VARIoT IoT vulnerabilities database
| VAR-202104-2037 | No CVE | An unauthorized access vulnerability exists in the access gateway of the video encoding equipment of Hangzhou Hikvision System Technology Co., Ltd. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Hangzhou Hikvision System Technology Co., Ltd. is a provider of security products and industry solutions.
Hangzhou Hikvision System Technology Co., Ltd. video encoding equipment access gateway has an unauthorized access vulnerability. Attackers can use this vulnerability to obtain sensitive information.
| VAR-202104-2038 | No CVE | H8922 4G wireless router has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Shenzhen Hongdian Technology Co., Ltd. H8922 supports dual SIM card backup; built-in WiFi module, supports wired and wireless, wireless and wireless mutual backup; richer interfaces, stronger scalability (4 LAN ports, 1 WAN port); It is an industrial-grade VPN router with rich functions and a wide range of applications.
The H8922 4G wireless router has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202104-2039 | No CVE | Shenzhen Jixiang Tenda Technology Co., Ltd. Tenda router has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise integrating independent research and development, production and sales of network equipment.
Shenzhen Jixiang Tenda Technology Co., Ltd. Tenda router has an unauthorized access vulnerability. Attackers can use the vulnerability to obtain sensitive information.
| VAR-202104-2040 | No CVE | Shanghai Aitai Technology Co., Ltd. aggressive 750W has a command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Shanghai Aitai Technology Co., Ltd. enterprising 750W is an enterprise-class wireless router.
Shanghai Aitai Technology Co., Ltd. enterprising 750W has a command execution vulnerability. Attackers can use this vulnerability to gain control of the website server.
| VAR-202104-1681 | CVE-2021-25326 | Skyworth Digital Technology RN510 Cross-site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Skyworth Digital Technology RN510 V.3.1.0.4 is affected by an incorrect access control vulnerability in/cgi-bin/test_version.asp. If Wi-Fi is connected but an unauthenticated user visits a URL, the SSID password and web UI password may be disclosed
| VAR-202104-1683 | CVE-2021-25328 | Skyworth Digital Technology RN510 Buffer Overflow Vulnerability in Linux |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Skyworth Digital Technology RN510 V.3.1.0.4 RN510 V.3.1.0.4 contains a buffer overflow vulnerability in /cgi-bin/app-staticIP.asp. An authenticated attacker can send a specially crafted request to endpoint which can lead to a denial of service (DoS) or possible code execution on the device. RN510 is a dual-band wireless AC2100 access point launched by Skyworth Digital Technology
| VAR-202104-1682 | CVE-2021-25327 | Skyworth Digital Technology RN510 Cross-site request forgery vulnerability in |
CVSS V2: 4.3 CVSS V3: 6.5 Severity: MEDIUM |
Skyworth Digital Technology RN510 V.3.1.0.4 contains a cross-site request forgery (CSRF) vulnerability in /cgi-bin/net-routeadd.asp and /cgi-bin/sec-urlfilter.asp. Missing CSRF protection in devices can lead to XSRF, as the above pages are vulnerable to cross-site scripting (XSS). RN510 is a dual-band wireless AC2100 access point launched by Skyworth Digital Technology. No detailed vulnerability details are currently provided. Overview
========
Title:- Authenticated XSRF in RN510 Mesh Extender.
CVE-ID :- CVE-2021-25327
Author: Kaustubh G. Padwad
Vendor: Shenzhen Skyworth Digital Technology Company
Ltd.(http://www.skyworthdigital.com/products)
Products:
1. RN510 with firmware V.3.1.0.4 (Tested and verified)
Potential
2.RN620 with respective firmware or below
3.RN410 With Respective firmwware or below. Integrated with two
gigabit LAN ports, and a dual-band AP which supports 2x2
802.11n(300Mbps) and 4x4 802.11ac (1733Mbps) concurrently, RN510provides
a stable & reliable high speed wired and wireless connectivity for home
user and SOHO users. Utilizing state of art EasyMesh solution, two or
more RN510 units could be easily teamed upwith Skyworth ONT gateway
(e.g. GN543) and form an automatically organized network. RN510 could
support either wired line backhaul or wireless backhaul to other mesh
node. User could enjoy a wonderful zero-touch, robust and failure auto
recovery, seamless connected wireless home networking experience.
RN510 uses a system of units to achieve seamless whole-home Wi-Fi
coverage, eliminate weak signal areas once and for all. RN510 work
together to form a unified network with a single network name. Devices
automatically switch between RN510s as you move through your home for
the fastest possible speeds. A RN510 Dual-pack delivers Wi-Fi to an area
of up to 2,800 square feet. And if that’s not enough, simply add more
RN510 to the network anytime to increase coverage. RN510 provides fast
and stable connections with speeds of up to 2100 Mbps and works with
major internet service provider (ISP) and modem. Parental Controls
limits online time and block inappropriate websites according to unique
profiles created for each family member. Setup is easier than ever with
the Skywifi app there to walk you through every step.
