VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202101-1900 CVE-2021-25177 Open Design Alliance Drawings SDK  Vulnerability regarding mistyping in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Confusion issue exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. The development kit accesses the data in .dwg and .dgn through a convenient, object-oriented API, and provides functions such as C++ API, support for repairing files, and support for .NET, JAVA, and Python development languages
VAR-202102-0343 CVE-2020-27872 NETGEAR R7450  Vulnerability in leaking resources to incorrect area in router CVSS V2: 5.8
CVSS V3: 8.8
Severity: HIGH
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7450 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from improper state tracking in the password recovery process. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-11365. NETGEAR R7450 A router contains a vulnerability related to the leakage of resources to the wrong area. Zero Day Initiative To this vulnerability ZDI-CAN-11365 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. NETGEAR R7450 is a router from Netgear. A hardware device that connects two or more networks and acts as a gateway between the networks
VAR-202102-0344 CVE-2020-27873 NETGEAR R7450 Access Control Error Vulnerability CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R7450 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SOAP API endpoint, which listens on TCP port 80 by default. The issue results from the lack of proper access control. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-11559. NETGEAR R7450 A router contains a vulnerability related to unauthorized authentication. Zero Day Initiative To this vulnerability ZDI-CAN-11559 Was numbered.Information may be obtained. NETGEAR R7450 is a router from Netgear. A hardware device that connects two or more networks and acts as a gateway between the networks
VAR-202101-2029 No CVE Taiwan Weilun Technology Co., Ltd. EasyAccess2.0 (Windows client) has a dll hijacking vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
EasyAccess2.0 is a remote access tool for man-machine interface produced by Weintek. It allows you to remotely access on-site machinery and equipment thousands of miles away from anywhere, and realize remote monitoring of HMI man-machine interface and remote penetration of PLC controllers. , Complete status monitoring and program update are as simple as QQ. Not only do you no longer need to care about IP, set routing, and open ports as traditionally, but also do not need to spend time and effort to set up a VPN network. Taiwan Weilun Technology Co., Ltd. EasyAccess2.0 (Windows client) has a dll hijacking vulnerability. Attackers can use this vulnerability to execute malicious code.
VAR-202101-2030 No CVE Aqara smart camera G2H (gateway version) has unauthorized access vulnerability CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Aqara smart camera G2H is a smart camera with 1080P image quality and 140° wide angle. Aqara smart camera G2H (gateway version) has an unauthorized access vulnerability. Attackers can use the vulnerability to gain remote access control of the device through WiFi without the permission of the device owner.
VAR-202101-1966 No CVE The web management system of ZXR10 6800 multi-service router has arbitrary file reading vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
ZXR10 6800 multi-service router is a new generation of high-performance multi-service router product launched by ZTE. The ZXR10 6800 multi-service router web management system has an arbitrary file reading vulnerability. Attackers can take advantage of the vulnerability by using ../../ to read the contents of important system files.
VAR-202101-1983 No CVE Schneider Tricon safety instrumented system MP3009 processor has a denial of service vulnerability (CNVD-2020-70793) CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Tricon safety instrumented system is the safety instrumented system of Schneider Electric Co., Ltd., MP3009 module is the processor module of Schneider Tricon safety instrumented system. Schneider Tricon safety instrumented system MP3009 processor has a denial of service vulnerability. An attacker can use this vulnerability to launch a denial of service attack.
VAR-202101-2008 No CVE RCE vulnerability exists in FiberHome routers CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
FiberHome, abbreviated as FiberHome, is a company headquartered in Wuhan, China Listed companies in the communications equipment manufacturing industry. FiberHome routers has an RCE vulnerability. Attackers can use this vulnerability to execute arbitrary commands on the target device with root privileges.
VAR-202101-2010 No CVE Schneider Tricon safety instrumented system MP3009 processor has a denial of service vulnerability (CNVD-2020-70794) CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Tricon safety instrumented system is the safety instrumented system of Schneider Electric Co., Ltd., MP3009 module is the processor module of Schneider Tricon safety instrumented system. Schneider Tricon safety instrumented system MP3009 processor has a denial of service vulnerability. An attacker can use this vulnerability to launch a denial of service attack.
VAR-202101-2011 No CVE Schneider Tricon safety instrumented system TCM 4351B communication card has a denial of service vulnerability (CNVD-2020-70795) CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
The Tricon safety instrumented system is a safety instrumented system of Schneider Electric Co., Ltd. The TCM 4351B communication card is the communication card of Schneider's Tricon safety instrumented system, which supports Ethernet and serial communication. Schneider Tricon safety instrumented system TCM 4351B communication card has a denial of service vulnerability. An attacker can use this vulnerability to launch a denial of service attack.
