VARIoT IoT vulnerabilities database
    | VAR-202101-1975 | No CVE | Ruijie Networks Co., Ltd. EasyGate easy gateway has a command execution vulnerability | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            EasyGate (hereinafter referred to as RG-EG) is a multi-service integrated gateway product launched by Ruijie Networks to solve the current network export problems.
Ruijie Networks Co., Ltd. EasyGate easy gateway has a command execution vulnerability. Attackers can use this vulnerability to obtain the root shell of the device without requiring device authorization (that is, without logging in), and execute arbitrary commands remotely.
                        
| VAR-202101-1986 | No CVE | Schneider Electric Triconex MP3008 has a code execution vulnerability | 
                                      
                                        CVSS V2: 9.0 CVSS V3: - Severity: HIGH  | 
                            Schneider Electric (China) Co., Ltd. is a leader in the field of global energy efficiency management. Its main business includes electric power, industrial automation, infrastructure, energy efficiency, energy, building automation and security electronics.
Schneider Electric Triconex MP3008 has a code execution vulnerability, which can be exploited by attackers to gain control of the server.
                        
| VAR-202101-2015 | No CVE | New Cape Electronics Co., Ltd. Internet of Things platform has an arbitrary file download vulnerability (CNVD-2020-72458) | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            The business scope of New Cape Electronics Co., Ltd. includes: computer system integration, development and operation and maintenance, software, smart card machines, smart terminals, electronic instruments, etc.
New Cape Electronics Co., Ltd. Internet of Things platform has an arbitrary file download vulnerability. Attackers can use this vulnerability to obtain sensitive information.
                        
| VAR-202101-1972 | No CVE | Xtron easy-control wireless controller has a binary vulnerability | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            Wuhan Cetron Technology Co., Ltd. (abbreviated as Cetron) is a high-tech and innovative enterprise focusing on the design and development of smart home products.
There is a binary vulnerability in the Xtron easy-control wireless controller. An attacker can use this vulnerability to gain control of the server.
                        
| VAR-202101-1973 | No CVE | An unauthorized access vulnerability exists in the MQTT server of the Xtron easy-control wireless controller | 
                                      
                                        CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM  | 
                            Wuhan Cetron Technology Co., Ltd. (abbreviated as Cetron) is a high-tech and innovative enterprise focusing on the design and development of smart home products.
There is an unauthorized access vulnerability in the MQTT server of Xichuang Easy-Control Wireless Controller. Attackers can use this vulnerability to obtain credentials by unpacking the firmware.
                        
| VAR-202101-1976 | No CVE | Alcatel OAW series smart wireless AP devices have binary vulnerabilities | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            Alcatel-Lucent (Alcatel-Lucent) is a multinational company that provides telecommunications hardware and software equipment and services, headquartered in Paris, France.
Alcatel OAW series smart wireless AP devices have binary vulnerabilities. An attacker can use this vulnerability to gain control of the server.
                        
| VAR-202101-1977 | No CVE | TOPSEC TAP series smart wireless AP devices have unauthorized access vulnerabilities | 
                                      
                                        CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM  | 
                            As a leading enterprise in China's information security industry, Beijing Top Rongxin Technology Co., Ltd. was established in 1995 and headquartered in Beijing.
TOPSEC TAP series smart wireless AP devices have an unauthorized access vulnerability. Attackers can use this vulnerability to connect to the MQTT server anonymously and subscribe to arbitrary messages, causing information leakage.
                        
| VAR-202101-1978 | No CVE | Huaxin Aotian HAN series smart wireless AP devices have binary vulnerabilities | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            Beijing Huaxin Aotian Network Technology Co., Ltd. was registered and established in Haidian Branch on October 13, 2015. Legal representative Liu Jun, the company's business scope includes technology development, technology promotion, technology transfer, technology consulting, technology services, etc.
Huaxin Aotian HAN series smart wireless AP devices have a binary vulnerability. Attackers can use the vulnerability to gain control of the server.
                        
