VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202003-1813 No CVE ifw8 Router ROM router has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The ifw8 Router ROM router is an enterprise-level router device of Chengdu Zhifengwang Technology Co., Ltd., which is mostly used in Internet cafes and large enterprise networks. Ifw8 Router ROM router has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202003-1791 No CVE Xintian Technology's intelligent water management and control integrated platform system has SQL injection vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Xintian Technology Co., Ltd. provides products and intelligent solutions to achieve energy saving. Xintian Technology's intelligent water management and control integrated platform system has a SQL injection vulnerability, which can be used by attackers to obtain sensitive information.
VAR-202003-1815 No CVE Netlink GPON Router certification RCE vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Netlink GPON Router is a router device. Netlink GPON Router has a certification RCE vulnerability, which can be used by attackers to take over remote target devices.
VAR-202003-0742 CVE-2019-16258 Homee Brain Cube access control error vulnerability CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
The bootloader of the homee Brain Cube V2 through 2.23.0 allows attackers with physical access to gain root access by manipulating the U-Boot environment via the CLI after connecting to the internal UART interface. homee Brain Cube There is a vulnerability in the lack of authentication for critical features.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Homee Brain Cube is a smart home central control unit of German Homee company
VAR-202003-0603 CVE-2019-12767 D-Link DAP-1650 On the device OS Command injection vulnerabilities CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on D-Link DAP-1650 devices before 1.04B02_J65H Hot Fix. Attackers can execute arbitrary commands. D-Link DAP-1650 On the device OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. D-Link DAP-1650 is a WiFi range extender from D-Link, Taiwan
VAR-202003-1219 CVE-2013-7487 plural Swann DVR Injection vulnerabilities in devices CVSS V2: 6.8
CVSS V3: 9.8
Severity: CRITICAL
On Swann DVR04B, DVR08B, DVR-16CIF, and DVR16B devices, raysharpdvr application has a vulnerable call to “system”, which allows remote attackers to execute arbitrary code via TCP port 9000. plural Swann DVR A device contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Swann DVR04B, etc. are all digital video recorders of American Swann company. Many raysharpdvr applications in Swann products have injection vulnerabilities
VAR-202003-0951 CVE-2019-19148 Tellabs Optical Line Terminal 1150 Authentication vulnerabilities in devices CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tellabs Optical Line Terminal (OLT) 1150 devices allow Remote Command Execution via the -l option to TELNET or SSH. Tellabs has addressed this issue in the SR30.1 and SR31.1 release on February 18, 2020. Tellabs Optical Line Terminal (OLT) 1150 There is an authentication vulnerability in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Tellabs Optical Line Terminal (OLI) is an optical line terminal product of American Tellabs Company. In Tellabs OLT 1150 FP29.2_015873, there is an authorization vulnerability, which can be exploited by attackers to execute commands
VAR-202003-1559 CVE-2020-5863 NGINX Controller Unauthorized authentication vulnerability in CVSS V2: 7.5
CVSS V3: 8.6
Severity: HIGH
In NGINX Controller versions prior to 3.2.0, an unauthenticated attacker with network access to the Controller API can create unprivileged user accounts. The user which is created is only able to upload a new license to the system but cannot view or modify any other components of the system. NGINX Controller Exists in a fraudulent authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NGINX is a lightweight web server/reverse proxy server and e-mail (IMAP/POP3) proxy server of the American NGINX company. The vulnerability stems from the fact that the Controller API does not perform correct access control
