VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202003-0657 CVE-2019-20489 NETGEAR WNR1000V4 Cross-site scripting vulnerabilities in devices CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. The web management interface (setup.cgi) has an authentication bypass and other problems that ultimately allow an attacker to remotely compromise the device from a malicious webpage. The attacker sends an FW_remote.htm&todo=cfg_init request without a cookie, reads the Set-Cookie header in the 401 Unauthorized response, and then repeats the FW_remote.htm&todo=cfg_init request with the specified cookie. NETGEAR WNR1000V4 A cross-site scripting vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. A remote attacker could use the shell metacharacter in the sysDNSHost parameter to exploit this vulnerability to execute arbitrary commands. NETGEAR WNR1000V4 is a G54 / N150 wireless router
VAR-202003-0656 CVE-2019-20488 NETGEAR WNR1000V4 Injection vulnerabilities in devices CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. Multiple actions within the web management interface (setup.cgi) are vulnerable to command injection, allowing remote attackers to execute arbitrary commands, as demonstrated by shell metacharacters in the sysDNSHost parameter. NETGEAR WNR1000V4 A device contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WNR1000V4 is a G54 / N150 wireless router
VAR-202003-0655 CVE-2019-20487 NETGEAR WNR1000V4 Cross-Site Request Forgery Vulnerability CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. Multiple actions within the WNR1000V4 web management console are vulnerable to an unauthenticated GET request (exploitable directly or through CSRF), as demonstrated by the setup.cgi?todo=save_htp_account URI. NETGEAR WNR1000V4 A cross-site request forgery vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WNR1000V4 is a wireless router product from NetGear. The vulnerability stems from a web application's insufficient verification that the request came from a trusted user. An attacker could use this vulnerability to send an unexpected request to the server through an affected client
VAR-202003-0654 CVE-2019-20486 NETGEAR WNR1000V4 Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. Multiple pages (setup.cgi and adv_index.htm) within the web management console are vulnerable to stored XSS, as demonstrated by the configuration of the UI language. NETGEAR WNR1000V4 A cross-site scripting vulnerability exists in the device.Information may be obtained and tampered with. NETGEAR WNR1000V4 is a G54 / N150 wireless router. No detailed vulnerability details are provided at this time
VAR-202003-1284 CVE-2018-5951 Mikrotik RouterOS Vulnerability in CVSS V2: 7.1
CVSS V3: 7.5
Severity: HIGH
An issue was discovered in Mikrotik RouterOS. Crafting a packet that has a size of 1 byte and sending it to an IPv6 address of a RouterOS box with IP Protocol 97 will cause RouterOS to reboot imminently. All versions of RouterOS that supports EoIPv6 are vulnerable to this attack. Mikrotik RouterOS There is an unspecified vulnerability in.Service operation interruption (DoS) It may be put into a state. MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality. A security vulnerability exists in Mikrotik RouterOS
VAR-202003-1401 CVE-2020-9534 D-Link DIR-615Jx10 Out-of-bounds write vulnerabilities in devices CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
fmwlan.c on D-Link DIR-615Jx10 devices has a stack-based buffer overflow via the formWlanSetup webpage parameter when f_radius_ip1 is malformed. D-Link DIR-615Jx10 The device is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. D-Link DIR-615Jx10 is a wireless router from Taiwan D-Link Corporation. A buffer overflow vulnerability exists in the fmwlan.c file in D-Link DIR-615Jx10. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
VAR-202003-1402 CVE-2020-9535 D-Link DIR-615Jx10 Out-of-bounds write vulnerability in CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
fmwlan.c on D-Link DIR-615Jx10 devices has a stack-based buffer overflow via the formWlanSetup_Wizard webpage parameter when f_radius_ip1 is malformed. D-Link DIR-615Jx10 Is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. D-Link DIR-615 is a wireless router from Taiwan D-Link. A buffer overflow vulnerability exists in the fmwlan.c file in D-Link DIR-615Jx10. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, resulting in incorrect read and write operations to other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
VAR-202002-1211 CVE-2020-6803 gateway Open redirect vulnerability in CVSS V2: 5.8
CVSS V3: 6.1
Severity: MEDIUM
An open redirect is present on the gateway's login page, which could cause a user to be redirected to a malicious site after logging in. gateway Exists in an open redirect vulnerability.Information may be obtained and tampered with. WebThings Gateway is an IoT gateway from the Mozilla Foundation in the United States. The login page in WebThings Gateway has an input validation error vulnerability. The vulnerability stems from a network system or product that did not properly validate the input data
VAR-202002-1212 CVE-2020-6804 gateway Cross-site scripting vulnerability in CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
A reflected XSS vulnerability exists within the gateway, allowing an attacker to craft a specialized URL which could steal the user's authentication token. When combined with CVE-2020-6803, an attacker could fully compromise the system. gateway Exists in a cross-site scripting vulnerability.Information may be obtained and tampered with. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-202002-0939 CVE-2020-3923 TAT-76 and TAT-77 Unauthorized authentication vulnerabilities in the series CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
DVR firmware in TAT-76 and TAT-77 series of products, provided by TONNET, contain misconfigured authentication mechanism. Attackers can crack the default password and gain access to the system. TAT-76 and TAT-77 The series contains vulnerabilities related to fraudulent authentication.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Tonnet TAT-76 is a network camera device
VAR-202002-1222 CVE-2020-6863 ZTE E8820V3 Vulnerability in improperly assigning permissions to critical resources on routers CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
ZTE E8820V3 router product is impacted by a permission and access control vulnerability. Attackers could use this vulnerability to tamper with DDNS parameters and send DoS attacks on the specified URL. ZTE E8820V3 A router contains a vulnerability in improper permission assignment for critical resources.Service operation interruption (DoS) It may be put into a state. ZTE E8820V3 is a gigabit dual-band 1200M smart router with WiFi
