VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202006-1534 CVE-2020-7503 Schneider Electric Easergy T300 cross-site request forgery vulnerability CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
A CWE-352: Cross-Site Request Forgery (CSRF) vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to execute malicious commands on behalf of a legitimate user when xsrf-token data is intercepted. Easergy T300 Exists in a cross-site request forgery vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Schneider Electric Easergy T300 is a remote terminal unit used in the electric power industry from Schneider Electric in France
VAR-202006-1540 CVE-2020-7509 Easergy T300 Vulnerability related to authority management in CVSS V2: 6.5
CVSS V3: 7.2
Severity: HIGH
A CWE-269: Improper privilege management (write) vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to elevate their privileges and delete files. Easergy T300 Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Schneider Electric Easergy T300 is a remote terminal unit used in the electric power industry from Schneider Electric in France. There is a security vulnerability in Schneider Electric Easergy T300 using firmware version 1.5.2 and earlier
VAR-202006-0114 CVE-2020-13224 plural TP-LINK Product Classic buffer overflow vulnerability in CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
TP-LINK NC200 devices through 2.1.10 build 200401, NC210 devices through 1.0.10 build 200401, NC220 devices through 1.3.1 build 200401, NC230 devices through 1.3.1 build 200401, NC250 devices through 1.3.1 build 200401, NC260 devices through 1.5.3 build_200401, and NC450 devices through 1.5.4 build 200401 have a Buffer Overflow. plural TP-LINK Product Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. TP-Link NC200, etc. are all a network camera of TP-Link company in China. There are buffer overflow vulnerabilities in many TP-LINK products. Attackers can use this vulnerability to cause the ipcamera process to crash or execute arbitrary code with root privileges
VAR-202006-1538 CVE-2020-7507 Schneider Electric Easergy T300 Resource Management Error Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A CWE-400: Uncontrolled Resource Consumption vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to login multiple times resulting in a denial of service. Easergy T300 Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be put into a state. Schneider Electric Easergy T300 is a remote terminal unit used in the electric power industry from Schneider Electric in France. There is a resource management error vulnerability in Schneider Electric Easergy T300 using firmware version 1.5.2 and earlier
VAR-202006-1532 CVE-2020-7501 Vijeo Designer Basic and Vijeo Designer Vulnerability in using hard-coded credentials in CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
A CWE-798: Use of Hard-coded Credentials vulnerability exists in Vijeo Designer Basic (V1.1 HotFix 16 and prior) and Vijeo Designer (V6.2 SP9 and prior) which could cause unauthorized read and write when downloading and uploading project or firmware into Vijeo Designer Basic and Vijeo Designer. (DoS) It may be put into a state. Schneider Electric Vijeo Designer Basic and Schneider Electric Vijeo Designer are both a set of programming and design software for HMI (Human Machine Interface) from French Schneider Electric (Schneider Electric). Schneider Electric Vijeo Designer Basic and Vijeo Designer have vulnerabilities in trust management issues. Attackers can use this vulnerability to perform read and write operations
VAR-202006-1544 CVE-2020-7513 Schneider Electric Easergy T300 information disclosure vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A CWE-312: Cleartext Storage of Sensitive Information vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to intercept traffic and read configuration data. Easergy T300 There is a vulnerability in plaintext storage of important information.Information may be obtained. Schneider Electric Easergy T300 is a remote terminal unit used in the electric power industry from Schneider Electric in France
VAR-202006-1543 CVE-2020-7512 Easergy T300 Vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A CWE-1103: Use of Platform-Dependent Third Party Components with vulnerabilities vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to exploit the component. Easergy T300 There is an unspecified vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Schneider Electric Easergy T300 is a remote terminal unit used in the electric power industry from Schneider Electric in France
VAR-202006-1541 CVE-2020-7510 Easergy T300 Vulnerability regarding information leakage in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A CWE-200: Information Exposure vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow attacker to obtain private keys. Easergy T300 There is an information leakage vulnerability in.Information may be obtained. Schneider Electric Easergy T300 is a remote terminal unit used in the electric power industry from Schneider Electric in France
VAR-202006-0231 CVE-2020-14210 MONITORAPP AIWAF-VE and AIWAF-4000 Cross-site scripting vulnerability in CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Reflected Cross-Site Scripting (XSS) vulnerability in MONITORAPP WAF in which script can be executed when responding to Request URL information. It provides a function to response to Request URL information when blocking. MONITORAPP AIWAF-VE and AIWAF-4000 Exists in a cross-site scripting vulnerability.Information may be obtained and tampered with. Both MONITORAPP AIWAF-VE and AIWAF-4000 are products of MONITORAPP Company in the United States. MONITORAPP AIWAF-VE is an application firewall for the cloud. AIWAF-4000 is an application firewall. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-202006-1537 CVE-2020-7506 Easergy T300 Vulnerability regarding information leakage in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A CWE-200: Information Exposure vulnerability exists in Easergy T300, Firmware V1.5.2 and prior, which could allow an attacker to pack or unpack the archive with the firmware for the controller and modules using the usual tar archiver resulting in an information exposure. Easergy T300 There is an information leakage vulnerability in.Information may be obtained. Schneider Electric Easergy T300 is a remote terminal unit used in the electric power industry from Schneider Electric in France
