VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202006-0890 CVE-2019-19505 Tenda PA6 Wi-Fi Powerline extender Out-of-bounds write vulnerability in CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the "Wireless" section in the web-UI. By sending a specially crafted hostname, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. (DoS) It may be put into a state
VAR-202006-0749 CVE-2019-16213 Tenda PA6 Wi-Fi Powerline extender In OS Command injection vulnerabilities CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially crafted string, an attacker could modify the device name of an attached PLC adapter to inject and execute arbitrary commands on the system with root privileges. (DoS) It may be put into a state
VAR-202006-0485 CVE-2020-14005 Solarwinds Orion Vulnerability in CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows remote attackers to execute arbitrary code via a defined event. (DoS) It may be put into a state. Authentication is required to exploit this vulnerability.The specific flaw exists within the ExecuteExternalProgram method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of system. SolarWinds Orion Platform is a set of network fault and network performance management platform of SolarWinds in the United States. The platform can provide real-time monitoring and analysis of network equipment, and supports customized web interface, multiple user opinions, and map browsing of the entire network
VAR-202006-1919 No CVE Unauthorized RCE 0day vulnerability in D-Link DCS-2530L camera CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
D-Link DCS-2530L is a camera of D-Link. D-Link DCS-2530L camera has an unauthorized RCE 0day vulnerability, which can be exploited by an attacker to root The identity executes arbitrary commands on the target device.
VAR-202006-1925 No CVE Unauthorized remote code execution vulnerability in multiple Netgear devices CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
NETGEAR is a computer network equipment developer founded in 1996 and headquartered in San Jose, California. Many NETGEAR devices have unauthorized remote code execution vulnerabilities. Attackers can use the vulnerability to execute commands directly.
VAR-202006-0486 CVE-2020-14006 Solarwinds Orion Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a Responsible Team. SolarWinds Orion Platform is a set of network fault and network performance management platform of SolarWinds in the United States. The platform can provide real-time monitoring and analysis of network equipment, and supports customized web interface, multiple user opinions, and map browsing of the entire network. The vulnerability stems from the lack of correct verification of client data in WEB applications. An attacker can use this vulnerability to execute client code
VAR-202006-0487 CVE-2020-14007 SolarWinds Orion Platform cross-site scripting vulnerability CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a name of an alert definition. SolarWinds Orion Platform is a set of network fault and network performance management platform of SolarWinds in the United States. The platform can provide real-time monitoring and analysis of network equipment, and supports customized web interface, multiple user opinions, and map browsing of the entire network. The vulnerability stems from the lack of correct verification of client data in WEB applications. An attacker can use this vulnerability to execute client code
VAR-202006-0021 CVE-2020-10561 Xiaomi Mi Jia ink-jet printer injection vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on Xiaomi Mi Jia ink-jet printer < 3.4.6_0138. Injecting parameters to ippserver through the web management background, resulting in command execution vulnerabilities. Xiaomi Mi Jia ink-jet printer There is an injection vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
VAR-202006-0925 CVE-2020-14473 plural Vigor Out-of-bounds write vulnerabilities in firmware CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Stack-based buffer overflow vulnerability in Vigor3900, Vigor2960, and Vigor300B with firmware before 1.5.1.1. Vigor3900 , Vigor2960 and Vigor300B There is an out-of-bounds write vulnerability in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. DrayTek Vigor3900, etc. are all products of DrayTek, Taiwan, China. DrayTek Vigor3900 is a broadband router/VPN gateway device. Vigor2960 is a load balancing router and VPN gateway device. Vigor300B is a load balancing router. Attackers can use this vulnerability to execute arbitrary code or cause denial of service by sending long parameters
VAR-202006-0238 CVE-2020-14095 Xiaomi R3600 Injection vulnerabilities in routers CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
In Xiaomi router R3600, ROM version<1.0.20, a connect service suffers from an injection vulnerability through the web interface, leading to a stack overflow or remote code execution. Xiaomi R3600 A router contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Xiaomi R3600 is a wireless router of China's Xiaomi Technology (Xiaomi) company. There are security vulnerabilities in Xiaomi R3600 ROM versions before 1.0.20. A remote attacker can use this vulnerability to execute code
VAR-202006-0237 CVE-2020-14094 Xiaomi R3600 Injection vulnerabilities in routers CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
