VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202501-2163 CVE-2024-57483 Shenzhen Tenda Technology Co.,Ltd.  of  i24  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda i24 V2.0.0.5 is vulnerable to Buffer Overflow in the addWifiMacFilter function. Shenzhen Tenda Technology Co.,Ltd. of i24 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1336 CVE-2024-39803 WAVLINK  of  WL-WN 533A8  Classic buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `sel_mode` POST parameter. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the sel_mode parameter of the qos.cgi qos_settings function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1335 CVE-2024-39802 WAVLINK  of  WL-WN 533A8  Classic buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `qos_dat` POST parameter. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the qos_dat parameter of the qos.cgi qos_settings function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1334 CVE-2024-39801 WAVLINK  of  WL-WN 533A8  Classic buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `qos_bandwidth` POST parameter. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the qos_bandwidth parameter of the qos.cgi qos_settings function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1313 CVE-2024-39800 WAVLINK  of  WL-WN 533A8  Firmware vulnerabilities related to external control of system configuration or settings CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exists in the openvpn.cgi openvpn_server_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `open_port` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has an external configuration control vulnerability, which stems from the fact that the open_port parameter of the openvpn.cgi openvpn_server_setup function fails to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202501-1312 CVE-2024-39799 WAVLINK  of  WL-WN 533A8  Firmware vulnerabilities related to external control of system configuration or settings CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exists in the openvpn.cgi openvpn_server_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `sel_open_interface` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has an external configuration control vulnerability, which stems from the fact that the sel_open_interface parameter of the openvpn.cgi openvpn_server_setup function fails to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202501-1311 CVE-2024-39798 WAVLINK  of  WL-WN 533A8  Firmware vulnerabilities related to external control of system configuration or settings CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exists in the openvpn.cgi openvpn_server_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `sel_open_protocol` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has an external configuration control vulnerability, which stems from the fact that the sel_open_protocol parameter of the openvpn.cgi openvpn_server_setup function fails to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202501-1296 CVE-2024-39795 WAVLINK  of  WL-WN 533A8  Firmware vulnerabilities related to external control of system configuration or settings CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exist in the nas.cgi set_nas() proftpd functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `ftp_max_sessions` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
VAR-202501-1294 CVE-2024-39794 WAVLINK  of  WL-WN 533A8  Firmware vulnerabilities related to external control of system configuration or settings CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exist in the nas.cgi set_nas() proftpd functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `ftp_port` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
VAR-202501-1295 CVE-2024-39793 WAVLINK  of  WL-WN 533A8  Firmware vulnerabilities related to external control of system configuration or settings CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exist in the nas.cgi set_nas() proftpd functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `ftp_name` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
VAR-202501-1316 CVE-2024-39790 WAVLINK  of  WL-WN 533A8  Firmware vulnerabilities related to external control of system configuration or settings CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exist in the nas.cgi set_ftp_cfg() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists within the `ftp_max_sessions` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
VAR-202501-1314 CVE-2024-39789 WAVLINK  of  WL-WN 533A8  Firmware vulnerabilities related to external control of system configuration or settings CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exist in the nas.cgi set_ftp_cfg() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists within the `ftp_port` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
VAR-202501-1315 CVE-2024-39788 WAVLINK  of  WL-WN 533A8  Firmware vulnerabilities related to external control of system configuration or settings CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exist in the nas.cgi set_ftp_cfg() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists within the `ftp_name` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
VAR-202501-1298 CVE-2024-39787 WAVLINK  of  WL-WN 533A8  Path traversal vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple directory traversal vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A directory traversal vulnerability exists within the `disk_part` POST parameter. WAVLINK of WL-WN 533A8 A path traversal vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 M33A8.V5030.210505 version has a path traversal vulnerability, which is caused by the disk_part parameter of the nas.cgi add_dir function failing to properly filter special elements in the resource or file path. Attackers can exploit this vulnerability to cause arbitrary file reading
VAR-202501-1297 CVE-2024-39786 WAVLINK  of  WL-WN 533A8  Path traversal vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple directory traversal vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A directory traversal vulnerability exists within the `adddir_name` POST parameter. WAVLINK of WL-WN 533A8 A path traversal vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has a path traversal vulnerability, which is caused by the fact that the adddir_name parameter of the nas.cgi add_dir function fails to properly filter special elements in the resource or file path. An attacker can exploit this vulnerability to read arbitrary files
VAR-202501-1366 CVE-2024-39785 WAVLINK  of  WL-WN 533A8  Injection Vulnerability in Firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple command execution vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the adddir_name POST parameter. WAVLINK of WL-WN 533A8 Firmware has an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. There is a command injection vulnerability in the WAVLINK AC3000 M33A8.V5030.210505 version. The vulnerability is caused by the adddir_name parameter of the nas.cgi add_dir function failing to properly filter special characters and commands in the constructed command
VAR-202501-1365 CVE-2024-39784 WAVLINK  of  WL-WN 533A8  Injection Vulnerability in Firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple command execution vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the disk_part POST parameter. WAVLINK of WL-WN 533A8 Firmware has an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. There is a command injection vulnerability in the WAVLINK AC3000 M33A8.V5030.210505 version. The vulnerability is caused by the disk_part parameter of the nas.cgi add_dir function failing to properly filter special characters and commands in the constructed command
VAR-202501-1337 CVE-2024-39783 WAVLINK  of  WL-WN 533A8  Command injection vulnerability in firmware CVSS V2: 9.0
CVSS V3: 9.1
Severity: CRITICAL
Multiple OS command injection vulnerabilities exist in the adm.cgi sch_reboot() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a arbitrary code execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `restart_week` POST parameter. WAVLINK of WL-WN 533A8 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the restart_week parameter of the adm.cgi sch_reboot function failing to properly filter special characters and commands in the constructed command. An attacker can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1338 CVE-2024-39782 WAVLINK  of  WL-WN 533A8  Command injection vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple OS command injection vulnerabilities exist in the adm.cgi sch_reboot() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a arbitrary code execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `restart_min` POST parameter. WAVLINK of WL-WN 533A8 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the restart_min parameter of the adm.cgi sch_reboot function failing to properly filter special characters and commands in the constructed command. An attacker can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1379 CVE-2024-39774 WAVLINK  of  WL-WN 533A8  Classic buffer overflow vulnerability in firmware CVSS V2: 9.0
CVSS V3: 9.1
Severity: CRITICAL
A buffer overflow vulnerability exists in the adm.cgi set_sys_adm() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the adm.cgi set_sys_adm function failing to properly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack