VARIoT IoT vulnerabilities database
| VAR-202006-1534 | CVE-2020-7503 | Schneider Electric Easergy T300 cross-site request forgery vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
A CWE-352: Cross-Site Request Forgery (CSRF) vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to execute malicious commands on behalf of a legitimate user when xsrf-token data is intercepted. Easergy T300 Exists in a cross-site request forgery vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Schneider Electric Easergy T300 is a remote terminal unit used in the electric power industry from Schneider Electric in France
| VAR-202006-1540 | CVE-2020-7509 | Easergy T300 Vulnerability related to authority management in |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
A CWE-269: Improper privilege management (write) vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to elevate their privileges and delete files. Easergy T300 Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Schneider Electric Easergy T300 is a remote terminal unit used in the electric power industry from Schneider Electric in France.
There is a security vulnerability in Schneider Electric Easergy T300 using firmware version 1.5.2 and earlier
| VAR-202006-0114 | CVE-2020-13224 | plural TP-LINK Product Classic buffer overflow vulnerability in |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
TP-LINK NC200 devices through 2.1.10 build 200401, NC210 devices through 1.0.10 build 200401, NC220 devices through 1.3.1 build 200401, NC230 devices through 1.3.1 build 200401, NC250 devices through 1.3.1 build 200401, NC260 devices through 1.5.3 build_200401, and NC450 devices through 1.5.4 build 200401 have a Buffer Overflow. plural TP-LINK Product Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. TP-Link NC200, etc. are all a network camera of TP-Link company in China.
There are buffer overflow vulnerabilities in many TP-LINK products. Attackers can use this vulnerability to cause the ipcamera process to crash or execute arbitrary code with root privileges
| VAR-202006-1538 | CVE-2020-7507 | Schneider Electric Easergy T300 Resource Management Error Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A CWE-400: Uncontrolled Resource Consumption vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to login multiple times resulting in a denial of service. Easergy T300 Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be put into a state. Schneider Electric Easergy T300 is a remote terminal unit used in the electric power industry from Schneider Electric in France.
There is a resource management error vulnerability in Schneider Electric Easergy T300 using firmware version 1.5.2 and earlier
| VAR-202006-1532 | CVE-2020-7501 | Vijeo Designer Basic and Vijeo Designer Vulnerability in using hard-coded credentials in |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
A CWE-798: Use of Hard-coded Credentials vulnerability exists in Vijeo Designer Basic (V1.1 HotFix 16 and prior) and Vijeo Designer (V6.2 SP9 and prior) which could cause unauthorized read and write when downloading and uploading project or firmware into Vijeo Designer Basic and Vijeo Designer. (DoS) It may be put into a state. Schneider Electric Vijeo Designer Basic and Schneider Electric Vijeo Designer are both a set of programming and design software for HMI (Human Machine Interface) from French Schneider Electric (Schneider Electric).
Schneider Electric Vijeo Designer Basic and Vijeo Designer have vulnerabilities in trust management issues. Attackers can use this vulnerability to perform read and write operations
| VAR-202006-1544 | CVE-2020-7513 | Schneider Electric Easergy T300 information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A CWE-312: Cleartext Storage of Sensitive Information vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to intercept traffic and read configuration data. Easergy T300 There is a vulnerability in plaintext storage of important information.Information may be obtained. Schneider Electric Easergy T300 is a remote terminal unit used in the electric power industry from Schneider Electric in France
| VAR-202006-1543 | CVE-2020-7512 | Easergy T300 Vulnerability in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A CWE-1103: Use of Platform-Dependent Third Party Components with vulnerabilities vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to exploit the component. Easergy T300 There is an unspecified vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Schneider Electric Easergy T300 is a remote terminal unit used in the electric power industry from Schneider Electric in France
| VAR-202006-1541 | CVE-2020-7510 | Easergy T300 Vulnerability regarding information leakage in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A CWE-200: Information Exposure vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow attacker to obtain private keys. Easergy T300 There is an information leakage vulnerability in.Information may be obtained. Schneider Electric Easergy T300 is a remote terminal unit used in the electric power industry from Schneider Electric in France
| VAR-202006-0231 | CVE-2020-14210 | MONITORAPP AIWAF-VE and AIWAF-4000 Cross-site scripting vulnerability in |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Reflected Cross-Site Scripting (XSS) vulnerability in MONITORAPP WAF in which script can be executed when responding to Request URL information. It provides a function to response to Request URL information when blocking. MONITORAPP AIWAF-VE and AIWAF-4000 Exists in a cross-site scripting vulnerability.Information may be obtained and tampered with. Both MONITORAPP AIWAF-VE and AIWAF-4000 are products of MONITORAPP Company in the United States. MONITORAPP AIWAF-VE is an application firewall for the cloud. AIWAF-4000 is an application firewall. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