VAR-202002-1223 CVE-2020-6864 ZTE E8820V3 Information Disclosure Vulnerability CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
ZTE E8820V3 router product is impacted by an information leak vulnerability. Attackers could use this vulnerability to to gain wireless passwords. After obtaining the wireless password, the attacker could collect information and attack the router. ZTE E8820V3 is a gigabit dual-band 1200M smart router with WiFi
VAR-202002-0940 CVE-2020-3924 TAT-76 and TAT-77 Injection vulnerabilities in the series CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
DVR firmware in TAT-76 and TAT-77 series of products, provided by TONNET do not properly verify patch files. Attackers can inject a specific command into a patch file and gain access to the system. TAT-76 and TAT-77 There is an injection vulnerability in the series.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Tonnet TAT-76 is a network camera device. Tonnet TAT-76 update function failed to correctly verify the update file. Remote attackers can use this vulnerability to submit special requests and inject commands to obtain device permissions
VAR-202002-0890 CVE-2018-8877 Asuswrt-Merlin and ASUS Information leakage vulnerability in firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Information disclosure in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to acquire information on internal network IP address ranges by reading the new_lan_ip variable on the error_page.htm page. Asuswrt-Merlin and ASUS There is an information leakage vulnerability in the firmware.Information may be obtained. ASUS Asuswrt-Merlin is a firmware running in the routers of ASUS Corporation of Taiwan, China
VAR-202002-0891 CVE-2018-8878 Asuswrt-Merlin and ASUS Information leakage vulnerability in firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Information disclosure in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to acquire information on internal network devices' hostnames and MAC addresses by reading the custom_id variable on the blocking.asp page. Asuswrt-Merlin and ASUS There is an information leakage vulnerability in the firmware.Information may be obtained. ASUS Asuswrt-Merlin is a firmware running in the routers of ASUS Corporation of Taiwan, China
VAR-202002-1685 No CVE D-Link DIR-859 Arbitrary Code Execution Vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
D-Link DIR-859 is a popular router device. D-Link DIR-859 has a security vulnerability. A remote attacker could use this vulnerability to submit a special request and execute arbitrary code in the application context.
VAR-202002-0701 CVE-2020-3173 Cisco UCS Manager Software Operating System Command Injection Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A vulnerability in the local management (local-mgmt) CLI of Cisco UCS Manager Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) on an affected device. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by including crafted arguments to specific commands on the local management CLI. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS with the privileges of the currently logged-in user for all affected platforms excluding Cisco UCS 6400 Series Fabric Interconnects. On Cisco UCS 6400 Series Fabric Interconnects, the injected commands are executed with root privileges. Cisco UCS Manager The software contains vulnerabilities to inadequate validation of data reliability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
VAR-202002-0575 CVE-2020-1792 Honor V10 Out-of-bounds writing vulnerabilities on smartphones CVSS V2: 7.1
CVSS V3: 5.5
Severity: MEDIUM
Honor V10 smartphones with versions earlier than BKL-AL20 10.0.0.156(C00E156R2P4) and versions earlier than BKL-L09 10.0.0.146(C432E4R1P4) have an out of bounds write vulnerability. The software writes data past the end of the intended buffer because of insufficient validation of certain parameter when initializing certain driver program. An attacker could trick the user into installing a malicious application, successful exploit could cause the device to reboot. Huawei Honor V10 is a smartphone product from China's Huawei. The vulnerability stems from insufficient verification of incoming parameters
VAR-202002-0697 CVE-2020-3169 Cisco Firepower 4100 Series and Firepower 9300 Security Appliances FXOS Software Operating System Command Injection Vulnerability CVSS V2: 7.2
CVSS V3: 6.7
Severity: MEDIUM
A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with a privilege level of root on an affected device. The vulnerability is due to insufficient validation of arguments passed to a specific CLI command on the affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with root privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Cisco FXOS The software OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. The Cisco Firepower 4100 Series and Cisco Firepower 9300 Security Appliance are both products of Cisco Corporation of the United States. The Cisco Firepower 9300 Security Appliance is a 9300 series security appliance. Cisco FXOS Software is a suite of firewall software that runs on Cisco security appliances. The Cisco Firepower 9300 Security Appliance is a 9300 series security appliance. The Cisco Firepower 4100 Series is a 4100 series firewall device
VAR-202002-0696 CVE-2020-3168 Cisco Nexus 1000V Switch for VMware vSphere Resource Management Error Vulnerability CVSS V2: 7.1
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the Secure Login Enhancements capability of Cisco Nexus 1000V Switch for VMware vSphere could allow an unauthenticated, remote attacker to cause an affected Nexus 1000V Virtual Supervisor Module (VSM) to become inaccessible to users through the CLI. The vulnerability is due to improper resource allocation during failed CLI login attempts when login parameters that are part of the Secure Login Enhancements capability are configured on an affected device. An attacker could exploit this vulnerability by performing a high amount of login attempts against the affected device. A successful exploit could cause the affected device to become inaccessible to other users, resulting in a denial of service (DoS) condition requiring a manual power cycle of the VSM to recover. VMware vSphere For Cisco Nexus 1000V The switch contains a resource exhaustion vulnerability.Service operation interruption (DoS) It may be put into a state. Supervisor is a process control system for Unix-like systems. This system is mainly used to monitor and control processes in Unix-like operating systems. The program failed to allocate resources correctly