VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202106-0150 CVE-2020-11235 plural  Qualcomm  Integer overflow vulnerability in product CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Buffer overflow might occur while parsing unified command due to lack of check of input data received in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking. plural Qualcomm The product is vulnerable to integer overflow.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202106-0144 CVE-2020-11161 plural  Qualcomm  Out-of-bounds read vulnerabilities in the product CVSS V2: 3.6
CVSS V3: 7.1
Severity: HIGH
Out-of-bounds memory access can occur while calculating alignment requirements for a negative width from external components in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music. plural Qualcomm The product contains an out-of-bounds read vulnerability.Information is obtained and denial of service (DoS) It may be put into a state
VAR-202106-0162 CVE-2020-11262 plural  Qualcomm  Product Race Condition Vulnerabilities CVSS V2: 4.4
CVSS V3: 7.0
Severity: HIGH
A race between command submission and destroying the context can cause an invalid context being added to the list leads to use after free issue. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains a race condition vulnerability and a free memory usage vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202106-0152 CVE-2020-11239 plural  Qualcomm  Product Free Memory Usage Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Use after free issue when importing a DMA buffer by using the CPU address of the buffer due to attachment is not cleaned up properly in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Qualcomm Graphics是美国高通(Qualcomm)公司的一个用于处理器上的图形支撑固件. Qualcomm Graphics 存在安全漏洞,该漏洞源于附件没有被正确清理。以下产品及版本受到影响:APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8064AU, APQ8076, APQ8096AU, AQT1000, AR8031, AR8035, AR8151, CSRA6620, CSRA6640, CSRB31024, FSM10055, FSM10056, MDM9206, MDM9250, MDM9650, MDM9655, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, PM215, PM3003A, PM4125, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM6350, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8004, PM8005, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8940, PM8952, PM8953, PM8956, PM8996, PM8998, PMC1000H, PMD9607, PMD9655, PME605, PMI632, PMI8937, PMI8952, PMI8994, PMI8996, PMI8998, PMK7350, PMK8001, PMK8002, PMK8003, PMK8350, PMM6155AU, PMM8155AU, PMM855AU, PMM8996AU, PMR525, PMR735A, PMR735B, PMW3100, PMX20, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT1000, QBT1500, QBT2000, QCA4020, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595AU, QCA6696, QCA8337, QCA9367, QCA9377, QCA9379, QCC1110, QCM6125, QCS405, QCS410, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET4200AQ, QET5100, QET5100M, QET6100, QET6110, QFE2101, QFE2520, QFE2550, QFE3340, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFS2530, QFS2580, QFS2608, QFS2630, QLN1020, QLN1021AQ, QLN1030, QLN1031, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5373, QPA5460, QPA5461, QPA5580, QPA5581, QPA6560, QPA8673, QPA8675, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM2630, QPM4621, QPM4630, QPM4640, QPM4641, QPM4650, QPM5541, QPM5577, QPM5579, QPM5620, QPM5621, QPM5641, QPM5657, QPM5658, QPM5670, QPM5677, QPM5679, QPM5870, QPM5875, QPM6325, QPM6375, QPM6582, QPM6585, QPM6621, QPM6670, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSM8250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC800T, QTC801S, QTM525, QTM527, Qualcomm215, RGR7640AU, RSW8577, SA415M, SA515M, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SD 455, SD 636, SD 675, SD 8C, SD 8CX, SD205, SD210, SD429, SD439, SD450, SD460, SD632, SD660, SD662, SD665, SD670, SD675, SD690 5G, SD710, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD820, SD821, SD835, SD845, SD855, SD865 5G, SD888 5G, SDA429W, SDM429W, SDM630, SDM830, SDR051, SDR052, SDR425, SDR660, SDR660G, SDR675, SDR735, SDR735G, SDR8150, SDR8250, SDR845, SDR865, SDW2500, SDW3100, SDX20, SDX20M, SDX24, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM4350, SM6250, SM6250P, SM7250P, SM7350, SMB1350, SMB1351, SMB1354, SMB1355, SMB1357, SMB1358, SMB1360, SMB1380, SMB1381, SMB1390, SMB1394, SMB1395, SMB1396, SMB1398, SMB231, SMB2351, SMR525, SMR526, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6740, WCN6750, WCN6850, WCN6851, WCN6856, WGR7640, WSA8810, WSA8815, WSA8830, WSA8835, WTR2955, WTR2965, WTR3905, WTR3925, WTR3950, WTR4905, WTR5975, WTR6955