| VAR-202101-1979 | No CVE | TOPSEC TAP series smart wireless AP devices have binary vulnerabilities | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            As a leading enterprise in China's information security industry, Beijing Top Rongxin Technology Co., Ltd. was established in 1995 and headquartered in Beijing.
TOPSEC TAP series smart wireless AP devices have a binary vulnerability, which can be exploited by attackers to gain control of the server.
                        
| VAR-202101-1981 | No CVE | Alcatel OAW series smart wireless AP devices have unauthorized access vulnerabilities | 
                                      
                                        CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM  | 
                            Alcatel-Lucent (Alcatel-Lucent) is a multinational company that provides telecommunications hardware and software equipment and services, headquartered in Paris, France.
Alcatel OAW series of smart wireless AP devices have unauthorized access vulnerabilities. Attackers can use the vulnerabilities to connect to the MQTT server anonymously and subscribe to arbitrary messages, causing information leakage.
                        
| VAR-202101-1982 | No CVE | Watson Aotian HAN series smart wireless AP devices have unauthorized access vulnerabilities | 
                                      
                                        CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM  | 
                            Beijing Huaxin Aotian Network Technology Co., Ltd. was registered and established in Haidian Branch on October 13, 2015. The company's business scope includes technology development, technology promotion, technology transfer, technology consulting, technology services, etc.
Huaxin Aotian HAN series smart wireless AP devices have an unauthorized access vulnerability. Attackers can use this vulnerability to connect to the MQTT server anonymously and subscribe to arbitrary messages, causing information leakage.
                        
| VAR-202101-1988 | No CVE | CAXA CNC car v2015 has a privilege escalation vulnerability | 
                                      
                                        CVSS V2: 7.2 CVSS V3: - Severity: HIGH  | 
                            CAXA CNC car is an industrial automation CNC graphic design tool.
CAXA CNC car v2015 has a privilege escalation vulnerability. Attackers can use this vulnerability to execute arbitrary code and increase privileges.
                        
| VAR-202101-0875 | CVE-2021-20621 | Aterm WF800HP , Aterm WG2600HP and Aterm WG2600HP2 Multiple vulnerabilities in | 
                                      
                                        CVSS V2: 2.6 CVSS V3: 6.1 Severity: Medium  | 
                            Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. Provided by NEC Corporation Aterm WF800HP , Aterm WG2600HP and Aterm WG2600HP2 There are multiple vulnerabilities in. Aterm WF800HP ・ Cross-site scripting (CWE-79) - CVE-2021-20620Aterm WG2600HP and Aterm WG2600HP2 ・ Inadequate access restrictions (CWE-284) - CVE-2017-12575 ・ Cross-site request forgery (CWE-352) - CVE-2021-20621 ・ Cross-site scripting (CWE-79) - CVE-2021-20622CVE-2021-20620 This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Cyber Defense Institute, Inc. Nagaoka Satoru Mr CVE-2021-20621, CVE-2021-20622 This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Cyber Defense Institute, Inc. Iwasaki Tokumei MrThe expected impact depends on each vulnerability, but it may be affected as follows. -Any script is executed on the web browser of the user who accessed the product. - CVE-2021-20620 ・ The setting information stored in the product may be stolen or changed by a remote third party. - CVE-2017-12575 -When a user logged in to the product accesses a specially crafted page, he / she is forced to perform an unintended operation. - CVE-2021-20621 -Any script is executed on the web browser of the user who is logged in to the product. - CVE-2021-20622
                        
| VAR-202101-0363 | CVE-2020-27284 | Delta Industrial Automation TPEditor TPE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | 
                                      
