VARIoT IoT vulnerabilities database
VAR-202410-1795 | CVE-2024-48634 | D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerability (CNVD-2024-41697) |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the key parameter in the SetWLanRadioSecurity function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1794 | CVE-2024-48633 | D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerability (CNVD-2024-41699) |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain multiple command injection vulnerabilities via the ExternalPort, InternalPort, ProtocolNumber, and LocalIPAddress parameters in the SetVirtualServerSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1687 | CVE-2024-48632 | D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerability (CNVD-2024-41698) |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain multiple command injection vulnerabilities via the LocalIPAddress, TCPPorts, and UDPPorts parameters in the SetPortForwardingSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1718 | CVE-2024-48631 | D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerability (CNVD-2024-41700) |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the SSID parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1717 | CVE-2024-48630 | D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerability (CNVD-2024-41701) |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the MacAddress parameter in the SetMACFilters2 function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1735 | CVE-2024-48629 | D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerabilities |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the IPAddress parameter in the SetGuestZoneRouterSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1445 | CVE-2024-49399 | Elvaco M-Bus Metering Gateway CMe3100 Access Control Error Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: High |
The affected product is vulnerable to an attacker being able to use commands without providing a password which may allow an attacker to leak information. Elvaco M-Bus Metering Gateway CMe3100 is an M-Bus metering gateway for fixed networks from Elvaco.
There is an access control error vulnerability in the 1.12.1 version of Elvaco M-Bus Metering Gateway CMe3100
VAR-202410-1442 | CVE-2024-49398 | Elvaco M-Bus Metering Gateway CMe3100 File Upload Vulnerability |
CVSS V2: 9.4 CVSS V3: - Severity: High |
The affected product is vulnerable to unrestricted file uploads, which may allow an attacker to remotely execute code. Elvaco M-Bus Metering Gateway CMe3100 is an M-Bus metering gateway for fixed networks from Elvaco
VAR-202410-1444 | CVE-2024-49397 | Elvaco M-Bus Metering Gateway CMe3100 Cross-Site Scripting Vulnerability |
CVSS V2: 7.6 CVSS V3: - Severity: Critical |
The affected product is vulnerable to a cross-site scripting attack which may allow an attacker to bypass authentication and takeover admin accounts. Elvaco M-Bus Metering Gateway CMe3100 is an M-Bus metering gateway for fixed networks from Elvaco
VAR-202410-1443 | CVE-2024-49396 | Elvaco M-Bus Metering Gateway CMe3100 has an unspecified vulnerability |
CVSS V2: 9.4 CVSS V3: - Severity: High |
The affected product is vulnerable due to insufficiently protected credentials, which may allow an attacker to impersonate Elvaco and send false information. Elvaco M-Bus Metering Gateway CMe3100 is an M-Bus metering gateway for fixed networks from Elvaco.
There is a security vulnerability in the 1.12.1 version of Elvaco M-Bus Metering Gateway CMe3100. The vulnerability is caused by insufficient credential protection
VAR-202410-3371 | CVE-2024-48192 | Tenda G3 Hard-coded Credentials Vulnerability |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
Tenda G3 v15.01.0.5(2848_755)_EN was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root. Tenda G3 is a QosVpn router from China's Tenda company
VAR-202410-3650 | No CVE | Mitsubishi Electric Mitsubishi PLC FX5UJ has a buffer overflow vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Mitsubishi PLC FX5UJ is a micro programmable controller.
Mitsubishi Electric Mitsubishi PLC FX5UJ has a buffer overflow vulnerability. Attackers can exploit this vulnerability to modify the length field of the transmission control program data packet, causing the workstation to be unable to read the control program content.
VAR-202410-3656 | No CVE | D-LINK DAR-7000-20 Internet Behavior Audit Gateway of D-Link Electronic Equipment (Shanghai) Co., Ltd. has a command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The D-LINK DAR-7000-20 Internet Behavior Audit Gateway is a network behavior management and audit device for enterprise network environments.
The D-LINK DAR-7000-20 Internet Behavior Audit Gateway of D-Link Electronics (Shanghai) Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to obtain server permissions.
VAR-202410-3364 | CVE-2024-48714 | TP-LINK TL-WDR7660 Buffer Overflow Vulnerability |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
In TP-Link TL-WDR7660 v1.0, the guestRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities. TP-LINK TL-WDR7660 is a Gigabit router from TP-LINK of China.
TP-LINK TL-WDR7660 version 1.0 has a buffer overflow vulnerability. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202410-3229 | CVE-2024-48712 | TP-LINK TL-WDR7660 rtRuleJsonTobin function buffer overflow vulnerability |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
In TP-Link TL-WDR7660 1.0, the rtRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities. TP-LINK TL-WDR7660 is a Gigabit router from TP-LINK of China.
TP-LINK TL-WDR7660 version 1.0 has a buffer overflow vulnerability. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202410-0405 | CVE-2024-45273 | MB CONNECT LINE of mbnet.mini Vulnerabilities related to cryptographic strength in products from multiple vendors such as firmware |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used. MB CONNECT LINE of mbnet.mini Products from multiple vendors, such as firmware, have vulnerabilities related to encryption strength.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202410-0404 | CVE-2024-45272 | helmholz of myrex24 v2 virtual server Vulnerabilities in products from multiple vendors such as |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost. helmholz of myrex24 v2 virtual server Unspecified vulnerabilities exist in products from multiple vendors.Service operation interruption (DoS) It may be in a state
VAR-202410-1349 | CVE-2024-35520 | of netgear R7000 Command injection vulnerability in firmware |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
Netgear R7000 1.0.11.136 is vulnerable to Command Injection in RMT_invite.cgi via device_name2 parameter. of netgear R7000 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR R7000 is a wireless router from NETGEAR. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202410-1222 | CVE-2024-35519 | Command injection vulnerability in multiple Netgear products |
CVSS V2: - CVSS V3: 6.8 Severity: MEDIUM |
Netgear EX6120 v1.0.0.68, Netgear EX6100 v1.0.2.28, and Netgear EX3700 v1.0.0.96 are vulnerable to command injection in operating_mode.cgi via the ap_mode parameter. of netgear EX3700 firmware, EX6100 firmware, EX6120 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202410-1113 | CVE-2024-35518 | of netgear EX6120 Command injection vulnerability in firmware |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
Netgear EX6120 v1.0.0.68 is vulnerable to Command Injection in genie_fix2.cgi via the wan_dns1_pri parameter. of netgear EX6120 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR EX6120 is a wireless extender from NETGEAR. Attackers can exploit this vulnerability to cause arbitrary command execution