VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202412-2040 CVE-2024-51551 plural  ABB  Product use of hardcoded credentials vulnerability CVSS V2: 10.0
CVSS V3: 10.0
Severity: Critical
Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly available default credentials.   Affected products: ABB ASPECT - Enterprise v3.07.02; NEXUS Series v3.07.02; MATRIX Series v3.07.02. aspect-ent-2 firmware, aspect-ent-256 firmware, aspect-ent-96 firmware etc. ABB The product contains a vulnerability related to the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. ABB ASPECT is a scalable building energy management and control solution from Swiss company ABB. Attackers can exploit this vulnerability to access the system
VAR-202412-2234 CVE-2024-48845 plural  ABB  Weak Password Requirements Vulnerability in Products CVSS V2: 9.7
CVSS V3: 9.4
Severity: Critical
Weak Password Reset Rules vulnerabilities where found providing a potiential for the storage of weak passwords that could facilitate unauthorized admin/application access.   Affected products: ABB ASPECT - Enterprise v3.07.02; NEXUS Series v3.07.02; MATRIX Series v3.07.02. aspect-ent-2 firmware, aspect-ent-256 firmware, aspect-ent-96 firmware etc. ABB The product contains a weak password requirement vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. ABB ASPECT is a scalable building energy management and control solution from Swiss company ABB. An attacker can exploit this vulnerability to gain unauthorized administrator/application access
VAR-202412-1002 CVE-2018-9407 Google  of  Android  Vulnerability in CVSS V2: 4.6
CVSS V3: 5.5
Severity: MEDIUM
In emmc_rpmb_ioctl of emmc_rpmb.c, there is an Information Disclosure due to a Missing Bounds Check. This could lead to Information Disclosure of kernel data. Google of Android Exists in unspecified vulnerabilities.Information may be obtained. Google Pixel is a smartphone from Google Inc. There is a security vulnerability in Google Pixel. The vulnerability is caused by the lack of boundary check in emmc_rpmb_ioctl in emmc_rpmb.c, which may cause information leakage. No detailed vulnerability details are provided at present
VAR-202412-1345 CVE-2018-9403 Google  of  Android  Out-of-bounds write vulnerability in CVSS V2: 6.5
CVSS V3: 6.7
Severity: MEDIUM
In the MTK_FLP_MSG_HAL_DIAG_REPORT_DATA_NTF handler of flp2hal_- interface.c, there is a possible stack buffer overflow due to a missing bounds check. This could lead to local escalation of privilege in a privileged process with System execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google Inc. The vulnerability is caused by the lack of boundary check in the MTK_FLP_MSG_HAL_DIAG_REPORT_DATA_NTF handler in flp2hal_interface.c
VAR-202412-0832 CVE-2018-9402 Google  of  Android  Out-of-bounds write vulnerability in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
In multiple functions of gl_proc.c, there is a buffer overwrite due to a missing bounds check. This could lead to escalation of privileges in the kernel. Google of Android Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States. Attackers can exploit this vulnerability to cause privilege escalation
VAR-202412-1816 CVE-2018-9399 Google  of  Android  Out-of-bounds write vulnerability in CVSS V2: 6.8
CVSS V3: 6.7
Severity: MEDIUM
In /proc/driver/wmt_dbg driver, there are several possible out of bounds writes. These could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google Inc. There is a security vulnerability in Google Pixel, which is caused by multiple possible out-of-bounds writes in the /proc/driver/wmt_dbg driver. No detailed vulnerability details are provided at this time
VAR-202412-1175 CVE-2018-9397 Google  of  Android  Out-of-bounds write vulnerability in CVSS V2: 6.8
CVSS V3: 6.7
Severity: MEDIUM
In WMT_unlocked_ioctl of MTK WMT device driver, there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States. There is an out-of-bounds write vulnerability in Google Pixel
VAR-202412-1003 No CVE The AiKuai flow control router of Quanxun Huiju Network Technology (Beijing) Co., Ltd. has an information leakage vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
AiKuai flow control router is a router product of Quanxun Huiju Network Technology (Beijing) Co., Ltd. AiKuai flow control router of Quanxun Huiju Network Technology (Beijing) Co., Ltd. has an information leakage vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202412-0654 No CVE There is a SQL injection vulnerability in the Aikuai flow control router of Quanxun Huiju Network Technology (Beijing) Co., Ltd. CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
AiKuai flow control router is a router product of Quanxun Huiju Network Technology (Beijing) Co., Ltd. AiKuai flow control router of Quanxun Huiju Network Technology (Beijing) Co., Ltd. has a SQL injection vulnerability, which can be exploited by attackers to obtain sensitive information from the database.