| VAR-202006-1537 | CVE-2020-7506 | Easergy T300 Vulnerability regarding information leakage in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A CWE-200: Information Exposure vulnerability exists in Easergy T300, Firmware V1.5.2 and prior, which could allow an attacker to pack or unpack the archive with the firmware for the controller and modules using the usual tar archiver resulting in an information exposure. Easergy T300 There is an information leakage vulnerability in.Information may be obtained. Schneider Electric Easergy T300 is a remote terminal unit used in the electric power industry from Schneider Electric in France
| VAR-202006-1533 | CVE-2020-7502 | Modicon M218 Logic Controller Out-of-bounds write vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A CWE-787: Out-of-bounds Write vulnerability exists in Modicon M218 Logic Controller (Firmware version 4.3 and prior), which may cause a Denial of Service when specific TCP/IP crafted packets are sent to the Modicon M218 Logic Controller. Modicon M218 Logic Controller Is vulnerable to out-of-bounds writes.Service operation interruption (DoS) It may be put into a state. Schneider Electric Modicon M218 Logic Controller is a programmable logic controller of French Schneider Electric (Schneider Electric) company
| VAR-202007-0908 | CVE-2020-15417 | NETGEAR R6700 Stack-based buffer overflow vulnerability in routers |
CVSS V2: 5.8 CVSS V3: 6.3 Severity: MEDIUM |
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of string table file uploads. A crafted gui_region in a string table file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the web server. Was ZDI-CAN-9756. Zero Day Initiative To this vulnerability ZDI-CAN-9756 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR R6700 is a wireless router made by NETGEAR. The vulnerability stems from the failure of the program to correctly verify the data length before copying the user-supplied data to the stack-based fixed buffer
| VAR-202007-0051 | CVE-2020-10924 | NETGEAR R6700 Stack-based buffer overflow vulnerability in routers |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9643. NETGEAR R6700 A stack-based buffer overflow vulnerability exists in the router. Zero Day Initiative To this vulnerability ZDI-CAN-9643 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR R6700 is a wireless router from NETGEAR
| VAR-202007-0056 | CVE-2020-10930 | NETGEAR R6700 Access control vulnerabilities in routers |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of URLs. The issue results from the lack of proper routing of URLs. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-9618. NETGEAR R6700 A router contains an access control vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-9618 Was numbered.Information may be obtained
| VAR-202007-0053 | CVE-2020-10926 | NETGEAR R6700 Vulnerability in incomplete integrity verification of downloaded code on router |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of firmware updates. The issue results from the lack of proper validation of the firmware image prior to performing an upgrade. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-9648. Zero Day Initiative To this vulnerability ZDI-CAN-9648 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR R6700 is a wireless router made by NETGEAR.
NETGEAR R6700 V1.0.4.84_10.0.58 has a verification problem in the firmware update processing process, which is caused by the program's failure to correctly verify the firmware image before the update
| VAR-202007-0055 | CVE-2020-10929 | NETGEAR R6700 input validation error vulnerability |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of string table file uploads. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the admin user. Was ZDI-CAN-9768. NETGEAR R6700 The router is vulnerable to integer overflow. Zero Day Initiative To this vulnerability ZDI-CAN-9768 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state.
There is a security vulnerability in NETGEAR R6700 V1.0.4.84_10.0.58, which is caused by the program's failure to correctly verify the data submitted by the user
| VAR-202007-0050 | CVE-2020-10923 | NETGEAR R6700 Authentication evasion vulnerability due to fundamental vulnerability in router |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000. A crafted UPnP message can be used to bypass authentication. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-9642. Zero Day Initiative To this vulnerability ZDI-CAN-9642 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR R6700 is a wireless router made by NETGEAR. The vulnerability stems from improper design or implementation in the code development process of network systems or products
| VAR-202007-1436 | CVE-2020-10927 | NETGEAR R6700 Vulnerability in using cryptographic algorithms in routers |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the encryption of firmware update images. The issue results from the use of an inappropriate encryption algorithm. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-9649. Zero Day Initiative To this vulnerability ZDI-CAN-9649 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
| VAR-202007-0054 | CVE-2020-10928 | NETGEAR R6700 Heap-based buffer overflow vulnerability in router |
CVSS V2: 4.6 CVSS V3: 8.4 Severity: HIGH |
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of string table file uploads. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the web server. Was ZDI-CAN-9767. NETGEAR R6700 A heap-based buffer overflow vulnerability exists in the router. Zero Day Initiative To this vulnerability ZDI-CAN-9767 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR R6700 is a wireless router made by NETGEAR
| VAR-202007-0052 | CVE-2020-10925 | NETGEAR R6700 Trust Management Issue Vulnerability |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via HTTPS. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-9647. NETGEAR R6700 A router contains a certificate validation vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-9647 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR R6700 is a wireless router made by NETGEAR.
The file download (HTTPS) in NETGEAR R6700 V1.0.4.84_10.0.58 has a trust management vulnerability, which is caused by the program's failure to correctly verify the server's certificate