In Xiaomi router R3600, ROM version<1.0.20, the connection service can be injected through the web interface, resulting in stack overflow or remote code execution. Xiaomi R3600 A router contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Xiaomi R3600 is a wireless router of China's Xiaomi Technology (Xiaomi) company. There are security vulnerabilities in Xiaomi R3600 ROM versions before 1.0.20. A remote attacker can use this vulnerability to execute code
VAR-202006-1682 CVE-2020-6870 ZTE U31R20 Product vulnerabilities CVSS V2: 5.2
CVSS V3: 8.0
Severity: HIGH
The version V12.17.20T115 of ZTE U31R20 product is impacted by a design error vulnerability. An attacker could exploit the vulnerability to log in to the FTP server to tamper with the password, and illegally download, modify, upload, or delete files, causing improper operation of the network management system and equipment. This affects: NetNumenU31R20 V12.17.20T115. ZTE U31R20 The product contains unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. ZTE U31R20 is a network management product of China ZTE Corporation. There are security vulnerabilities in the ZTE U31R20 V12.17.20T115 version
VAR-202006-0272 CVE-2020-10276 Vulnerability in using hard-coded credentials in multiple products CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop in case an object is too close to the robot. Navigation and any other components dependent on the laser scanner are not affected (thus it is hard to detect before something happens) though the laser scanner configuration can also be affected altering further the safety of the device. Several products contain vulnerabilities in the use of hard-coded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
VAR-202006-0270 CVE-2020-10274 Information leak vulnerabilities in multiple products CVSS V2: 5.5
CVSS V3: 7.1
Severity: HIGH
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database. Information leakage vulnerabilities exist in multiple products.Information may be obtained and tampered with
VAR-202006-0268 CVE-2020-10272 plural MiR Vulnerability regarding lack of authentication for critical features in the product CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the internal wireless and wired networks to take control of the robot seamlessly. In combination with CVE-2020-10269 and CVE-2020-10271, this flaw allows malicious actors to command the robot at desire. plural MiR The product contains vulnerabilities related to lack of authentication for critical features.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
VAR-202006-0266 CVE-2020-10270 plural MiR Vulnerabilities in the use of hard-coded credentials in products CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wireless interface default to well known and widely spread users (omitted) and passwords (omitted). This information is also available in past User Guides and manuals which the vendor distributed. This flaw allows cyber attackers to take control of the robot remotely and make use of the default user interfaces MiR has created, lowering the complexity of attacks and making them available to entry-level attackers. More elaborated attacks can also be established by clearing authentication and sending network requests directly. We have confirmed this flaw in MiR100 and MiR200 but according to the vendor, it might also apply to MiR250, MiR500 and MiR1000. plural MiR The product contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
VAR-202006-0259 CVE-2020-10279 MiR robot Vulnerability in improper default permissions on controller CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
MiR robot controllers (central computation unit) makes use of Ubuntu 16.04.2 an operating system, Thought for desktop uses, this operating system presents insecure defaults for robots. These insecurities include a way for users to escalate their access beyond what they were granted via file creation, access race conditions, insecure home directory configurations and defaults that facilitate Denial of Service (DoS) attacks. MiR robot The controller contains a vulnerability regarding improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
VAR-202006-1859 No CVE The KingView web data transmission service has a denial of service vulnerability (CNVD-2020-31725) CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
KingView is an industrial automation configuration software produced by Beijing Yakong Technology Development Co., Ltd. There is a denial of service vulnerability in KingView's web data transmission service. Attackers can use this vulnerability to launch remote denial of service attacks.
VAR-202006-1868 No CVE The KingView web data transmission service has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
KingView is an industrial automation configuration software produced by Beijing Yakong Technology Development Co., Ltd. There is a denial of service vulnerability in KingView's web data transmission service. Attackers can use this vulnerability to launch remote denial of service attacks.
VAR-202006-1858 No CVE Denial of service vulnerability exists in KingView web data transmission service (CNVD-2020-31722) CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
KingView is an industrial automation configuration software produced by Beijing Yakong Technology Development Co., Ltd. There is a denial of service vulnerability in KingView's web data transmission service. Attackers can use this vulnerability to launch remote denial of service attacks.