VAR-202412-0018 CVE-2024-12147 Netgear R6900 Buffer Overflow Vulnerability CVSS V2: 6.8
CVSS V3: 6.5
Severity: High
A vulnerability was found in Netgear R6900 1.0.1.26_1.0.20. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file upgrade_check.cgi of the component HTTP Header Handler. The manipulation of the argument Content-Length leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. The vulnerability is caused by the parameter Content-Length of the file upgrade_check.cgi failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to cause a denial of service
VAR-202412-0238 CVE-2024-52275 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (fromWizardHandle modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50. of AC6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is due to insufficient length or boundary checking of input data, overwriting adjacent memory areas. Attackers can exploit this vulnerability to execute malicious code and gain control of the router, thereby threatening devices and network data connected to the router
VAR-202412-0271 CVE-2024-52274 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Out-of-bounds write vulnerability in firmware CVSS V2: 7.8
CVSS V3: 9.8
Severity: CRITICAL
Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (setDoubleL2tpConfig->guest_ip_check(overflow arg: mask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50. Shenzhen Tenda Technology Co.,Ltd. of AC6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability stems from improper input processing in the guest_ip_check function of the setDoubleL2tpConfig module. No detailed vulnerability details are currently available
VAR-202412-0112 CVE-2024-52273 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Out-of-bounds write vulnerability in firmware CVSS V2: 7.8
CVSS V3: 9.8
Severity: CRITICAL
Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (setDoublePppoeConfig->guest_ip_check(overflow arg: mask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50. Shenzhen Tenda Technology Co.,Ltd. of AC6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the guest_ip_check function in the setDoublePppoeConfig module not properly validating the input. No detailed vulnerability details are currently provided
VAR-202412-0272 CVE-2024-52272 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Out-of-bounds write vulnerability in firmware CVSS V2: 7.8
CVSS V3: 9.8
Severity: CRITICAL
Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (fromAdvSetLanip(overflow arg:lanMask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50. of AC6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability stems from improper processing of the lanMask parameter in the fromAdvSetLanip module. No detailed vulnerability details are currently available
VAR-202412-0239 CVE-2024-49416 Samsung's  SmartThings  Vulnerability in CVSS V2: -
CVSS V3: 4.0
Severity: MEDIUM
Use of implicit intent for sensitive communication in SmartThings prior to version 1.8.21 allows local attackers to get sensitive information. Samsung's SmartThings Exists in unspecified vulnerabilities.Information may be obtained
VAR-202412-0096 CVE-2018-9431 Google  of  Android  Vulnerability in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
In OSUInfo of OSUInfo.java, there is a possible escalation of privilege due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States. No detailed vulnerability details are currently available
VAR-202412-0321 CVE-2018-9414 Google  of  Android  Out-of-bounds write vulnerability in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
In gattServerSendResponseNative of com_android_bluetooth_gatt.cpp, there is a possible out of bounds stack write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States. There is an out-of-bounds write vulnerability in Google Pixel. The vulnerability is caused by the lack of boundary check in gattServerSendResponseNative of com_android_bluetooth_gatt.cpp. Attackers can exploit this vulnerability to elevate local privileges
VAR-202412-0133 CVE-2018-9413 Google  of  Android  Out-of-bounds write vulnerability in CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
In handle_notification_response of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Google of Android Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States. There is a security vulnerability in Google Pixel. No detailed vulnerability details are provided at present
VAR-202412-0134 CVE-2018-9381 Google  of  Android  Vulnerability in using uninitialized resources in CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
In gatts_process_read_by_type_req of gatt_sr.c, there is a possible information disclosure due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in the use of uninitialized resources.Information may be obtained. Google Pixel is a smartphone produced by Google in the United States. There is a security vulnerability in Google Pixel. No detailed vulnerability details are provided at present
VAR-202412-0289 CVE-2018-9380 Google  of  Android  Out-of-bounds write vulnerability in CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
In l2c_lcc_proc_pdu of l2c_fcr.cc, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Google of Android Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States. There is a security vulnerability in Google Pixel. No detailed vulnerability details are provided at present