VAR-202003-1790 No CVE Yonghong FD200 has a memory corruption vulnerability (CNVD-2020-10234) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Taiwan Yonghong Motor focuses on the high-function small and medium-sized and micro PLC market. Yonghong FD200 has a memory corruption vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202003-1794 No CVE Yonghong FD200 has a memory corruption vulnerability (CNVD-2020-10235) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Taiwan Yonghong Motor focuses on the high-function small and medium-sized and micro PLC market. Yonghong FD200 has a memory corruption vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202003-1796 No CVE Yonghong FD300 has a memory corruption vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Taiwan Yonghong Motor focuses on the high-function small and medium-sized and micro PLC market. Yonghong FD300 has a memory corruption vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202003-1793 No CVE Yonghong FD100 has a memory corruption vulnerability (CNVD-2020-10236) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Taiwan Yonghong Motor focuses on the high-function small and medium-sized and micro PLC market. Yonghong FD100 has a memory corruption vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202003-1792 No CVE Yonghong FD100 has a memory corruption vulnerability (CNVD-2020-10237) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Taiwan Yonghong Motor focuses on the high-function small and medium-sized and micro PLC market. Yonghong FD100 has a memory corruption vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202003-0129 CVE-2020-10670 Canon Oce Colorwave 500 Cross-site scripting vulnerabilities in printers CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
The web application exposed by the Canon Oce Colorwave 500 4.0.0.0 printer is vulnerable to Reflected XSS in the parameter settingId of the settingDialogContent.jsp page. NOTE: this is fixed in the latest version. Canon Oce Colorwave 500 A cross-site scripting vulnerability exists in the printer.Information may be obtained and tampered with. Canon Oce Colorwave 500 is a printer from Canon, Japan. The vulnerability stems from the lack of proper verification of client data by WEB applications. Attackers can use this vulnerability to execute client code. # Exploit Title: Océ Colorwave 500 printer: Multiple vulnerabilities # Exploit Author: Giuseppe Calì, Marco Ortisi # Authors blog: https://www.redtimmy.com # Vendor Homepage: https://www.canon.com # Software Link: https://lfpp.csa.canon.com/tss/tss_product_detail.jsp?PRODUCT%3C%3Eprd_id=845524441910378&SKU%3C%3Esku_id=1689949372031068&FOLDER%3C%3Efolder_id=2534374302162637&bmUID=mpYkKHM # Version: 4.0.0.0 # CVE: 2020-10667, 2020-10668, 2020-10669, 2020-10670, 2020-10671 We have recently registered five CVE(s) affecting the Oce Colorwave 500 printer. CVE-2020-10669 is an authentication bypass allowing an attacker to access documents that have been uploaded to the printer. As the documents remain stored in the system even after they have been printed (depending on the printer's configuration), a malicious insider may be able to access documents printed in the past. CVE-2020-10667 is a Stored XSS on the “/TemplateManager/indexExternalLocation.jsp” page. CVE-2020-10668 and CVE-10670 are two Reflected XSS on pages “/home.jsp” and “/SettingsEditor/settingDialogContent.jsp”. Finally CVE-10671 is a system-wide CSRF due to the absence of any form of nonce or countermeasure protecting against Cross Site Request Forgery. More details and full story here: https://www.redtimmy.com/red-teaming/hacking-the-oce-colorwave-printer-when-a-quick-security-assessment-determines-the-success-of-a-red-team-exercise/
VAR-202003-0126 CVE-2020-10667 Canon Oce Colorwave 500 Cross-site scripting vulnerabilities in printers CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
