VARIoT IoT vulnerabilities database
VAR-202412-0653 | No CVE | Siemens Opcenter Execution Foundation Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Opcenter Execution Foundation is a manufacturing execution system (MES) software launched by Siemens, which is mainly used to monitor and synchronize the manufacturing activities of all factories around the world. The software implements low-code personalization through embedded Mendix technology, allowing users to customize and develop systems suitable for specific production scenarios according to their own needs.
Siemens Opcenter Execution Foundation has a buffer overflow vulnerability, which can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-0834 | No CVE | Siemens SIMATIC PCS neo Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
SIMATIC PCS neo is a fully web-based process control system.
Siemens SIMATIC PCS neo has a buffer overflow vulnerability that can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-0457 | CVE-2024-53832 | Siemens SICAM A8000 CP-8031 and CP-8050 Firmware Decryption Vulnerability |
CVSS V2: 6.1 CVSS V3: 4.6 Severity: Medium |
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V05.30). The affected devices contain a secure element which is connected via an unencrypted SPI bus. This could allow an attacker with physical access to the SPI bus to observe the password used for the secure element authentication, and then use the secure element as an oracle to decrypt all encrypted update files. SICAM A8000 RTU (Remote Terminal Unit) is a modular device for remote control and automation applications in all energy supply sectors
VAR-202412-0387 | CVE-2024-52051 | Siemens Engineering Platforms Local Arbitrary Code Execution Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.3 Severity: High |
A vulnerability has been identified in SIMATIC S7-PLCSIM V17 (All versions), SIMATIC S7-PLCSIM V18 (All versions), SIMATIC STEP 7 Safety V17 (All versions), SIMATIC STEP 7 Safety V18 (All versions), SIMATIC STEP 7 Safety V19 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions), SIMATIC STEP 7 V19 (All versions), SIMATIC WinCC Unified PC Runtime V18 (All versions), SIMATIC WinCC Unified PC Runtime V19 (All versions), SIMATIC WinCC Unified V17 (All versions), SIMATIC WinCC Unified V18 (All versions), SIMATIC WinCC Unified V19 (All versions), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V18 (All versions), SIMATIC WinCC V19 (All versions), SIMOCODE ES V17 (All versions), SIMOCODE ES V18 (All versions), SIMOCODE ES V19 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SIMOTION SCOUT TIA V5.6 SP1 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SINAMICS Startdrive V19 (All versions), SIRIUS Safety ES V17 (TIA Portal) (All versions), SIRIUS Safety ES V18 (TIA Portal) (All versions), SIRIUS Safety ES V19 (TIA Portal) (All versions), SIRIUS Soft Starter ES V17 (TIA Portal) (All versions), SIRIUS Soft Starter ES V18 (TIA Portal) (All versions), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions), TIA Portal Cloud V17 (All versions), TIA Portal Cloud V18 (All versions), TIA Portal Cloud V19 (All versions). The affected devices do not properly sanitize user-controllable input when parsing user settings. This could allow an attacker to locally execute arbitrary commands in the host operating system with the privileges of the user. Totally Integrated Automation Portal (TIA Portal) is a PC software that provides the full range of Siemens digital automation services, from digital planning, integrated engineering to transparent operation
VAR-202412-0388 | CVE-2024-49849 | Siemens Engineering Platforms Deserialization Vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in SIMATIC S7-PLCSIM V16 (All versions), SIMATIC S7-PLCSIM V17 (All versions), SIMATIC STEP 7 Safety V16 (All versions), SIMATIC STEP 7 Safety V17 (All versions), SIMATIC STEP 7 Safety V18 (All versions), SIMATIC STEP 7 Safety V19 (All versions), SIMATIC STEP 7 V16 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions), SIMATIC STEP 7 V19 (All versions), SIMATIC WinCC Unified V16 (All versions), SIMATIC WinCC Unified V17 (All versions), SIMATIC WinCC Unified V18 (All versions), SIMATIC WinCC Unified V19 (All versions), SIMATIC WinCC V16 (All versions), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V18 (All versions), SIMATIC WinCC V19 (All versions), SIMOCODE ES V16 (All versions), SIMOCODE ES V17 (All versions), SIMOCODE ES V18 (All versions), SIMOCODE ES V19 (All versions), SIMOTION SCOUT TIA V5.4 SP1 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SIMOTION SCOUT TIA V5.6 SP1 (All versions), SINAMICS Startdrive V16 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SINAMICS Startdrive V19 (All versions), SIRIUS Safety ES V17 (TIA Portal) (All versions), SIRIUS Safety ES V18 (TIA Portal) (All versions), SIRIUS Safety ES V19 (TIA Portal) (All versions), SIRIUS Soft Starter ES V17 (TIA Portal) (All versions), SIRIUS Soft Starter ES V18 (TIA Portal) (All versions), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions), TIA Portal Cloud V16 (All versions), TIA Portal Cloud V17 (All versions), TIA Portal Cloud V18 (All versions), TIA Portal Cloud V19 (All versions). Affected products do not properly sanitize user-controllable input when parsing log files. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application. SIMATIC S7-PLCSIM simulates S7-1200, S7-1500 and some other PLC derivatives and is shipped as part of SIMATIC STEP 7. SIMATIC STEP 7 (TIA Portal) is an engineering software for configuring and programming SIMATIC controllers. SIMOCODE ES is the central software package for configuration, commissioning, operation and diagnostics of SIMOCODE-pro. SINAMICS Startdrive commissioning software is the engineering tool for integrating SINAMICS drives in TIA Portal. Totally Integrated Automation Portal (TIA Portal) is a PC software that offers the complete range of Siemens digital automation services, from digital planning and integrated engineering to transparent operation. TIA Portal Cloud makes it possible to use the main and main option packages of TIA Portal in a virtualized environment. Local projects can be transferred to the cloud and reloaded via file sharing services
VAR-202412-0442 | CVE-2020-28398 | Siemens RUGGEDCOM ROX II Cross-Site Request Forgery Vulnerability |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0). The CLI feature in the web interface of affected devices is vulnerable to
cross-site request forgery (CSRF).
