VARIoT IoT vulnerabilities database

VAR-202101-1900 | CVE-2021-25177 | Open Design Alliance Drawings SDK Vulnerability regarding mistyping in |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Confusion issue exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. The development kit accesses the data in .dwg and .dgn through a convenient, object-oriented API, and provides functions such as C++ API, support for repairing files, and support for .NET, JAVA, and Python development languages
VAR-202102-0343 | CVE-2020-27872 | NETGEAR R7450 Vulnerability in leaking resources to incorrect area in router |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7450 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from improper state tracking in the password recovery process. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-11365. NETGEAR R7450 A router contains a vulnerability related to the leakage of resources to the wrong area. Zero Day Initiative To this vulnerability ZDI-CAN-11365 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. NETGEAR R7450 is a router from Netgear. A hardware device that connects two or more networks and acts as a gateway between the networks
VAR-202102-0344 | CVE-2020-27873 | NETGEAR R7450 Access Control Error Vulnerability |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R7450 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SOAP API endpoint, which listens on TCP port 80 by default. The issue results from the lack of proper access control. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-11559. NETGEAR R7450 A router contains a vulnerability related to unauthorized authentication. Zero Day Initiative To this vulnerability ZDI-CAN-11559 Was numbered.Information may be obtained. NETGEAR R7450 is a router from Netgear. A hardware device that connects two or more networks and acts as a gateway between the networks
VAR-202101-2029 | No CVE | Taiwan Weilun Technology Co., Ltd. EasyAccess2.0 (Windows client) has a dll hijacking vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
EasyAccess2.0 is a remote access tool for man-machine interface produced by Weintek. It allows you to remotely access on-site machinery and equipment thousands of miles away from anywhere, and realize remote monitoring of HMI man-machine interface and remote penetration of PLC controllers. , Complete status monitoring and program update are as simple as QQ. Not only do you no longer need to care about IP, set routing, and open ports as traditionally, but also do not need to spend time and effort to set up a VPN network.
Taiwan Weilun Technology Co., Ltd. EasyAccess2.0 (Windows client) has a dll hijacking vulnerability. Attackers can use this vulnerability to execute malicious code.
VAR-202101-2030 | No CVE | Aqara smart camera G2H (gateway version) has unauthorized access vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Aqara smart camera G2H is a smart camera with 1080P image quality and 140° wide angle.
Aqara smart camera G2H (gateway version) has an unauthorized access vulnerability. Attackers can use the vulnerability to gain remote access control of the device through WiFi without the permission of the device owner.
VAR-202101-1966 | No CVE | The web management system of ZXR10 6800 multi-service router has arbitrary file reading vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ZXR10 6800 multi-service router is a new generation of high-performance multi-service router product launched by ZTE.
The ZXR10 6800 multi-service router web management system has an arbitrary file reading vulnerability. Attackers can take advantage of the vulnerability by using ../../ to read the contents of important system files.
VAR-202101-1983 | No CVE | Schneider Tricon safety instrumented system MP3009 processor has a denial of service vulnerability (CNVD-2020-70793) |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Tricon safety instrumented system is the safety instrumented system of Schneider Electric Co., Ltd., MP3009 module is the processor module of Schneider Tricon safety instrumented system.
Schneider Tricon safety instrumented system MP3009 processor has a denial of service vulnerability. An attacker can use this vulnerability to launch a denial of service attack.
VAR-202101-2008 | No CVE | RCE vulnerability exists in FiberHome routers |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
FiberHome, abbreviated as FiberHome, is a company headquartered in Wuhan, China
Listed companies in the communications equipment manufacturing industry.
FiberHome routers has an RCE vulnerability. Attackers can use this vulnerability to execute arbitrary commands on the target device with root privileges.
VAR-202101-2010 | No CVE | Schneider Tricon safety instrumented system MP3009 processor has a denial of service vulnerability (CNVD-2020-70794) |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Tricon safety instrumented system is the safety instrumented system of Schneider Electric Co., Ltd., MP3009 module is the processor module of Schneider Tricon safety instrumented system.
Schneider Tricon safety instrumented system MP3009 processor has a denial of service vulnerability. An attacker can use this vulnerability to launch a denial of service attack.
VAR-202101-2011 | No CVE | Schneider Tricon safety instrumented system TCM 4351B communication card has a denial of service vulnerability (CNVD-2020-70795) |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
The Tricon safety instrumented system is a safety instrumented system of Schneider Electric Co., Ltd. The TCM 4351B communication card is the communication card of Schneider's Tricon safety instrumented system, which supports Ethernet and serial communication.
Schneider Tricon safety instrumented system TCM 4351B communication card has a denial of service vulnerability. An attacker can use this vulnerability to launch a denial of service attack.
