VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202101-1975 No CVE Ruijie Networks Co., Ltd. EasyGate easy gateway has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
EasyGate (hereinafter referred to as RG-EG) is a multi-service integrated gateway product launched by Ruijie Networks to solve the current network export problems. Ruijie Networks Co., Ltd. EasyGate easy gateway has a command execution vulnerability. Attackers can use this vulnerability to obtain the root shell of the device without requiring device authorization (that is, without logging in), and execute arbitrary commands remotely.
VAR-202101-1986 No CVE Schneider Electric Triconex MP3008 has a code execution vulnerability CVSS V2: 9.0
CVSS V3: -
Severity: HIGH
Schneider Electric (China) Co., Ltd. is a leader in the field of global energy efficiency management. Its main business includes electric power, industrial automation, infrastructure, energy efficiency, energy, building automation and security electronics. Schneider Electric Triconex MP3008 has a code execution vulnerability, which can be exploited by attackers to gain control of the server.
VAR-202101-2015 No CVE New Cape Electronics Co., Ltd. Internet of Things platform has an arbitrary file download vulnerability (CNVD-2020-72458) CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The business scope of New Cape Electronics Co., Ltd. includes: computer system integration, development and operation and maintenance, software, smart card machines, smart terminals, electronic instruments, etc. New Cape Electronics Co., Ltd. Internet of Things platform has an arbitrary file download vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202101-1972 No CVE Xtron easy-control wireless controller has a binary vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Wuhan Cetron Technology Co., Ltd. (abbreviated as Cetron) is a high-tech and innovative enterprise focusing on the design and development of smart home products. There is a binary vulnerability in the Xtron easy-control wireless controller. An attacker can use this vulnerability to gain control of the server.
VAR-202101-1973 No CVE An unauthorized access vulnerability exists in the MQTT server of the Xtron easy-control wireless controller CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Wuhan Cetron Technology Co., Ltd. (abbreviated as Cetron) is a high-tech and innovative enterprise focusing on the design and development of smart home products. There is an unauthorized access vulnerability in the MQTT server of Xichuang Easy-Control Wireless Controller. Attackers can use this vulnerability to obtain credentials by unpacking the firmware.
VAR-202101-1976 No CVE Alcatel OAW series smart wireless AP devices have binary vulnerabilities CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Alcatel-Lucent (Alcatel-Lucent) is a multinational company that provides telecommunications hardware and software equipment and services, headquartered in Paris, France. Alcatel OAW series smart wireless AP devices have binary vulnerabilities. An attacker can use this vulnerability to gain control of the server.
VAR-202101-1977 No CVE TOPSEC TAP series smart wireless AP devices have unauthorized access vulnerabilities CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
As a leading enterprise in China's information security industry, Beijing Top Rongxin Technology Co., Ltd. was established in 1995 and headquartered in Beijing. TOPSEC TAP series smart wireless AP devices have an unauthorized access vulnerability. Attackers can use this vulnerability to connect to the MQTT server anonymously and subscribe to arbitrary messages, causing information leakage.
VAR-202101-1978 No CVE Huaxin Aotian HAN series smart wireless AP devices have binary vulnerabilities CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Beijing Huaxin Aotian Network Technology Co., Ltd. was registered and established in Haidian Branch on October 13, 2015. Legal representative Liu Jun, the company's business scope includes technology development, technology promotion, technology transfer, technology consulting, technology services, etc. Huaxin Aotian HAN series smart wireless AP devices have a binary vulnerability. Attackers can use the vulnerability to gain control of the server.
VAR-202101-1979 No CVE TOPSEC TAP series smart wireless AP devices have binary vulnerabilities CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
As a leading enterprise in China's information security industry, Beijing Top Rongxin Technology Co., Ltd. was established in 1995 and headquartered in Beijing. TOPSEC TAP series smart wireless AP devices have a binary vulnerability, which can be exploited by attackers to gain control of the server.
VAR-202101-1981 No CVE Alcatel OAW series smart wireless AP devices have unauthorized access vulnerabilities CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Alcatel-Lucent (Alcatel-Lucent) is a multinational company that provides telecommunications hardware and software equipment and services, headquartered in Paris, France. Alcatel OAW series of smart wireless AP devices have unauthorized access vulnerabilities. Attackers can use the vulnerabilities to connect to the MQTT server anonymously and subscribe to arbitrary messages, causing information leakage.
VAR-202101-1982 No CVE Watson Aotian HAN series smart wireless AP devices have unauthorized access vulnerabilities CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Beijing Huaxin Aotian Network Technology Co., Ltd. was registered and established in Haidian Branch on October 13, 2015. The company's business scope includes technology development, technology promotion, technology transfer, technology consulting, technology services, etc. Huaxin Aotian HAN series smart wireless AP devices have an unauthorized access vulnerability. Attackers can use this vulnerability to connect to the MQTT server anonymously and subscribe to arbitrary messages, causing information leakage.
VAR-202101-1988 No CVE CAXA CNC car v2015 has a privilege escalation vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
CAXA CNC car is an industrial automation CNC graphic design tool. CAXA CNC car v2015 has a privilege escalation vulnerability. Attackers can use this vulnerability to execute arbitrary code and increase privileges.
