VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202007-1505 No CVE ZTE Corporation ZXR10 ZSR V2 next-generation access router has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
ZXR10 ZSR V2 series routers are the next-generation intelligent access router products launched by ZTE that integrate routing, switching, wireless, security, VPN, and AC. ZTE Corporation's ZXR10 ZSR V2 next-generation access router has a weak password vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202007-1483 No CVE Advantech WebAccessNode has a code execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Advantech WebAccessNode is a HMI/SCADA monitoring software based entirely on IE browser. Advantech WebAccessNode has a code execution vulnerability, which can be exploited by attackers to obtain server administrator permissions.
VAR-202007-1473 No CVE Proficy Machine Edition has a denial of service vulnerability (CNVD-2020-32606) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Proficy Machine Edition is a PLC programming software developed by Emerson Trading (Shanghai) Co., Ltd. It is used to design, debug, program, and maintain GE RX 3i and GE RX7i series PLCs. It is widely used in electric power, machinery manufacturing, steel, and petroleum. , Chemical and other industrial control fields. Proficy Machine Edition has a denial of service vulnerability. Attackers can use the vulnerability to send constructed malicious data packets to cause a denial of service.
VAR-202007-1480 No CVE A file upload vulnerability exists in the license plate recognition machine of the smart parking lot CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Shenzhen Fuji Intelligent System Co., Ltd. is a supplier of intelligent entrance and exit management equipment and a professional supplier of intelligent ecological environment solutions. There is a file upload vulnerability in the smart car license plate recognition machine. Attackers can use the vulnerability to obtain server permissions.
VAR-202007-1490 No CVE Proficy Machine Edition has a denial of service vulnerability (CNVD-2020-32607) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Proficy Machine Edition is a PLC programming software developed by Emerson Trading (Shanghai) Co., Ltd. It is used to design, debug, program, and maintain GE RX 3i and GE RX7i series PLCs. It is widely used in electric power, machinery manufacturing, steel, and petroleum. , Chemical and other industrial control fields. Proficy Machine Edition has a denial of service vulnerability. Attackers can use the vulnerability to send constructed malicious data packets to cause a denial of service.
VAR-202007-1491 No CVE Advantech WebAccessNode has an arbitrary file deletion vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Advantech WebAccessNode is a HMI/SCADA monitoring software based entirely on IE browser. Advantech WebAccessNode has an arbitrary file deletion vulnerability. Attackers can use the vulnerability to delete files in any path in the system.
VAR-202007-1330 CVE-2020-5757 Grandstream UCM6200 In series firmware OS Command injection vulnerabilities CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's "New" HTTPS API. (DoS) It may be put into a state. Grandstream UCM6200 is a set of enterprise-level switches used for IP telephone communications from Grandstream
VAR-202007-1331 CVE-2020-5758 Grandstream UCM6200 In series firmware OS Command injection vulnerabilities CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can execute commands as the root user by sending a crafted HTTP GET to the UCM's "Old" HTTPS API. (DoS) It may be put into a state. Grandstream UCM6200 is a set of enterprise-level switches used for IP telephone communications from Grandstream
VAR-202007-1332 CVE-2020-5759 Grandstream UCM6200 In series firmware OS Command injection vulnerabilities CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via SSH. An authenticated remote attacker can execute commands as the root user by issuing a specially crafted "unset" command. (DoS) It may be put into a state. Grandstream UCM6200 is a set of enterprise-level switches used for IP telephone communications from Grandstream
VAR-202007-1328 CVE-2020-5769 Teltonika TRB245 cross-site scripting vulnerability CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Insufficient output sanitization in Teltonika firmware TRB2_R_00.02.02 allows a remote, authenticated attacker to conduct persistent cross-site scripting (XSS) attacks by injecting malicious client-side code into the 'URL/ Host / Connection' form in the 'DATA TO SERVER' configuration section. Teltonika A cross-site scripting vulnerability exists in the firmware.Information may be obtained and tampered with. Teltonika TRB245 is a cellular network gateway product of Teltonika, Lithuania. The vulnerability stems from the lack of correct verification of client data in the WEB application. An attacker can use this vulnerability to execute client code
VAR-202007-1329 CVE-2020-5756 Grandstream GWN7000 In firmware OS Command injection vulnerabilities CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Grandstream GWN7000 firmware version 1.0.9.4 and below allows authenticated remote users to modify the system's crontab via undocumented API. An attacker can use this functionality to execute arbitrary OS commands on the router. Grandstream GWN7000 For firmware, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Grandstream GWN7000 is an enterprise-class multi-WAN gigabit VPN router
VAR-202007-1290 CVE-2020-5130 SonicOS SSLVPN LDAP Vulnerability regarding input verification in CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
