VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202011-1540 No CVE Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability (CNVD-2020-58464) CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
VAR-202011-1548 No CVE Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability (CNVD-2020-58467) CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
VAR-202011-1549 No CVE Advantech WebAccess/SCADA has command execution vulnerability (CNVD-2020-58468) CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. Advantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.
VAR-202011-1558 No CVE Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability (CNVD-2020-58466) CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
VAR-202011-1574 No CVE Tianqing security isolation and information exchange system network debugging interface has command execution vulnerabilities CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Tianqing Security Isolation and Information Exchange System is an access control switch device with network isolation technology independently developed by Venustech Information Technology Co., Ltd., which provides high-security isolation protection for key data. Tianqing security isolation and information exchange system network debugging interface has command execution vulnerabilities. Attackers can use this vulnerability to execute arbitrary commands.
VAR-202011-1580 No CVE Any file reading vulnerability exists in the cu***.php interface of the Tianqing security isolation and information exchange system background CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Tianqing Security Isolation and Information Exchange System is an access control switch device with network isolation technology independently developed by Venustech Information Technology Co., Ltd., which provides high-security isolation protection for key data. There are arbitrary file reading vulnerabilities in the cu***.php interface of the Tianqing security isolation and information exchange system. Attackers can use this vulnerability to read arbitrary files in the system.
VAR-202011-1575 No CVE Unauthorized access vulnerabilities exist in the web services of Unicom Optic Cat HG6543C, HG6201U, HG2201U CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
China United Network Communications Group Co., Ltd. ("China Unicom") is mainly engaged in fixed communication services, mobile communication services, domestic and international communication facilities service services, data communication services, network access services, various telecommunication value-added services, and communication information Business-related system integration business, etc. Unauthorized access vulnerabilities exist in the web services of Unicom Optic Cat HG6543C, HG6201U, and HG2201U. Attackers can use the vulnerability to perform any operations that require authentication (including operations that can only be performed by privileged accounts by constructing specific URL requests.
VAR-202012-1400 CVE-2020-9117 HUAWEI nova 4  and  SydneyM-AL00  Out-of-bounds Vulnerability in Microsoft CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
HUAWEI nova 4 versions earlier than 10.0.0.165(C01E34R2P4) and SydneyM-AL00 versions earlier than 10.0.0.165(C00E66R1P5) have an out-of-bounds read and write vulnerability. An attacker with specific permissions crafts malformed packet with specific parameter and sends the packet to the affected products. Due to insufficient validation of packet, which may be exploited to cause the information leakage or arbitrary code execution. Huawei nova 4 and Huawei Sydneym-al00 are both smart collections of China's Huawei (Huawei) company. The vulnerability stems from insufficient verification of some parameters in the message. Attackers can use this vulnerability to target the target
VAR-202012-1398 CVE-2020-9115 ManageOne  Input confirmation vulnerability CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
ManageOne versions 6.5.1.1.B010, 6.5.1.1.B020, 6.5.1.1.B030, 6.5.1.1.B040, ,6.5.1.1.B050, 8.0.0 and 8.0.1 have a command injection vulnerability. An attacker with high privileges may exploit this vulnerability through some operations on the plug-in component. Due to insufficient input validation of some parameters, the attacker can exploit this vulnerability to inject commands to the target device. ManageOne Is vulnerable to input validation.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei ManageOne is a set of cloud data center management solutions developed by China's Huawei (Huawei). The product supports unified management of heterogeneous cloud resource pools, and provides functions such as multi-level VDC matching customer organization model, service catalog planning, self-service, centralized alarm analysis, and intelligent operation and maintenance
VAR-202102-0298 CVE-2020-25171 Made by Fuji Electric V-Server Lite Out-of-bounds write vulnerability in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
The affected Fuji Electric V-Server Lite versions prior to 3.3.24.0 are vulnerable to an out-of-bounds write, which may allow an attacker to remotely execute arbitrary code. Provided by Fuji Electric Co., Ltd. V-Server Lite Is an industrial software that collects production information in real time. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of VPR files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process
VAR-202011-1571 No CVE Wenwangweishi full gigabit multi-WAN smart router has unauthorized access vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Beijing Wenwang Yilian Technology Co., Ltd. is a leading provider of network environment security services for Internet service sites in China. Wenwangweishi's full gigabit multi-WAN smart router has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202011-1576 No CVE Unauthorized access vulnerability exists in Netis WF2501 CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