VAR-202006-1533 CVE-2020-7502 Modicon M218 Logic Controller Out-of-bounds write vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A CWE-787: Out-of-bounds Write vulnerability exists in Modicon M218 Logic Controller (Firmware version 4.3 and prior), which may cause a Denial of Service when specific TCP/IP crafted packets are sent to the Modicon M218 Logic Controller. Modicon M218 Logic Controller Is vulnerable to out-of-bounds writes.Service operation interruption (DoS) It may be put into a state. Schneider Electric Modicon M218 Logic Controller is a programmable logic controller of French Schneider Electric (Schneider Electric) company
VAR-202007-0908 CVE-2020-15417 NETGEAR R6700 Stack-based buffer overflow vulnerability in routers CVSS V2: 5.8
CVSS V3: 6.3
Severity: MEDIUM
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of string table file uploads. A crafted gui_region in a string table file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the web server. Was ZDI-CAN-9756. Zero Day Initiative To this vulnerability ZDI-CAN-9756 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR R6700 is a wireless router made by NETGEAR. The vulnerability stems from the failure of the program to correctly verify the data length before copying the user-supplied data to the stack-based fixed buffer
VAR-202007-0051 CVE-2020-10924 NETGEAR R6700 Stack-based buffer overflow vulnerability in routers CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9643. NETGEAR R6700 A stack-based buffer overflow vulnerability exists in the router. Zero Day Initiative To this vulnerability ZDI-CAN-9643 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR R6700 is a wireless router from NETGEAR
VAR-202007-0056 CVE-2020-10930 NETGEAR R6700 Access control vulnerabilities in routers CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of URLs. The issue results from the lack of proper routing of URLs. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-9618. NETGEAR R6700 A router contains an access control vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-9618 Was numbered.Information may be obtained
VAR-202007-0053 CVE-2020-10926 NETGEAR R6700 Vulnerability in incomplete integrity verification of downloaded code on router CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of firmware updates. The issue results from the lack of proper validation of the firmware image prior to performing an upgrade. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-9648. Zero Day Initiative To this vulnerability ZDI-CAN-9648 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR R6700 is a wireless router made by NETGEAR. NETGEAR R6700 V1.0.4.84_10.0.58 has a verification problem in the firmware update processing process, which is caused by the program's failure to correctly verify the firmware image before the update
VAR-202007-0055 CVE-2020-10929 NETGEAR R6700 input validation error vulnerability CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of string table file uploads. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the admin user. Was ZDI-CAN-9768. NETGEAR R6700 The router is vulnerable to integer overflow. Zero Day Initiative To this vulnerability ZDI-CAN-9768 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. There is a security vulnerability in NETGEAR R6700 V1.0.4.84_10.0.58, which is caused by the program's failure to correctly verify the data submitted by the user
VAR-202007-0050 CVE-2020-10923 NETGEAR R6700 Authentication evasion vulnerability due to fundamental vulnerability in router CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000. A crafted UPnP message can be used to bypass authentication. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-9642. Zero Day Initiative To this vulnerability ZDI-CAN-9642 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR R6700 is a wireless router made by NETGEAR. The vulnerability stems from improper design or implementation in the code development process of network systems or products
VAR-202007-1436 CVE-2020-10927 NETGEAR R6700 Vulnerability in using cryptographic algorithms in routers CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the encryption of firmware update images. The issue results from the use of an inappropriate encryption algorithm. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-9649. Zero Day Initiative To this vulnerability ZDI-CAN-9649 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
VAR-202007-0054 CVE-2020-10928 NETGEAR R6700 Heap-based buffer overflow vulnerability in router CVSS V2: 4.6
CVSS V3: 8.4
Severity: HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of string table file uploads. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the web server. Was ZDI-CAN-9767. NETGEAR R6700 A heap-based buffer overflow vulnerability exists in the router. Zero Day Initiative To this vulnerability ZDI-CAN-9767 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR R6700 is a wireless router made by NETGEAR
VAR-202007-0052 CVE-2020-10925 NETGEAR R6700 Trust Management Issue Vulnerability CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via HTTPS. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-9647. NETGEAR R6700 A router contains a certificate validation vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-9647 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR R6700 is a wireless router made by NETGEAR. The file download (HTTPS) in NETGEAR R6700 V1.0.4.84_10.0.58 has a trust management vulnerability, which is caused by the program's failure to correctly verify the server's certificate