VAR-202101-0875 CVE-2021-20621 Aterm WF800HP , Aterm WG2600HP  and  Aterm WG2600HP2  Multiple vulnerabilities in CVSS V2: 2.6
CVSS V3: 6.1
Severity: Medium
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. Provided by NEC Corporation Aterm WF800HP , Aterm WG2600HP and Aterm WG2600HP2 There are multiple vulnerabilities in. Aterm WF800HP ・ Cross-site scripting (CWE-79) - CVE-2021-20620Aterm WG2600HP and Aterm WG2600HP2 ・ Inadequate access restrictions (CWE-284) - CVE-2017-12575 ・ Cross-site request forgery (CWE-352) - CVE-2021-20621 ・ Cross-site scripting (CWE-79) - CVE-2021-20622CVE-2021-20620 This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Cyber Defense Institute, Inc. Nagaoka Satoru Mr CVE-2021-20621, CVE-2021-20622 This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Cyber Defense Institute, Inc. Iwasaki Tokumei MrThe expected impact depends on each vulnerability, but it may be affected as follows. -Any script is executed on the web browser of the user who accessed the product. - CVE-2021-20620 ・ The setting information stored in the product may be stolen or changed by a remote third party. - CVE-2017-12575 -When a user logged in to the product accesses a specially crafted page, he / she is forced to perform an unintended operation. - CVE-2021-20621 -Any script is executed on the web browser of the user who is logged in to the product. - CVE-2021-20622
VAR-202101-0363 CVE-2020-27284 Delta Industrial Automation TPEditor TPE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability CVSS V2: 6.8
CVSS V3: 7.8
Severity: High
TPEditor (v1.98 and prior) is vulnerable to two out-of-bounds write instances in the way it processes project files, allowing an attacker to craft a special project file that may permit arbitrary code execution. Delta Electronics The following vulnerabilities exist in multiple products provided by the company. ‥ * Use of freed memory (Use-after-free) (CWE-416) - CVE-2020-27280 ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27288 ‥ * Out-of-bounds writing (CWE-787) - CVE-2020-27284Both vulnerabilities could allow arbitrary code to be executed with application privileges by processing a specially crafted project file. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Industrial Automation TPEditor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of TPE files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process
VAR-202101-0360 CVE-2020-27280 plural Delta Electronics Product vulnerabilities CVSS V2: 6.8
CVSS V3: 7.8
Severity: High
A use after free issue has been identified in the way ISPSoft(v3.12 and prior) processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution. Delta Electronics The following vulnerabilities exist in multiple products provided by the company. ‥ * Use of freed memory (Use-after-free) (CWE-416) - CVE-2020-27280 ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27288 ‥ * Out-of-bounds writing (CWE-787) - CVE-2020-27284Both vulnerabilities could allow arbitrary code to be executed with application privileges by processing a specially crafted project file. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Industrial Automation ISPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of ISP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Delta Electronics ISPSoft is a set of PLC (Programmable Logic Controller) programming software of Delta Electronics, Taiwan, China. Delta Electronics ISPSoft v3.12 and prior has an access control error vulnerability, which is caused by the network system or product improperly restricting access to resources from unauthorized roles
VAR-202101-0366 CVE-2020-27288 plural Delta Electronics Product vulnerabilities CVSS V2: 6.8
CVSS V3: 7.8
Severity: High
An untrusted pointer dereference has been identified in the way TPEditor(v1.98 and prior) processes project files, allowing an attacker to craft a special project file that may permit arbitrary code execution. Delta Electronics The following vulnerabilities exist in multiple products provided by the company. ‥ * Use of freed memory (Use-after-free) (CWE-416) - CVE-2020-27280 ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27288 ‥ * Out-of-bounds writing (CWE-787) - CVE-2020-27284Both vulnerabilities could allow arbitrary code to be executed with application privileges by processing a specially crafted project file. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Industrial Automation TPEditor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of TPE files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process
VAR-202101-2024 No CVE China Mobile Railway Tongyu router has unauthorized access vulnerabilities CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
YuRoute is an IoT router. China Mobile Railway Tongyu router has an unauthorized access vulnerability. Attackers can use this vulnerability to access sensitive information and perform operations.
VAR-202101-1974 No CVE ASUS RT-AX86U has a buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
ASUS RT-AX86U is a wireless router. ASUS RT-AX86U has a buffer overflow vulnerability. The vulnerability stems from the failure of RT-AX86U to limit the length of parameters when processing the Blocking_request service in the httpd service. Attackers can use this vulnerability to cause a denial of service attack.
VAR-202101-1463 CVE-2020-3687 Qualcomm  Information leakage vulnerabilities in products CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Local privilege escalation in admin services in Windows environment can occur due to an arbitrary read issue. Qualcomm The product contains a vulnerability related to information leakage.Information may be obtained
VAR-202101-0073 CVE-2020-12525 M&M Software  Made  fdtCONTAINER  Untrusted data deserialization vulnerabilities CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage. M&M Software Company (WAGO Kontakttechnik Subsidiary ) Provided by RTIS and PACTware Also used in other products including fdtCONTAINER Deserialize untrusted data for components (CWE-502) A vulnerability exists.By loading a specially crafted project file by a third party, malicious code can be executed in secret. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. M&M Fdtcontainer is a plug-in FDT frame application software of China Meiming (M&M) Company that can meet customer customization needs