NETIS SYSTEMS is part of the NETCORE Group and is headquartered in Shenzhen, China. Netis WF2501 has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202011-0741 CVE-2020-27253 Rockwell Automation Made FactoryTalk Linx Multiple vulnerabilities in CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A flaw exists in the Ingress/Egress checks routine of FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to specifically craft a malicious packet resulting in a denial-of-service condition on the device. Rockwell Automation Provided by the company FactoryTalk Linx Is vulnerable to several vulnerabilities: ‥ * Improper input confirmation (CWE-20) - CVE-2020-27253 ‥ * Heap-based buffer overflow (CWE-122) - CVE-2020-27251 ‥ * Heap-based buffer overflow (CWE-122) - CVE-2020-27255The expected impact depends on each vulnerability, but it may be affected as follows. * FactoryTalk Linx There is a defect in the input / output check routine of the service, and a malicious packet is sent by a remote third party, which interferes with service operation. (DoS) Be in a state - CVE-2020-27253 * A remote third party sends a request with a malicious value for a parameter that specifies a port range and executes arbitrary code. - CVE-2020-27251 * A malicious attribute setting request is sent by a remote third party to steal sensitive information. Also, due to this information theft, ASLR ( Address space layout randomization ) Is bypassed - CVE-2020-27255. FactoryTalk Linx is a FactoryTalk Live Data server and communication service designed to transfer control system information from Allen-Bradley control products to Rockwell Automation FactoryTalk software product portfolio and Studio5000 design software. FactoryTalk Linx 6.11 and earlier versions of Ingress/Egress check routines have improper input validation vulnerabilities. Rockwell Automation FactoryTalk Linx is a set of industrial communication solutions from Rockwell Automation, USA. This product is mainly used for communication between small applications and large automation systems
VAR-202011-0740 CVE-2020-27251 Rockwell Automation Made FactoryTalk Linx Multiple vulnerabilities in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious port ranges, which could result in remote code execution. Rockwell Automation Provided by the company FactoryTalk Linx Is vulnerable to several vulnerabilities: ‥ * Improper input confirmation (CWE-20) - CVE-2020-27253 ‥ * Heap-based buffer overflow (CWE-122) - CVE-2020-27251 ‥ * Heap-based buffer overflow (CWE-122) - CVE-2020-27255The expected impact depends on each vulnerability, but it may be affected as follows. * FactoryTalk Linx There is a defect in the input / output check routine of the service, and a malicious packet is sent by a remote third party, which interferes with service operation. - CVE-2020-27251 * A malicious attribute setting request is sent by a remote third party to steal sensitive information. Also, due to this information theft, ASLR ( Address space layout randomization ) Is bypassed - CVE-2020-27255. FactoryTalk Linx is a FactoryTalk Live Data server and communication service designed to transfer control system information from Allen-Bradley control products to Rockwell Automation FactoryTalk software product portfolio and Studio5000 design software. Rockwell Automation FactoryTalk Linx is a set of industrial communication solutions from Rockwell Automation, USA. This product is mainly used for communication between small applications and large automation systems
VAR-202011-1240 CVE-2020-5641 NETGEAR GS108Ev3 cross-site request forgery vulnerability CVSS V2: 4.3
CVSS V3: 6.5
Severity: MEDIUM
Cross-site request forgery (CSRF) vulnerability in GS108Ev3 firmware version 2.06.10 and earlier allows remote attackers to hijack the authentication of administrators and the product's settings may be changed without the user's intention or consent via unspecified vectors. NETGEAR Switching hub provided by GS108Ev3 Is a cross-site request forgery vulnerability (CWE-352) Exists. This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Yuta Ikegami MrIf a user who is logged in to the management screen of the product accesses a specially crafted page, the settings of the product may be changed unintentionally. GS108Ev3 is an 8-port gigabit simple network management switch launched by NETGEAR
VAR-202011-0742 CVE-2020-27255 Rockwell Automation Made FactoryTalk Linx Multiple vulnerabilities in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR). Rockwell Automation Provided by the company FactoryTalk Linx Is vulnerable to several vulnerabilities: ‥ * Improper input confirmation (CWE-20) - CVE-2020-27253 ‥ * Heap-based buffer overflow (CWE-122) - CVE-2020-27251 ‥ * Heap-based buffer overflow (CWE-122) - CVE-2020-27255The expected impact depends on each vulnerability, but it may be affected as follows. * FactoryTalk Linx There is a defect in the input / output check routine of the service, and a malicious packet is sent by a remote third party, which interferes with service operation. (DoS) Be in a state - CVE-2020-27253 * A remote third party sends a request with a malicious value for a parameter that specifies a port range and executes arbitrary code. FactoryTalk Linx is a FactoryTalk Live Data server and communication service designed to transfer control system information from Allen-Bradley control products to Rockwell Automation FactoryTalk software product portfolio and Studio5000 design software. Rockwell Automation FactoryTalk Linx is a set of industrial communication solutions from Rockwell Automation, USA. This product is mainly used for communication between small applications and large automation systems
VAR-202011-1035 CVE-2015-9550 TOTOLINK A850R-V1  and  F1-V2  Vulnerability in Resource Leakage to Wrong Domain CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An issue was discovered on TOTOLINK A850R-V1 through 1.0.1-B20150707.1612 and F1-V2 through 1.1-B20150708.1646 devices. By sending a specific hel,xasf packet to the WAN interface, it is possible to open the web management interface on the WAN interface. TOTOLINK A850R-V1 and F1-V2 Is vulnerable to a resource leak to the wrong area.Information may be obtained. TOTOLINK A850R-V1 is a wireless dual-band router. No detailed vulnerability details are currently available
VAR-202011-1036 CVE-2015-9551 TOTOLINK A850R-V1  and  F1-V2  Vulnerability in CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on TOTOLINK A850R-V1 through 1.0.1-B20150707.1612 and F1-V2 through 1.1-B20150708.1646 devices. There is Remote Code Execution in the management interface via the formSysCmd sysCmd parameter. TOTOLINK A850R-V1 and F1-V2 Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. TOTOLINK A850R-V1 is a wireless dual-band router
VAR-202011-1532 No CVE FPWIN GR software has a denial of service vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
FPWIN GR is a PLC programming software developed by Panasonic. It is used for PLC design, debugging, and maintenance. It is widely used in power, machinery manufacturing, steel, petroleum, chemical and other industrial control fields. FPWIN GR software has a denial of service vulnerability. Remote attackers can use this vulnerability to send constructed malicious data packets, causing illegal memory access and denial of service.
VAR-202011-1577 No CVE Unauthorized access vulnerabilities in Netis series routers CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
WF2419, WF2780, WF2412, WF2409E, WF2411 are router products of Netis Systems. The Netis series routers have unauthorized access vulnerabilities, which can be exploited by attackers to obtain sensitive information.