Description:
============
An issue was discovered on Shenzhen Skyworth
The value of DestIPAdderss under /cgi-bin/net-routeadd.asp is not
properly sanatizing hence it allow to execute malicious javascript,
which result a successful cross site scripting in
/cgi-bin/net-routeadd.asp, Additionally value of urlitem under
/cgi-bin/sec-urlfilter.asp is also not getting properly sanitize hence
it will result to successful cross site scripting.
Since device dont have CSRF valdation it is possible to perform the XSRF
by using CSRF + XSS vulnerability.
Additional Information
========================
Sample request -1
Request
========
POST /cgi-bin/net-routeadd.asp HTTP/1.1
Host: 192.168.2.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
Firefox/68.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.2.1/cgi-bin/net-routeadd.asp
Content-Type: application/x-www-form-urlencoded
Content-Length: 235
Connection: close
Cookie: UID=admin; PSW=admin;
SESSIONID=boasid7a108566d118e9b5bd235b1412cb770c
Upgrade-Insecure-Requests: 1
add_num=0&user_def_num=0&WanInterfaceFlag=br0&metricFlag=0&gwflag=Yes&ifflag=Yes&DestIPAddress=<svg><script
?>alert(document.cookie)&DestSubnetMask=255.255.255.255&gwStr=on&GatewayIPAddress=192.168.1.1&ifStr=on&Interface=br0&SaveFlag=1
Sample Request-2
POST /cgi-bin/sec-urlfilter.asp HTTP/1.1
Host: 192.168.2.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
Firefox/68.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.2.1/cgi-bin/sec-urlfilter.asp
Content-Type: application/x-www-form-urlencoded
Content-Length: 162
Connection: close
Cookie: UID=admin; PSW=admin;
SESSIONID=boasid7a108566d118e9b5bd235b1412cb770c
Upgrade-Insecure-Requests: 1
Save_Flag=1&Actionflag=Add&EnableUrlFilterFlag=1&delnum=&add_num=1&Url_num=1&enableFilter=on&FilterPolicy=0&urlitem=%3C%2Fscript%3E%3Csvg+onload%3Dalert%281%29%3E
[Affected Component]
IpAddr function on page /cgi-bin/app-staticIP.asp inside the boa web
server implementation.
------------------------------------------
[Attack Type]
Remote
------------------------------------------
[Impact Code execution]
true
------------------------------------------
[Impact Denial of Service]
true
------------------------------------------
[Attack Vectors]
An Authentiated attacker need to run set the cross site scripting
payload at DestIPAddress,urlitem under /cgi-bin/net-routeadd.asp and
/cgi-bin/sec-urlfilter.asp respectively in order to achive XSS.
[Vulnerability Type]
====================
CSRF, XSS
How to Reproduce: (POC):
========================
One can use below exploit
Attacker needs to run above requests in order to achive to XSRF.
Mitigation
==========
[Vendor of Product]
Shenzhen Skyworth Digital Technology Company
Ltd.(http://www.skyworthdigital.com/products)
Disclosure:
===========
19-Jan-2021:- reported this to vendor
19-Jan-2021:- Requested for CVE-ID
credits:
========
* Kaustubh Padwad
* Information Security Researcher
* kingkaustubh@me.com
* https://s3curityb3ast.github.io/
* https://twitter.com/s3curityb3ast
* http://breakthesec.com
* https://www.linkedin.com/in/kaustubhpadwad
| VAR-202104-0482 | CVE-2021-20708 | NEC Aterm WF1200C Operating system command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
NEC Aterm devices (Aterm WF1200CR firmware Ver1.3.2 and earlier, Aterm WG1200CR firmware Ver1.3.3 and earlier, and Aterm WG2600HS firmware Ver1.5.1 and earlier) allow authenticated attackers to execute arbitrary OS commands by sending a specially crafted request to a specific URL
| VAR-202104-0697 | CVE-2021-21433 | Discord Recon Server code injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Discord Recon Server is a bot that allows you to do your reconnaissance process from your Discord. Remote code execution in version 0.0.1 would allow remote users to execute commands on the server resulting in serious issues. This flaw is patched in 0.0.2
| VAR-202104-0485 | CVE-2021-20711 | NEC Aterm WG2600HS Operating system command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Aterm WG2600HS firmware Ver1.5.1 and earlier allows an attacker to execute arbitrary OS commands via unspecified vectors
| VAR-202104-0310 | CVE-2021-20680 | NEC Aterm Cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting vulnerability in NEC Aterm devices (Aterm WG1900HP2 firmware Ver.1.3.1 and earlier, Aterm WG1900HP firmware Ver.2.5.1 and earlier, Aterm WG1800HP4 firmware Ver.1.3.1 and earlier, Aterm WG1800HP3 firmware Ver.1.5.1 and earlier, Aterm WG1200HS2 firmware Ver.2.5.0 and earlier, Aterm WG1200HP3 firmware Ver.1.3.1 and earlier, Aterm WG1200HP2 firmware Ver.2.5.0 and earlier, Aterm W1200EX firmware Ver.1.3.1 and earlier, Aterm W1200EX-MS firmware Ver.1.3.1 and earlier, Aterm WG1200HS firmware all versions Aterm WG1200HP firmware all versions Aterm WF800HP firmware all versions Aterm WF300HP2 firmware all versions Aterm WR8165N firmware all versions Aterm W500P firmware all versions, and Aterm W300P firmware all versions) allows remote attackers to inject arbitrary script or HTML via unspecified vectors
| VAR-202104-0486 | CVE-2021-20712 | NEC Aterm Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Improper access control vulnerability in NEC Aterm WG2600HS firmware Ver1.5.1 and earlier, and Aterm WX3000HP firmware Ver1.1.2 and earlier allows a device connected to the LAN side to be accessed from the WAN side due to the defect in the IPv6 firewall function. NEC Aterm is a wireless router of NEC Corporation.