VAR-202106-0149 CVE-2020-11233 plural  Qualcomm  In the product  Time-of-check Time-of-use (TOCTOU)  Race condition vulnerabilities CVSS V2: 6.9
CVSS V3: 7.0
Severity: HIGH
Time-of-check time-of-use race condition While processing partition entries due to newly created buffer was read again from mmc without validation in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product has Time-of-check Time-of-use (TOCTOU) There is a race condition vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202106-0160 CVE-2020-11260 plural  Qualcomm  Vulnerability in product usage of uninitialized resources CVSS V2: 7.2
CVSS V3: 8.4
Severity: HIGH
An improper free of uninitialized memory can occur in DIAG services in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile. plural Qualcomm The product contains a vulnerability in the use of uninitialized resources.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202101-0490 CVE-2020-28841 DriverGenius  Vulnerability in CVSS V2: 7.1
CVSS V3: 5.5
Severity: MEDIUM
MyDrivers64.sys in DriverGenius 9.61.3708.3054 allows attackers to cause a system crash via the ioctl command 0x9c402000 to \\.\MyDrivers0_0_1. DriverGenius Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. Cmcm Drivergenius (Drive Wizard) is a software for Windows system to solve driver adaptation update and download from Beijing Cheetah Mobile Technology Co., Ltd. (Cmcm) in China
VAR-202101-2016 No CVE A SQL injection vulnerability exists in the intelligent IoT system of Nanjing Jiuze Software Technology Co., Ltd. CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The business scope of Nanjing Jiuze Software Technology Co., Ltd. includes: software development, technical services, technical consulting services, technology transfer, etc. The intelligent IoT system of Nanjing Jiuze Software Technology Co., Ltd. has a SQL injection vulnerability. Attackers can use the vulnerability to obtain sensitive information in the database.
VAR-202101-2020 No CVE Binary vulnerability exists in KINCO DTools (CNVD-2020-68574) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Shanghai Buke Automation Co., Ltd. has been focusing on the R&D, production, sales and related technical services of the core components of industrial automation equipment control and industrial Internet of Things/Internet software and hardware, and provides customers with equipment automation control, digital factory and industrial Internet solutions . There is a binary vulnerability in KINCO DTools. Attackers can use this vulnerability to construct malformed bmp images and cause the program to crash.
VAR-202101-2021 No CVE Binary vulnerability exists in KINCO DTools CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Shanghai Buke Automation Co., Ltd. has been focusing on the research and development, production, sales and related technical services of the core components of industrial automation equipment control and industrial Internet of Things/Internet software and hardware, and provides customers with equipment automation control, digital factory and industrial Internet solutions Wait. There is a binary vulnerability in KINCO DTools. Attackers can use the vulnerability to construct malformed wav audio and cause the program to crash.
VAR-202101-2001 No CVE TP-LINK TL-WR740N has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
TP-LINK TL-WR740N adopts advanced 11N wireless technology, with a wireless transmission rate of up to 150Mbps, which can meet more wireless client access, while avoiding data congestion, reducing network delay, and making voice and video, online on-demand, and online games smoother. TP-LINK TL-WR740N has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service attack.
VAR-202101-2004 No CVE Beijing Zhongchuang Video Technology Co., Ltd. UCM collaborative communication platform has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
The UCM cooperative communication platform is a SIP communication control hardware device, which can realize terminal registration, multi-party conference (MCU), device management, firewall traversal, etc. in the traditional video conference system. Beijing Zhongchuang Video Technology Co., Ltd. UCM collaborative communication platform has a command execution vulnerability. Attackers can use this vulnerability to execute commands remotely.