SonicOS SSLVPN LDAP login request allows remote attackers to cause external service interaction (DNS) due to improper validation of the request. This vulnerability impact SonicOS version 6.5.4.4-44n and earlier. SonicOS SSLVPN LDAP There is an input verification vulnerability in.Service operation interruption (DoS) It may be put into a state. SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of SonicWall Company in the United States. An input validation error vulnerability exists in SonicWall SonicOS 6.5.4.4-44n and prior versions. The vulnerability stems from the failure of the network system or product to properly validate the input data
VAR-202007-1291 CVE-2020-5131 SonicWall NetExtender Windows Input verification vulnerability in client CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
SonicWall NetExtender Windows client vulnerable to arbitrary file write vulnerability, this allows attacker to overwrite a DLL and execute code with the same privilege in the host operating system. This vulnerability impact SonicWall NetExtender Windows client version 9.0.815 and earlier. SonicWall NetExtender Windows The client is vulnerable to input verification.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. SonicWall NetExtender Windows client is a Windows-based SSL VPN (virtual private network) client application developed by SonicWall in the United States
VAR-202007-1017 CVE-2020-3197 Cisco Meetings Authentication vulnerabilities in applications CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A vulnerability in the API subsystem of Cisco Meetings App could allow an unauthenticated, remote attacker to retain and reuse the Traversal Using Relay NAT (TURN) server credentials that are configured in an affected system. The vulnerability is due to insufficient protection mechanisms for the TURN server credentials. An attacker could exploit this vulnerability by intercepting the legitimate traffic that is generated by an affected system. An exploit could allow the attacker to obtain the TURN server credentials, which the attacker could use to place audio/video calls and forward packets through the configured TURN server. The attacker would not be able to take control of the TURN server unless the same credentials were used in multiple systems. Cisco Meetings The application contains an authentication vulnerability.Information may be obtained
VAR-202007-1026 CVE-2020-3348 Cisco Data Center Network Manager Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a customized link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-202007-1027 CVE-2020-3349 Cisco Data Center Network Manager Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a customized link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-202007-1037 CVE-2020-3369 Cisco SD-WAN vEdge Vulnerabilities in routers CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the deep packet inspection (DPI) engine of Cisco SD-WAN vEdge Routers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper processing of FTP traffic. An attacker could exploit this vulnerability by sending crafted FTP packets through an affected device. A successful exploit could allow the attacker to make the device reboot continuously, causing a DoS condition. Cisco SD-WAN vEdge An unspecified vulnerability exists in the router.Service operation interruption (DoS) It may be put into a state. Cisco SD-WAN vEdge 5000 Series Routers is Cisco's SD-WAN solution routing equipment
VAR-202007-1046 CVE-2020-3380 Cisco Data Center Network Manager Insertion or modification vulnerabilities in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A vulnerability in the CLI of Cisco Data Center Network Manager (DCNM) could allow an authenticated, local attacker to elevate privileges to root and execute arbitrary commands on the underlying operating system. The vulnerability is due to insufficient restrictions during the execution of an affected CLI command. An attacker could exploit this vulnerability by authenticating as the fmserver user and submitting malicious input to a specific command. A successful exploit could allow the attacker to elevate privileges to root and execute arbitrary commands on the underlying operating system. Cisco Data Center Network Manager (DCNM) Is vulnerable to insertion or modification.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-202007-1061 CVE-2020-3468 Cisco SD-WAN vManage In software SQL Injection vulnerabilities CVSS V2: 5.5
CVSS V3: 5.4
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability exists because the web-based management interface improperly validates values within SQL queries. An attacker could exploit this vulnerability by authenticating to the application and sending malicious SQL queries to an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database or the operating system. Cisco SD-WAN vManage Software is a management software for SD-WAN (Software Defined Wide Area Network) solutions from Cisco
VAR-202007-1479 No CVE A SQL injection vulnerability exists in the website building system of Suzhou Tianxiao Network Technology Co., Ltd. CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Suzhou Tianxiao Network Technology Co., Ltd. is a company engaged in software development, network information services and operating office automation equipment. The website building system of Suzhou Tianxiao Network Technology Co., Ltd. has a SQL injection vulnerability. Attackers can use the vulnerability to obtain sensitive database information.