with major internet service provider (ISP) and modem. Parental Controls limits online time and block inappropriate websites according to unique profiles created for each family member. Setup is easier than ever with the Skywifi app there to walk you through every step. Description: ============ An issue was discovered on Shenzhen Skyworth The value of DestIPAdderss under /cgi-bin/net-routeadd.asp is not properly sanatizing hence it allow to execute malicious javascript, which result a successful cross site scripting in /cgi-bin/net-routeadd.asp, Additionally value of urlitem under /cgi-bin/sec-urlfilter.asp is also not getting properly sanitize hence it will result to successful cross site scripting. Since device dont have CSRF valdation it is possible to perform the XSRF by using CSRF + XSS vulnerability. Additional Information ======================== Sample request -1 Request ======== POST /cgi-bin/net-routeadd.asp HTTP/1.1 Host: 192.168.2.1 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: http://192.168.2.1/cgi-bin/net-routeadd.asp Content-Type: application/x-www-form-urlencoded Content-Length: 235 Connection: close Cookie: UID=admin; PSW=admin; SESSIONID=boasid7a108566d118e9b5bd235b1412cb770c Upgrade-Insecure-Requests: 1 add_num=0&user_def_num=0&WanInterfaceFlag=br0&metricFlag=0&gwflag=Yes&ifflag=Yes&DestIPAddress=<svg><script ?>alert(document.cookie)&DestSubnetMask=255.255.255.255&gwStr=on&GatewayIPAddress=192.168.1.1&ifStr=on&Interface=br0&SaveFlag=1 Sample Request-2 POST /cgi-bin/sec-urlfilter.asp HTTP/1.1 Host: 192.168.2.1 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: http://192.168.2.1/cgi-bin/sec-urlfilter.asp Content-Type: application/x-www-form-urlencoded Content-Length: 162 Connection: close Cookie: UID=admin; PSW=admin; SESSIONID=boasid7a108566d118e9b5bd235b1412cb770c Upgrade-Insecure-Requests: 1 Save_Flag=1&Actionflag=Add&EnableUrlFilterFlag=1&delnum=&add_num=1&Url_num=1&enableFilter=on&FilterPolicy=0&urlitem=%3C%2Fscript%3E%3Csvg+onload%3Dalert%281%29%3E [Affected Component] IpAddr function on page /cgi-bin/app-staticIP.asp inside the boa web server implementation. ------------------------------------------ [Attack Type] Remote ------------------------------------------ [Impact Code execution] true ------------------------------------------ [Impact Denial of Service] true ------------------------------------------ [Attack Vectors] An Authentiated attacker need to run set the cross site scripting payload at DestIPAddress,urlitem under /cgi-bin/net-routeadd.asp and /cgi-bin/sec-urlfilter.asp respectively in order to achive XSS. [Vulnerability Type] ==================== CSRF, XSS How to Reproduce: (POC): ======================== One can use below exploit Attacker needs to run above requests in order to achive to XSRF. Mitigation ========== [Vendor of Product] Shenzhen Skyworth Digital Technology Company Ltd.(http://www.skyworthdigital.com/products) Disclosure: =========== 19-Jan-2021:- reported this to vendor 19-Jan-2021:- Requested for CVE-ID credits: ======== * Kaustubh Padwad * Information Security Researcher * kingkaustubh@me.com * https://s3curityb3ast.github.io/ * https://twitter.com/s3curityb3ast * http://breakthesec.com * https://www.linkedin.com/in/kaustubhpadwad
VAR-202104-0482 CVE-2021-20708 NEC Aterm WF1200C Operating system command injection vulnerability CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
NEC Aterm devices (Aterm WF1200CR firmware Ver1.3.2 and earlier, Aterm WG1200CR firmware Ver1.3.3 and earlier, and Aterm WG2600HS firmware Ver1.5.1 and earlier) allow authenticated attackers to execute arbitrary OS commands by sending a specially crafted request to a specific URL
VAR-202104-0697 CVE-2021-21433 Discord Recon Server code injection vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Discord Recon Server is a bot that allows you to do your reconnaissance process from your Discord. Remote code execution in version 0.0.1 would allow remote users to execute commands on the server resulting in serious issues. This flaw is patched in 0.0.2
VAR-202104-0485 CVE-2021-20711 NEC Aterm WG2600HS Operating system command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Aterm WG2600HS firmware Ver1.5.1 and earlier allows an attacker to execute arbitrary OS commands via unspecified vectors
VAR-202104-0310 CVE-2021-20680 NEC Aterm Cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting vulnerability in NEC Aterm devices (Aterm WG1900HP2 firmware Ver.1.3.1 and earlier, Aterm WG1900HP firmware Ver.2.5.1 and earlier, Aterm WG1800HP4 firmware Ver.1.3.1 and earlier, Aterm WG1800HP3 firmware Ver.1.5.1 and earlier, Aterm WG1200HS2 firmware Ver.2.5.0 and earlier, Aterm WG1200HP3 firmware Ver.1.3.1 and earlier, Aterm WG1200HP2 firmware Ver.2.5.0 and earlier, Aterm W1200EX firmware Ver.1.3.1 and earlier, Aterm W1200EX-MS firmware Ver.1.3.1 and earlier, Aterm WG1200HS firmware all versions Aterm WG1200HP firmware all versions Aterm WF800HP firmware all versions Aterm WF300HP2 firmware all versions Aterm WR8165N firmware all versions Aterm W500P firmware all versions, and Aterm W300P firmware all versions) allows remote attackers to inject arbitrary script or HTML via unspecified vectors
VAR-202104-0486 CVE-2021-20712 NEC Aterm Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Improper access control vulnerability in NEC Aterm WG2600HS firmware Ver1.5.1 and earlier, and Aterm WX3000HP firmware Ver1.1.2 and earlier allows a device connected to the LAN side to be accessed from the WAN side due to the defect in the IPv6 firewall function. NEC Aterm is a wireless router of NEC Corporation. NEC Aterm has an information disclosure vulnerability that allows remote users to execute arbitrary shell commands on the target system. No detailed vulnerability details are currently provided
VAR-202104-0483 CVE-2021-20709 NEC Aterm WF1200C Security hole CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
Improper validation of integrity check value vulnerability in NEC Aterm WF1200CR firmware Ver1.3.2 and earlier, Aterm WG1200CR firmware Ver1.3.3 and earlier, and Aterm WG2600HS firmware Ver1.5.1 and earlier allows an attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to a specific URL
VAR-202104-0484 CVE-2021-20710 Aterm WF1200CR , Aterm WG1200CR , Aterm WG2600HS  and  Aterm WX3000HP  Multiple vulnerabilities in CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting vulnerability in Aterm WG2600HS firmware Ver1.5.1 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors. Provided by NEC Corporation Aterm WF1200CR , Aterm WG1200CR , Aterm WG2600HS and Aterm WX3000HP There are multiple vulnerabilities in. Aterm WF1200CR , Aterm WG1200CR and Aterm WG2600HS ・ OS Command injection (CWE-78) - CVE-2021-20708 ・ Insufficient integrity verification of downloaded file (CWE-354) - CVE-2021-20709Aterm WG2600HS ・ Cross-site scripting (CWE-79) - CVE-2021-20710 ・ OS Command injection (CWE-78) - CVE-2021-20711Aterm WG2600HS and WX3000HP ・ Inadequate access restrictions (CWE-284) - CVE-2021-20712CVE-2021-20708 , CVE-2021-20709 This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Mitsui Bussan Secure Direction Co., Ltd. Tsukamoto Taizo Mr CVE-2021-20710 , CVE-2021-20711 This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Cyber Defense Institute, Inc. Nagaoka Satoru Mr CVE-2021-20712 This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Kato Yoshimitsu MrThe expected impact depends on each vulnerability, but it may be affected as follows. -While logged in to the management page of the product, a specific URL Any command can be executed by sending a specially crafted request to - CVE-2021-20708 -Any command can be executed by loading a specially crafted configuration file while logged in to the management page of the product. - CVE-2021-20709 -Any script is executed on the web browser of the user who accessed the product. - CVE-2021-20710 -Any command is executed by an attacker who accesses the management page of the product. - CVE-2021-20711 ・ IPv6 There is a problem with the firewall function, LAN The device connected to the side WAN Accessed from an external network such as - CVE-2021-20712
VAR-202104-0756 CVE-2021-20022 SonicWall Email Security  Unlimited Upload Vulnerability in File Vulnerability CVSS V2: 6.5
CVSS V3: 7.2
Severity: HIGH
SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to upload an arbitrary file to the remote host. SonicWall Email Security Is vulnerable to an unlimited upload of dangerous types of files.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Sonicwall SonicWall Email Security Appliance is an email security protection device of SonicWall (Sonicwall) company in the United States
VAR-202104-0755 CVE-2021-20021 SonicWall Email Security  Vulnerability in privilege management CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host. SonicWall Email Security Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Sonicwall SonicWall Email Security Appliance is an email security protection device of SonicWall (Sonicwall) company in the United States
VAR-202104-1702 CVE-2021-25379 Samsung Gallery Security hole CVSS V2: 2.1
CVSS V3: 3.3
Severity: LOW
Intent redirection vulnerability in Gallery prior to version 5.4.16.1 allows attacker to execute privileged action
VAR-202104-1701 CVE-2021-25378 SmartThings Hub STH-ETH-250 Security hole CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Improper access control of certain port in SmartThings prior to version 1.7.63.6 allows remote temporary denial of service
VAR-202104-0776 CVE-2021-21728 ZTE ZXA10 C300M Resource Management Error Vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A ZTE product has a configuration error vulnerability. Because a certain port is open by default, an attacker can consume system processing resources by flushing a large number of packets to the port, and successfully exploiting this vulnerability could reduce system processing capabilities. This affects: ZXA10 C300M all versions up to V4.3P8
VAR-202104-2071 No CVE Rockwell 1769-L33ER has a denial of service vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Rockwell Automation Co., Ltd. (NYSE: ROK) is the world's largest company dedicated to industrial automation and information. Rockwell 1769-L33ER has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service attack.