This could allow an attacker to read or modify the device configuration
by tricking an authenticated legitimate user into accessing a malicious link. RUGGEDCOM ROX II is a ROX-based VPN endpoint and firewall device used to connect devices operating in harsh environments, such as power substations and traffic control cabinets
VAR-202412-0654 | No CVE | There is a SQL injection vulnerability in the Aikuai flow control router of Quanxun Huiju Network Technology (Beijing) Co., Ltd. |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
AiKuai flow control router is a router product of Quanxun Huiju Network Technology (Beijing) Co., Ltd.
AiKuai flow control router of Quanxun Huiju Network Technology (Beijing) Co., Ltd. has a SQL injection vulnerability, which can be exploited by attackers to obtain sensitive information from the database.
VAR-202412-1003 | No CVE | The AiKuai flow control router of Quanxun Huiju Network Technology (Beijing) Co., Ltd. has an information leakage vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
AiKuai flow control router is a router product of Quanxun Huiju Network Technology (Beijing) Co., Ltd.
AiKuai flow control router of Quanxun Huiju Network Technology (Beijing) Co., Ltd. has an information leakage vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202411-1755 | CVE-2024-12002 | plural Shenzhen Tenda Technology Co.,Ltd. In the product NULL Pointer dereference vulnerability |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: Medium |
A vulnerability classified as problematic was found in Tenda FH451, FH1201, FH1202 and FH1206 up to 20241129. Affected by this vulnerability is the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. fh451 firmware, fh1201 firmware, FH1202 firmware etc. Shenzhen Tenda Technology Co.,Ltd. The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state
VAR-202411-1660 | CVE-2024-11803 | Fuji Electric's Tellus Lite V-Simulator Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of V8 files in the V-Simulator 5 component. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24771. (DoS) It may be in a state
VAR-202411-1649 | CVE-2024-11799 | Fuji Electric's Tellus Lite V-Simulator Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of V8 files in the V-Simulator 5 component. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24664. Fuji Electric's Tellus Lite V-Simulator Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202411-1752 | CVE-2024-53334 | TOTOLINK A810R infostat.cgi buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
TOTOLINK A810R is a wireless dual-band router produced by China's TOTOLINK Electronics.
There is a buffer overflow vulnerability in TOTOLINK A810R infostat.cgi. A remote attacker can use this vulnerability to submit special requests, which can cause the service program to crash or execute arbitrary code in the application context.
VAR-202411-1725 | CVE-2024-11801 | Fuji Electric's Tellus Lite V-Simulator Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of V8 files in the V-Simulator 5 component. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24769. (DoS) It may be in a state
VAR-202411-1620 | CVE-2024-11802 | Fuji Electric's Tellus Lite V-Simulator Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of V8 files in the V-Simulator 5 component. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24770. Fuji Electric's Tellus Lite V-Simulator Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202411-1638 | CVE-2024-11800 | Fuji Electric's Tellus Lite V-Simulator Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of V8 files in the V-Simulator 5 component. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24768. Fuji Electric's Tellus Lite V-Simulator Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202411-1640 | CVE-2024-48286 | Linksys E3000 diag_ping_start Command Injection Vulnerability |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Linksys E3000 is a powerful dual-band Wireless-N router from Linksys, an American company.
There is a security vulnerability in diag_ping_start of Linksys E3000. A remote attacker can use this vulnerability to submit special requests and execute arbitrary commands in the context of the application.
VAR-202411-1479 | CVE-2024-11650 | Tenda i9 Denial of Service Vulnerability |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: High |
A vulnerability was found in Tenda i9 1.0.0.8(3828) and classified as critical. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Tenda i9 is a ceiling-mounted wireless access point from China's Tenda company.
Tenda i9 has a denial of service vulnerability, which stems from a null pointer dereference in the websReadEvent function of the file /goform/GetIPTV. An attacker can exploit this vulnerability to cause a denial of service
VAR-202411-1370 | CVE-2024-52034 | mySCADA myPRO Manager Operating System Command Injection Vulnerability (CNVD-2024-46408) |
CVSS V2: 10.0 CVSS V3: 10.0 Severity: Critical |
An OS Command Injection vulnerability exists within myPRO Manager. A parameter within a command can be exploited by an unauthenticated remote attacker to inject arbitrary operating system commands. mySCADA myPRO is a professional HMI/SCADA system designed primarily for visualization and control of industrial processes
VAR-202411-1373 | CVE-2024-50054 | mySCADA myPRO Manager Directory Traversal Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: High |
The back-end does not sufficiently verify the user-controlled filename parameter which makes it possible for an attacker to perform a path traversal attack and retrieve arbitrary files from the file system. mySCADA myPRO is a professional HMI/SCADA system designed primarily for visualization and control of industrial processes.
mySCADA myPRO Manager has a directory traversal vulnerability that an attacker can exploit to submit special requests to view system file contents in the context of the application and obtain sensitive information
VAR-202411-1369 | CVE-2024-47407 | mySCADA myPRO Manager OS Command Injection Vulnerability |
CVSS V2: 10.0 CVSS V3: 10.0 Severity: Critical |
A parameter within a command does not properly validate input within myPRO Manager which could be exploited by an unauthenticated remote attacker to inject arbitrary operating system commands. mySCADA myPRO is a professional HMI/SCADA system designed primarily for visualization and control of industrial processes