VAR-202101-1832 | CVE-2021-3166 | ASUS DSL-N14U-B1 Unlimited Upload Vulnerability in File Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered on ASUS DSL-N14U-B1 1.1.2.3_805 devices. An attacker can upload arbitrary file content as a firmware update when the filename Settings_DSL-N14U-B1.trx is used. Once this file is loaded, shutdown measures on a wide range of services are triggered as if it were a real update, resulting in a persistent outage of those services. ASUS DSL-N14U-B1 Is vulnerable to an unlimited upload of dangerous types of files.Denial of service (DoS) It may be put into a state. ASUS DSL-N14U-B1 is a router device from China ASUS (ASUS)
VAR-202101-2025 | No CVE | Unauthorized File Reading Vulnerability in JumpServer |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
JumpServer is the world's first fully open source bastion machine. It uses the GNU GPL v2.0 open source protocol and is a 4A-compliant professional operation and maintenance audit system.
JumpServer unauthorized file reading vulnerability, attackers obtain sensitive information such as log files through carefully constructed requests, and can execute arbitrary commands through related operation APIs.
VAR-202101-2026 | No CVE | There is a binary vulnerability in the screen setting tool of Zhongda Youkong TP220 PC |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Shenzhen Zhongda Youkong Technology Co., Ltd. is a company that concentrates on industrial visual touch control products---Human-machine interface, text display, programmable logic controller (PLC) core technology research and development, professional development and sales. High-Tech Companies.
There is a binary vulnerability in the TP220 PC screen setting tool of Zhongda Youkong. Attackers can use the vulnerability to cause a denial of service.
VAR-202101-2027 | No CVE | Sixnet switch SLX-18MG has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Sixnet has more than 30 years of industrial automation product design and manufacturing experience, fully understands the application requirements of various industrial occasions, and injects its mature industrial automation product design concepts into industrial Ethernet switch products.
Sixnet switch SLX-18MG has a denial of service vulnerability. Attackers can use this vulnerability to cause a denial of service.
VAR-202101-2028 | No CVE | Century Star configuration software has a binary vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Beijing Century Changqiu Technology Co., Ltd. is a high-tech enterprise engaged in the research and development of industrial automation software, providing a complete set of services such as software development, sales, service and industrial automation system integration.
Century Star configuration software has a binary vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202101-2032 | No CVE | There is a binary vulnerability in the screen setting tool of Zhongda Youkong TP220 host computer (CNVD-2020-70592) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Shenzhen Zhongda Youkong Technology Co., Ltd. is a company that concentrates on industrial visual touch control products---Human-machine interface, text display, programmable logic controller (PLC) core technology research and development, professional development and sales. High-Tech Companies.
There is a binary vulnerability in the TP220 PC screen setting tool of Zhongda Youkong. Attackers can use the vulnerability to cause a denial of service.
VAR-202101-2033 | No CVE | MITSUBISHI FX3U-ENET-L has a denial of service vulnerability (CNVD-2020-70577) |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
FX3U-ENET-L has 4 communication channels. Mitsubishi PLC Ethernet module FX3U-ENET-L supports fixed buffer storage area communication, connection to MELSOFT, communication via MC series, e-mail sending and other functions. When MELSOFT is connected, remote maintenance of PLC programs can be realized through GX Work2.
MITSUBISHI FX3U-ENET-L has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202101-2034 | No CVE | Denial of Service Vulnerability in MITSUBISHI FX3U-ENET-L |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
FX3U-ENET-L has 4 communication channels, Mitsubishi PLC Ethernet module FX3U-ENET-L supports fixed buffer storage area communication, connection to MELSOFT, communication through MC series, email sending and other functions. When MELSOFT is connected, remote maintenance of PLC programs can be realized through GX Work2.
MITSUBISHI FX3U-ENET-L has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-202101-1967 | No CVE | Connex serial server C2000-B2-SFE0101-BB1 has storage XSS vulnerabilities |
CVSS V2: 5.5 CVSS V3: - Severity: MEDIUM |
C2000-B2-SFE0101-BB1 serial port server provides serial port to network function, which can convert RS-232 serial port into TCP/IP protocol network interface.
Cognex serial server C2000-B2-SFE0101-BB1 has a stored XSS vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202101-2007 | No CVE | ACS SpiiPlusEC-08 has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
ACS Motion Control is an OEM-oriented motion controller and drive solutions provider headquartered in Israel. Its products are widely used in semiconductor manufacturing, laser processing, additive manufacturing, flat panel display manufacturing, electronic assembly, life sciences and other fields. Technology system.
ACS SpiiPlusEC-08 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.