The web application exposed by the Canon Oce Colorwave 500 4.0.0.0 printer is vulnerable to Stored XSS in /TemplateManager/indexExternalLocation.jsp. The vulnerable parameter is map(template_name). NOTE: this is fixed in the latest version. Canon Oce Colorwave 500 is a printer from Canon, Japan. The vulnerability stems from the lack of proper verification of client data by WEB applications. Attackers can use this vulnerability to execute client code. # Exploit Title: Océ Colorwave 500 printer: Multiple vulnerabilities # Exploit Author: Giuseppe Calì, Marco Ortisi # Authors blog: https://www.redtimmy.com # Vendor Homepage: https://www.canon.com # Software Link: https://lfpp.csa.canon.com/tss/tss_product_detail.jsp?PRODUCT%3C%3Eprd_id=845524441910378&SKU%3C%3Esku_id=1689949372031068&FOLDER%3C%3Efolder_id=2534374302162637&bmUID=mpYkKHM # Version: 4.0.0.0 # CVE: 2020-10667, 2020-10668, 2020-10669, 2020-10670, 2020-10671 We have recently registered five CVE(s) affecting the Oce Colorwave 500 printer. CVE-2020-10669 is an authentication bypass allowing an attacker to access documents that have been uploaded to the printer. As the documents remain stored in the system even after they have been printed (depending on the printer's configuration), a malicious insider may be able to access documents printed in the past. CVE-2020-10667 is a Stored XSS on the “/TemplateManager/indexExternalLocation.jsp” page. CVE-2020-10668 and CVE-10670 are two Reflected XSS on pages “/home.jsp” and “/SettingsEditor/settingDialogContent.jsp”. Finally CVE-10671 is a system-wide CSRF due to the absence of any form of nonce or countermeasure protecting against Cross Site Request Forgery. More details and full story here: https://www.redtimmy.com/red-teaming/hacking-the-oce-colorwave-printer-when-a-quick-security-assessment-determines-the-success-of-a-red-team-exercise/
VAR-202003-0190 CVE-2020-10671 Canon Oce Colorwave 500 Cross-site request forgery vulnerability in printers CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
The Canon Oce Colorwave 500 4.0.0.0 printer's web application is missing any form of CSRF protections. This is a system-wide issue. An attacker could perform administrative actions by targeting a logged-in administrative user. NOTE: this is fixed in the latest version. Canon Oce Colorwave 500 A cross-site request forgery vulnerability exists in the printer.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Canon Oce Colorwave 500 is a printer from Canon, Japan. The vulnerability stems from the program's lack of any form of cross-site request forgery protection. Attackers can use this vulnerability to perform management operations. # Exploit Title: Océ Colorwave 500 printer: Multiple vulnerabilities # Exploit Author: Giuseppe Calì, Marco Ortisi # Authors blog: https://www.redtimmy.com # Vendor Homepage: https://www.canon.com # Software Link: https://lfpp.csa.canon.com/tss/tss_product_detail.jsp?PRODUCT%3C%3Eprd_id=845524441910378&SKU%3C%3Esku_id=1689949372031068&FOLDER%3C%3Efolder_id=2534374302162637&bmUID=mpYkKHM # Version: 4.0.0.0 # CVE: 2020-10667, 2020-10668, 2020-10669, 2020-10670, 2020-10671 We have recently registered five CVE(s) affecting the Oce Colorwave 500 printer. CVE-2020-10669 is an authentication bypass allowing an attacker to access documents that have been uploaded to the printer. As the documents remain stored in the system even after they have been printed (depending on the printer's configuration), a malicious insider may be able to access documents printed in the past. CVE-2020-10667 is a Stored XSS on the “/TemplateManager/indexExternalLocation.jsp” page. CVE-2020-10668 and CVE-10670 are two Reflected XSS on pages “/home.jsp” and “/SettingsEditor/settingDialogContent.jsp”. More details and full story here: https://www.redtimmy.com/red-teaming/hacking-the-oce-colorwave-printer-when-a-quick-security-assessment-determines-the-success-of-a-red-team-exercise/
VAR-202003-0127 CVE-2020-10668 Canon Oce Colorwave 500 Cross-site scripting vulnerabilities in printers CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
The web application exposed by the Canon Oce Colorwave 500 4.0.0.0 printer is vulnerable to Reflected XSS in /home.jsp. The vulnerable parameter is openSI. NOTE: this is fixed in the latest version. Canon Oce Colorwave 500 is a printer from Canon, Japan. The vulnerability stems from the lack of proper verification of client data by WEB applications. Attackers can use this vulnerability to execute client code. # Exploit Title: Océ Colorwave 500 printer: Multiple vulnerabilities # Exploit Author: Giuseppe Calì, Marco Ortisi # Authors blog: https://www.redtimmy.com # Vendor Homepage: https://www.canon.com # Software Link: https://lfpp.csa.canon.com/tss/tss_product_detail.jsp?PRODUCT%3C%3Eprd_id=845524441910378&SKU%3C%3Esku_id=1689949372031068&FOLDER%3C%3Efolder_id=2534374302162637&bmUID=mpYkKHM # Version: 4.0.0.0 # CVE: 2020-10667, 2020-10668, 2020-10669, 2020-10670, 2020-10671 We have recently registered five CVE(s) affecting the Oce Colorwave 500 printer. CVE-2020-10669 is an authentication bypass allowing an attacker to access documents that have been uploaded to the printer. As the documents remain stored in the system even after they have been printed (depending on the printer's configuration), a malicious insider may be able to access documents printed in the past. CVE-2020-10667 is a Stored XSS on the “/TemplateManager/indexExternalLocation.jsp” page. CVE-2020-10668 and CVE-10670 are two Reflected XSS on pages “/home.jsp” and “/SettingsEditor/settingDialogContent.jsp”. Finally CVE-10671 is a system-wide CSRF due to the absence of any form of nonce or countermeasure protecting against Cross Site Request Forgery. More details and full story here: https://www.redtimmy.com/red-teaming/hacking-the-oce-colorwave-printer-when-a-quick-security-assessment-determines-the-success-of-a-red-team-exercise/
VAR-202003-0128 CVE-2020-10669 Canon Oce Colorwave Authentication vulnerabilities in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The web application exposed by the Canon Oce Colorwave 500 4.0.0.0 printer is vulnerable to authentication bypass on the page /home.jsp. An unauthenticated attacker able to connect to the device's web interface can get a copy of the documents uploaded by any users. NOTE: this is fixed in the latest version. # Exploit Title: Océ Colorwave 500 printer: Multiple vulnerabilities # Exploit Author: Giuseppe Calì, Marco Ortisi # Authors blog: https://www.redtimmy.com # Vendor Homepage: https://www.canon.com # Software Link: https://lfpp.csa.canon.com/tss/tss_product_detail.jsp?PRODUCT%3C%3Eprd_id=845524441910378&SKU%3C%3Esku_id=1689949372031068&FOLDER%3C%3Efolder_id=2534374302162637&bmUID=mpYkKHM # Version: 4.0.0.0 # CVE: 2020-10667, 2020-10668, 2020-10669, 2020-10670, 2020-10671 We have recently registered five CVE(s) affecting the Oce Colorwave 500 printer. As the documents remain stored in the system even after they have been printed (depending on the printer's configuration), a malicious insider may be able to access documents printed in the past. CVE-2020-10667 is a Stored XSS on the “/TemplateManager/indexExternalLocation.jsp” page. CVE-2020-10668 and CVE-10670 are two Reflected XSS on pages “/home.jsp” and “/SettingsEditor/settingDialogContent.jsp”. Finally CVE-10671 is a system-wide CSRF due to the absence of any form of nonce or countermeasure protecting against Cross Site Request Forgery. More details and full story here: https://www.redtimmy.com/red-teaming/hacking-the-oce-colorwave-printer-when-a-quick-security-assessment-determines-the-success-of-a-red-team-exercise/
VAR-202003-0625 CVE-2019-15655 D-Link DSL-2875AL Inadequate protection of credentials on devices CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
D-Link DSL-2875AL devices through 1.00.05 are prone to password disclosure via a simple crafted /romfile.cfg request to the web management server. This request doesn't require any authentication and will lead to saving the configuration file. The password is stored in cleartext. D-Link DSL-2875AL Devices contain vulnerabilities in insufficient protection of credentials.Information may be obtained. D-Link DSL-2875AL is a wireless router from D-Link, Taiwan. D-Link DSL-2875AL has a security vulnerability before 1.00.05
VAR-202003-0623 CVE-2019-15653 Comba AP2600-I Inadequate protection of credentials on devices CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Comba AP2600-I devices through A02,0202N00PD2 are prone to password disclosure via an insecure authentication mechanism. The HTML source code of the login page contains values that allow obtaining the username and password. The username are password values are a double md5 of the plaintext real value, i.e., md5(md5(value)). Comba AP2600-I Devices contain vulnerabilities in insufficient protection of credentials.Information may be obtained. Comba Telecom AP2600-I is a wireless access point device from India's Comba Telecom. Comba Telecom AP2600-I devices A02,0202N00PD2 and previous versions have security vulnerabilities that remote attackers can use to make special requests to exploit the vulnerability to obtain sensitive information