                                        CVSS V2: 6.8 CVSS V3: 7.8 Severity: High  | 
                            TPEditor (v1.98 and prior) is vulnerable to two out-of-bounds write instances in the way it processes project files, allowing an attacker to craft a special project file that may permit arbitrary code execution. Delta Electronics The following vulnerabilities exist in multiple products provided by the company. ‥ * Use of freed memory (Use-after-free) (CWE-416) - CVE-2020-27280 ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27288 ‥ * Out-of-bounds writing (CWE-787) - CVE-2020-27284Both vulnerabilities could allow arbitrary code to be executed with application privileges by processing a specially crafted project file. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Industrial Automation TPEditor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of TPE files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process
                        
| VAR-202101-0360 | CVE-2020-27280 | plural Delta Electronics Product vulnerabilities | 
                                      
                                        CVSS V2: 6.8 CVSS V3: 7.8 Severity: High  | 
                            A use after free issue has been identified in the way ISPSoft(v3.12 and prior) processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution. Delta Electronics The following vulnerabilities exist in multiple products provided by the company. ‥ * Use of freed memory (Use-after-free) (CWE-416) - CVE-2020-27280 ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27288 ‥ * Out-of-bounds writing (CWE-787) - CVE-2020-27284Both vulnerabilities could allow arbitrary code to be executed with application privileges by processing a specially crafted project file. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Industrial Automation ISPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of ISP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Delta Electronics ISPSoft is a set of PLC (Programmable Logic Controller) programming software of Delta Electronics, Taiwan, China. 
Delta Electronics ISPSoft v3.12 and prior has an access control error vulnerability, which is caused by the network system or product improperly restricting access to resources from unauthorized roles
                        
| VAR-202101-0366 | CVE-2020-27288 | plural Delta Electronics Product vulnerabilities | 
                                      
                                        CVSS V2: 6.8 CVSS V3: 7.8 Severity: High  | 
                            An untrusted pointer dereference has been identified in the way TPEditor(v1.98 and prior) processes project files, allowing an attacker to craft a special project file that may permit arbitrary code execution. Delta Electronics The following vulnerabilities exist in multiple products provided by the company. ‥ * Use of freed memory (Use-after-free) (CWE-416) - CVE-2020-27280 ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27288 ‥ * Out-of-bounds writing (CWE-787) - CVE-2020-27284Both vulnerabilities could allow arbitrary code to be executed with application privileges by processing a specially crafted project file. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Industrial Automation TPEditor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of TPE files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process
                        
| VAR-202101-2024 | No CVE | China Mobile Railway Tongyu router has unauthorized access vulnerabilities | 
                                      
                                        CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM  | 
                            YuRoute is an IoT router.
China Mobile Railway Tongyu router has an unauthorized access vulnerability. Attackers can use this vulnerability to access sensitive information and perform operations.
                        
| VAR-202101-1974 | No CVE | ASUS RT-AX86U has a buffer overflow vulnerability | 
                                      
                                        CVSS V2: 7.8 CVSS V3: - Severity: HIGH  | 
                            ASUS RT-AX86U is a wireless router.
ASUS RT-AX86U has a buffer overflow vulnerability. The vulnerability stems from the failure of RT-AX86U to limit the length of parameters when processing the Blocking_request service in the httpd service. Attackers can use this vulnerability to cause a denial of service attack.
                        
| VAR-202101-1463 | CVE-2020-3687 | Qualcomm Information leakage vulnerabilities in products | 
                                      
                                        CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM  | 
                            Local privilege escalation in admin services in Windows environment can occur due to an arbitrary read issue. Qualcomm The product contains a vulnerability related to information leakage.Information may be obtained
                        
| VAR-202101-0073 | CVE-2020-12525 | M&M Software Made fdtCONTAINER Untrusted data deserialization vulnerabilities | 
                                      
                                        CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH  | 
                            M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage. M&M Software Company (WAGO Kontakttechnik Subsidiary ) Provided by RTIS and PACTware Also used in other products including fdtCONTAINER Deserialize untrusted data for components (CWE-502) A vulnerability exists.By loading a specially crafted project file by a third party, malicious code can be executed in secret. Pillow is a Python-based image processing library. 
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. M&M Fdtcontainer is a plug-in FDT frame application software of China Meiming (M&M) Company that can meet customer customization needs