VARIoT IoT vulnerabilities database
| VAR-202104-1260 | CVE-2021-30228 | An Lianbao WF-1 router has a command execution vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
The api/ZRAndlink/set_ZRAndlink interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the iandlink_proc_enable parameter. Anlianbao WT-1 is a 4G router that integrates wired and wireless router access, and secure Internet access.
An Lianbao WF-1 router has a command execution vulnerability, which can be exploited by attackers to gain server management rights
| VAR-202102-1658 | CVE-2021-33962 | China Mobile An Lianbao WF-1 In the router OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
China Mobile An Lianbao WF-1 router v1.0.1 is affected by an OS command injection vulnerability in the web interface /api/ZRUsb/pop_usb_device component. (DoS) It may be in a state. Anlianbao WT-1 is a 4G router that integrates wired and wireless router access, and secure Internet access.
An Lianbao WF-1 router has a command execution vulnerability, which can be exploited by attackers to gain server management rights
| VAR-202102-1657 | CVE-2021-33965 | China Mobile An Lianbao WF-1 Command injection vulnerability in router |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
China Mobile An Lianbao WF-1 V1.0.1 router provides a web interface /api/ZRMesh/set_ZRMesh which receives parameters by POST request, and the parameter mesh_enable and mesh_device have a command injection vulnerability. An attacker can use the vulnerability to execute remote commands. (DoS) It may be in a state. Anlianbao WT-1 is a 4G router that integrates wired and wireless router access, and secure Internet access.
An Lianbao WF-1 router has a command execution vulnerability, which can be exploited by attackers to gain server management rights
| VAR-202102-1656 | CVE-2021-33963 | China Mobile An Lianbao WF-1 Command injection vulnerability in |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
China Mobile An Lianbao WF-1 v1.0.1 router web interface through /api/ZRMacClone/mac_addr_clone receives parameters by POST request, and the parameter macType has a command injection vulnerability. An attacker can use the vulnerability to execute remote commands. (DoS) It may be in a state. Anlianbao WT-1 is a 4G router that integrates wired and wireless router access, and secure Internet access.
An Lianbao WF-1 router has a command execution vulnerability, which can be exploited by attackers to gain server management rights
| VAR-202102-1655 | CVE-2021-33964 | China Mobile An Lianbao WF-1 Command injection vulnerability in router |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
China Mobile An Lianbao WF-1 V1.0.1 router provides a web interface /api/ZRRuleFilter/set_firewall_level which receives parameters by POST request, and the parameter firewall_level has a command injection vulnerability. An attacker can use the vulnerability to execute remote commands. (DoS) It may be in a state. Anlianbao WT-1 is a 4G router that integrates wired and wireless router access, and secure Internet access.
An Lianbao WF-1 router has a command execution vulnerability, which can be exploited by attackers to gain server management rights
| VAR-202102-1530 | No CVE | DD-WRT has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
DD-WRT is a Linux-based wireless routing software, released based on GPLV2.
DD-WRT has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
| VAR-202102-1531 | No CVE | Netgear AC1750 R6400v2 has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Netgear AC1750 R6400v2 is a Wi-Fi router.
Netgear AC1750 R6400v2 has a denial of service vulnerability. Attackers can use the loopholes to send carefully constructed data packets (pointing to a specific destination address) to cause the target router and its upper carrier's router to cause a denial of service.
| VAR-202102-1532 | No CVE | Tenda AC23 has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Tenda AC23 is a hundred yuan router.
Tenda AC23 has a denial of service vulnerability. Attackers can use the loopholes to send carefully constructed data packets (pointing to a specific destination address) to cause the target router and its upper carrier's router to cause a denial of service.
| VAR-202102-1594 | No CVE | OpenWrt has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
OpenWRT is a highly modular, highly automated embedded Linux system with powerful network components and scalability, and is often used in industrial control equipment, telephones, small robots, smart homes, routers, and VOIP devices.