VAR-202101-2005 No CVE An arbitrary file download vulnerability exists in the UCM collaborative communication platform of Beijing Zhongchuang Video Technology Co., Ltd. CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The UCM cooperative communication platform is a SIP communication control hardware device, which can realize terminal registration, multi-party conference (MCU), device management, firewall traversal, etc. in the traditional video conference system. The UCM collaborative communication platform of Beijing Zhongchuang Video Technology Co., Ltd. has an arbitrary file download vulnerability. Attackers can use this vulnerability to download arbitrary files.
VAR-202101-2006 No CVE A weak password vulnerability exists in the UCM collaborative communication platform of Beijing Zhongchuang Video Technology Co., Ltd. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The UCM cooperative communication platform is a SIP communication control hardware device, which can realize terminal registration, multi-party conference (MCU), device management, firewall traversal, etc. in the traditional video conference system. The UCM collaborative communication platform of Beijing Zhongchuang Video Technology Co., Ltd. has a weak password vulnerability. Attackers can use the vulnerability to log in to the background to obtain sensitive information and perform unauthorized operations.
VAR-202101-2022 No CVE Binary vulnerability exists in Shanghai KINCO touch screen configuration editing software (CNVD-2020-69458) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Shanghai Buke Automation Co., Ltd. has been focusing on the R&D, production, sales and related technical services of the core components of industrial automation equipment control and industrial Internet of Things/Internet software and hardware, and provides customers with equipment automation control, digital factory and industrial Internet solutions , Is a leading supplier of machine automation and factory intelligent solutions in China. There is a binary vulnerability in the KINCO touch screen configuration editing software of Shanghai Baike. Attackers can use the vulnerability to cause the program to crash.
VAR-202101-2023 No CVE Binary vulnerability exists in Shanghai KINCO touch screen configuration editing software CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Shanghai Buke Automation Co., Ltd. has been focusing on the R&D, production, sales and related technical services of the core components of industrial automation equipment control and industrial Internet of Things/Internet software and hardware, and provides customers with equipment automation control, digital factory and industrial Internet solutions , Is a leading supplier of machine automation and factory intelligent solutions in China. There is a binary vulnerability in the KINCO touch screen configuration editing software of Shanghai Baike. Attackers can use the vulnerability to cause the program to crash.
VAR-202101-1995 No CVE Command execution vulnerability exists in iray infrared camera AM310420 CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Arrow Optoelectronics focuses on the R&D and manufacturing of infrared imaging technology and products, with completely independent intellectual property rights, and is committed to providing professional and competitive infrared thermal imaging products and industry solutions to global customers. The iray infrared camera AM310420 has a command execution vulnerability. Attackers can use this vulnerability to execute system commands and gain control of the server.
VAR-202101-1997 No CVE Unauthorized access vulnerability exists in iray infrared camera CVSS V2: 5.5
CVSS V3: -
Severity: MEDIUM
Arrow Optoelectronics focuses on the R&D and manufacturing of infrared imaging technology and products, with completely independent intellectual property rights, and is committed to providing professional and competitive infrared thermal imaging products and industry solutions to global customers. The iray infrared camera has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202101-2014 No CVE New Cape Electronics Co., Ltd. Internet of Things platform has an arbitrary file download vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
New Cape Electronics Co., Ltd. is a professional enterprise dedicated to the development, production, sales and system integration of all-in-one card software and products. New Cape Electronics Co., Ltd. Internet of Things platform has an arbitrary file download vulnerability. Attackers can use the vulnerability to arbitrary files next week.
VAR-202101-1996 No CVE Command execution vulnerability exists in Tenda AC9V3.0 router web management page CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Shenzhen Jixiang Tengda Technology Co., Ltd. (hereinafter referred to as "Tengda") is a professional supplier of network communication equipment and solutions, as well as a high-tech enterprise integrating R&D, production, supply, sales and service. Tenda AC9V3.0 router web management page has a command execution vulnerability. Attackers can use vulnerabilities to execute arbitrary commands.