NEC Aterm has an information disclosure vulnerability that allows remote users to execute arbitrary shell commands on the target system. No detailed vulnerability details are currently provided
| VAR-202104-0483 | CVE-2021-20709 | NEC Aterm WF1200C Security hole |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
Improper validation of integrity check value vulnerability in NEC Aterm WF1200CR firmware Ver1.3.2 and earlier, Aterm WG1200CR firmware Ver1.3.3 and earlier, and Aterm WG2600HS firmware Ver1.5.1 and earlier allows an attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to a specific URL
| VAR-202104-0484 | CVE-2021-20710 | Aterm WF1200CR , Aterm WG1200CR , Aterm WG2600HS and Aterm WX3000HP Multiple vulnerabilities in |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting vulnerability in Aterm WG2600HS firmware Ver1.5.1 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors. Provided by NEC Corporation Aterm WF1200CR , Aterm WG1200CR , Aterm WG2600HS and Aterm WX3000HP There are multiple vulnerabilities in. Aterm WF1200CR , Aterm WG1200CR and Aterm WG2600HS ・ OS Command injection (CWE-78) - CVE-2021-20708 ・ Insufficient integrity verification of downloaded file (CWE-354) - CVE-2021-20709Aterm WG2600HS ・ Cross-site scripting (CWE-79) - CVE-2021-20710 ・ OS Command injection (CWE-78) - CVE-2021-20711Aterm WG2600HS and WX3000HP ・ Inadequate access restrictions (CWE-284) - CVE-2021-20712CVE-2021-20708 , CVE-2021-20709 This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Mitsui Bussan Secure Direction Co., Ltd. Tsukamoto Taizo Mr CVE-2021-20710 , CVE-2021-20711 This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Cyber Defense Institute, Inc. Nagaoka Satoru Mr CVE-2021-20712 This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Kato Yoshimitsu MrThe expected impact depends on each vulnerability, but it may be affected as follows. -While logged in to the management page of the product, a specific URL Any command can be executed by sending a specially crafted request to - CVE-2021-20708 -Any command can be executed by loading a specially crafted configuration file while logged in to the management page of the product. - CVE-2021-20709 -Any script is executed on the web browser of the user who accessed the product. - CVE-2021-20710 -Any command is executed by an attacker who accesses the management page of the product. - CVE-2021-20711 ・ IPv6 There is a problem with the firewall function, LAN The device connected to the side WAN Accessed from an external network such as - CVE-2021-20712
| VAR-202104-0756 | CVE-2021-20022 | SonicWall Email Security Unlimited Upload Vulnerability in File Vulnerability |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to upload an arbitrary file to the remote host. SonicWall Email Security Is vulnerable to an unlimited upload of dangerous types of files.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Sonicwall SonicWall Email Security Appliance is an email security protection device of SonicWall (Sonicwall) company in the United States
| VAR-202104-0755 | CVE-2021-20021 | SonicWall Email Security Vulnerability in privilege management |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host. SonicWall Email Security Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Sonicwall SonicWall Email Security Appliance is an email security protection device of SonicWall (Sonicwall) company in the United States
| VAR-202104-1702 | CVE-2021-25379 | Samsung Gallery Security hole |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: LOW |
Intent redirection vulnerability in Gallery prior to version 5.4.16.1 allows attacker to execute privileged action
| VAR-202104-1701 | CVE-2021-25378 | SmartThings Hub STH-ETH-250 Security hole |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Improper access control of certain port in SmartThings prior to version 1.7.63.6 allows remote temporary denial of service
| VAR-202104-0776 | CVE-2021-21728 | ZTE ZXA10 C300M Resource Management Error Vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A ZTE product has a configuration error vulnerability. Because a certain port is open by default, an attacker can consume system processing resources by flushing a large number of packets to the port, and successfully exploiting this vulnerability could reduce system processing capabilities. This affects: ZXA10 C300M all versions up to V4.3P8
| VAR-202104-2071 | No CVE | Rockwell 1769-L33ER has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Rockwell Automation Co., Ltd. (NYSE: ROK) is the world's largest company dedicated to industrial automation and information.
Rockwell 1769-L33ER has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service attack.