OpenWrt has a denial of service vulnerability that an attacker can exploit to cause a denial of service.
| VAR-202102-0662 | CVE-2020-36249 | ownCloud Server for File Firewall Vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The File Firewall before 2.8.0 for ownCloud Server does not properly enforce file-type restrictions for public shares. The following products and versions are affected: Owncloud File Firewall prior to 2.8.0
| VAR-202102-0527 | CVE-2021-22701 | Schneider PowerLogic Product Cross-Site Request Forgery Vulnerability |
CVSS V2: 3.5 CVSS V3: 4.5 Severity: MEDIUM |
A CWE-352: Cross-Site Request Forgery vulnerability exists in PowerLogic ION7400, ION7650, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions), that could cause a user to perform an unintended action on the target device when using the HTTP web interface.
| VAR-202102-0529 | CVE-2021-22703 | Schneider PowerLogic Product Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A CWE-319: Cleartext transmission of sensitive information vulnerability exists in PowerLogic ION7400, ION7650, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions), that could cause disclosure of user credentials when a malicious actor intercepts HTTP network traffic between a user and the device.
| VAR-202102-0528 | CVE-2021-22702 | Schneider PowerLogic Product Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A CWE-319: Cleartext transmission of sensitive information vulnerability exists in PowerLogic ION7400, ION7650, ION7700/73xx, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions), that could cause disclosure of user credentials when a malicious actor intercepts Telnet network traffic between a user and the device.
| VAR-202102-0792 | CVE-2021-21512 | Dell EMC PowerProtect Cyber Recovery Information Disclosure Vulnerability |
CVSS V2: 3.6 CVSS V3: 6.0 Severity: MEDIUM |
Dell EMC PowerProtect Cyber Recovery, version 19.7.0.1, contains an Information Disclosure vulnerability. A locally authenticated high privileged Cyber Recovery user may potentially exploit this vulnerability leading to the takeover of the notification email account. This vulnerability stems from configuration errors in network systems or products during operation. Thereby taking over the notification email account
| VAR-202102-1617 | No CVE | Tianxin Instrument Group Co., Ltd. Tianxin SCADA system has SQL injection vulnerability (CNVD-2021-03483) |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Tianxin Instrument Group Co., Ltd. is a professional service provider of domestic flow meters and gas application system solutions.
The Tianxin SCADA system of Tianxin Instrument Group Co., Ltd. has a SQL injection vulnerability. Attackers can use vulnerabilities to obtain sensitive information in the database.
| VAR-202102-1527 | No CVE | Zhejiang Yushi Technology Co., Ltd. media player has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Zhejiang Yushi Technology Co., Ltd. (abbreviated as: Yushi) was founded in 2011 and is a global public safety and intelligent transportation solution provider.
Zhejiang Yushi Technology Co., Ltd. media player has a weak password vulnerability. Attackers can use the vulnerability to enter the default password to log in to obtain sensitive information.
| VAR-202102-1533 | No CVE | Tianyi Broadband Government and Enterprise Gateway A8-C has unauthorized loopholes |
CVSS V2: 1.4 CVSS V3: - Severity: LOW |
Tianyi broadband government-enterprise gateway A8-C is China Telecom's fiber optic modem.
Tianyi Broadband's government-enterprise gateway A8-C has unauthorized loopholes. Attackers can use vulnerabilities to cause resets to override their authority.
| VAR-202102-1536 | No CVE | Tianyi broadband government-enterprise gateway A8-C (8+8) has logic flaws |
CVSS V2: 3.6 CVSS V3: - Severity: LOW |
Tianyi broadband government-enterprise gateway A8-C (8+8) is a broadband broadband for telecom enterprises.
Tianyi broadband government-enterprise gateway A8-C (8+8) has logic flaws. Attackers can use the vulnerability to cause any user to modify the LOID and cause the entire gateway to disconnect.
| VAR-202102-1599 | No CVE | An SQL injection vulnerability exists in the group buying system of Lionfish Community |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The business scope of Xiamen Lionfish Network Technology Co., Ltd. includes: Internet of Things technical services; Internet of Things application services; Internet of Things equipment manufacturing; Internet of Things equipment sales, etc.
The Lionfish community group buying system has a SQL injection vulnerability, which can be exploited by attackers to obtain sensitive information in the database.
| VAR-202102-1013 | CVE-2021-23885 | McAfee Web Gateway Vulnerability in privilege management |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Privilege escalation vulnerability in McAfee Web Gateway (MWG) prior to 9.2.8 allows an authenticated user to gain elevated privileges through the User Interface and execute commands on the appliance via incorrect improper neutralization of user input in the troubleshooting page. McAfee Web Gateway (MWG) Vulnerability in privilege managementInformation is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. McAfee Web Gateway is a high-performance secure Web gateway, using a unified device software architecture, with best-in-class threat protection. The vulnerability stems from the non-neutralization of user input in the troubleshooting page. Attackers can use this vulnerability to gain elevated privileges. There is no relevant information about this vulnerability at present. Please keep an eye on CNNVD or vendor announcements