VAR-202101-1832 CVE-2021-3166 ASUS DSL-N14U-B1  Unlimited Upload Vulnerability in File Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An issue was discovered on ASUS DSL-N14U-B1 1.1.2.3_805 devices. An attacker can upload arbitrary file content as a firmware update when the filename Settings_DSL-N14U-B1.trx is used. Once this file is loaded, shutdown measures on a wide range of services are triggered as if it were a real update, resulting in a persistent outage of those services. ASUS DSL-N14U-B1 Is vulnerable to an unlimited upload of dangerous types of files.Denial of service (DoS) It may be put into a state. ASUS DSL-N14U-B1 is a router device from China ASUS (ASUS)
VAR-202101-2025 No CVE Unauthorized File Reading Vulnerability in JumpServer CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
JumpServer is the world's first fully open source bastion machine. It uses the GNU GPL v2.0 open source protocol and is a 4A-compliant professional operation and maintenance audit system. JumpServer unauthorized file reading vulnerability, attackers obtain sensitive information such as log files through carefully constructed requests, and can execute arbitrary commands through related operation APIs.
VAR-202101-2026 No CVE There is a binary vulnerability in the screen setting tool of Zhongda Youkong TP220 PC CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Shenzhen Zhongda Youkong Technology Co., Ltd. is a company that concentrates on industrial visual touch control products---Human-machine interface, text display, programmable logic controller (PLC) core technology research and development, professional development and sales. High-Tech Companies. There is a binary vulnerability in the TP220 PC screen setting tool of Zhongda Youkong. Attackers can use the vulnerability to cause a denial of service.
VAR-202101-2027 No CVE Sixnet switch SLX-18MG has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Sixnet has more than 30 years of industrial automation product design and manufacturing experience, fully understands the application requirements of various industrial occasions, and injects its mature industrial automation product design concepts into industrial Ethernet switch products. Sixnet switch SLX-18MG has a denial of service vulnerability. Attackers can use this vulnerability to cause a denial of service.
VAR-202101-2028 No CVE Century Star configuration software has a binary vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Beijing Century Changqiu Technology Co., Ltd. is a high-tech enterprise engaged in the research and development of industrial automation software, providing a complete set of services such as software development, sales, service and industrial automation system integration. Century Star configuration software has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202101-2032 No CVE There is a binary vulnerability in the screen setting tool of Zhongda Youkong TP220 host computer (CNVD-2020-70592) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Shenzhen Zhongda Youkong Technology Co., Ltd. is a company that concentrates on industrial visual touch control products---Human-machine interface, text display, programmable logic controller (PLC) core technology research and development, professional development and sales. High-Tech Companies. There is a binary vulnerability in the TP220 PC screen setting tool of Zhongda Youkong. Attackers can use the vulnerability to cause a denial of service.
VAR-202101-2033 No CVE MITSUBISHI FX3U-ENET-L has a denial of service vulnerability (CNVD-2020-70577) CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
FX3U-ENET-L has 4 communication channels. Mitsubishi PLC Ethernet module FX3U-ENET-L supports fixed buffer storage area communication, connection to MELSOFT, communication via MC series, e-mail sending and other functions. When MELSOFT is connected, remote maintenance of PLC programs can be realized through GX Work2. MITSUBISHI FX3U-ENET-L has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202101-2034 No CVE Denial of Service Vulnerability in MITSUBISHI FX3U-ENET-L CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
FX3U-ENET-L has 4 communication channels, Mitsubishi PLC Ethernet module FX3U-ENET-L supports fixed buffer storage area communication, connection to MELSOFT, communication through MC series, email sending and other functions. When MELSOFT is connected, remote maintenance of PLC programs can be realized through GX Work2. MITSUBISHI FX3U-ENET-L has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202101-1967 No CVE Connex serial server C2000-B2-SFE0101-BB1 has storage XSS vulnerabilities CVSS V2: 5.5
CVSS V3: -
Severity: MEDIUM
C2000-B2-SFE0101-BB1 serial port server provides serial port to network function, which can convert RS-232 serial port into TCP/IP protocol network interface. Cognex serial server C2000-B2-SFE0101-BB1 has a stored XSS vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202101-2007 No CVE ACS SpiiPlusEC-08 has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
ACS Motion Control is an OEM-oriented motion controller and drive solutions provider headquartered in Israel. Its products are widely used in semiconductor manufacturing, laser processing, additive manufacturing, flat panel display manufacturing, electronic assembly, life sciences and other fields. Technology system. ACS SpiiPlusEC-08 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.