VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202410-1795 CVE-2024-48634 D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerability (CNVD-2024-41697) CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the key parameter in the SetWLanRadioSecurity function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1794 CVE-2024-48633 D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerability (CNVD-2024-41699) CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain multiple command injection vulnerabilities via the ExternalPort, InternalPort, ProtocolNumber, and LocalIPAddress parameters in the SetVirtualServerSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1687 CVE-2024-48632 D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerability (CNVD-2024-41698) CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain multiple command injection vulnerabilities via the LocalIPAddress, TCPPorts, and UDPPorts parameters in the SetPortForwardingSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1718 CVE-2024-48631 D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerability (CNVD-2024-41700) CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the SSID parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1717 CVE-2024-48630 D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerability (CNVD-2024-41701) CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the MacAddress parameter in the SetMACFilters2 function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1735 CVE-2024-48629 D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerabilities CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the IPAddress parameter in the SetGuestZoneRouterSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1445 CVE-2024-49399 Elvaco M-Bus Metering Gateway CMe3100 Access Control Error Vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: High
The affected product is vulnerable to an attacker being able to use commands without providing a password which may allow an attacker to leak information. Elvaco M-Bus Metering Gateway CMe3100 is an M-Bus metering gateway for fixed networks from Elvaco. There is an access control error vulnerability in the 1.12.1 version of Elvaco M-Bus Metering Gateway CMe3100
VAR-202410-1442 CVE-2024-49398 Elvaco M-Bus Metering Gateway CMe3100 File Upload Vulnerability CVSS V2: 9.4
CVSS V3: -
Severity: High
The affected product is vulnerable to unrestricted file uploads, which may allow an attacker to remotely execute code. Elvaco M-Bus Metering Gateway CMe3100 is an M-Bus metering gateway for fixed networks from Elvaco
VAR-202410-1444 CVE-2024-49397 Elvaco M-Bus Metering Gateway CMe3100 Cross-Site Scripting Vulnerability CVSS V2: 7.6
CVSS V3: -
Severity: Critical
The affected product is vulnerable to a cross-site scripting attack which may allow an attacker to bypass authentication and takeover admin accounts. Elvaco M-Bus Metering Gateway CMe3100 is an M-Bus metering gateway for fixed networks from Elvaco
VAR-202410-1443 CVE-2024-49396 Elvaco M-Bus Metering Gateway CMe3100 has an unspecified vulnerability CVSS V2: 9.4
CVSS V3: -
Severity: High
The affected product is vulnerable due to insufficiently protected credentials, which may allow an attacker to impersonate Elvaco and send false information. Elvaco M-Bus Metering Gateway CMe3100 is an M-Bus metering gateway for fixed networks from Elvaco. There is a security vulnerability in the 1.12.1 version of Elvaco M-Bus Metering Gateway CMe3100. The vulnerability is caused by insufficient credential protection
VAR-202410-3371 CVE-2024-48192 Tenda G3 Hard-coded Credentials Vulnerability CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
Tenda G3 v15.01.0.5(2848_755)_EN was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root. Tenda G3 is a QosVpn router from China's Tenda company
VAR-202410-3650 No CVE Mitsubishi Electric Mitsubishi PLC FX5UJ has a buffer overflow vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Mitsubishi PLC FX5UJ is a micro programmable controller. Mitsubishi Electric Mitsubishi PLC FX5UJ has a buffer overflow vulnerability. Attackers can exploit this vulnerability to modify the length field of the transmission control program data packet, causing the workstation to be unable to read the control program content.
VAR-202410-3656 No CVE D-LINK DAR-7000-20 Internet Behavior Audit Gateway of D-Link Electronic Equipment (Shanghai) Co., Ltd. has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
The D-LINK DAR-7000-20 Internet Behavior Audit Gateway is a network behavior management and audit device for enterprise network environments. The D-LINK DAR-7000-20 Internet Behavior Audit Gateway of D-Link Electronics (Shanghai) Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to obtain server permissions.
VAR-202410-3364 CVE-2024-48714 TP-LINK TL-WDR7660 Buffer Overflow Vulnerability CVSS V2: 6.1
CVSS V3: 6.5
Severity: MEDIUM
In TP-Link TL-WDR7660 v1.0, the guestRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities. TP-LINK TL-WDR7660 is a Gigabit router from TP-LINK of China. TP-LINK TL-WDR7660 version 1.0 has a buffer overflow vulnerability. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202410-3229 CVE-2024-48712 TP-LINK TL-WDR7660 rtRuleJsonTobin function buffer overflow vulnerability CVSS V2: 6.1
CVSS V3: 6.5
Severity: MEDIUM
In TP-Link TL-WDR7660 1.0, the rtRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities. TP-LINK TL-WDR7660 is a Gigabit router from TP-LINK of China. TP-LINK TL-WDR7660 version 1.0 has a buffer overflow vulnerability. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202410-0405 CVE-2024-45273 MB CONNECT LINE  of  mbnet.mini  Vulnerabilities related to cryptographic strength in products from multiple vendors such as firmware CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used. MB CONNECT LINE of mbnet.mini Products from multiple vendors, such as firmware, have vulnerabilities related to encryption strength.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202410-0404 CVE-2024-45272 helmholz  of  myrex24 v2 virtual server  Vulnerabilities in products from multiple vendors such as CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost. helmholz of myrex24 v2 virtual server Unspecified vulnerabilities exist in products from multiple vendors.Service operation interruption (DoS) It may be in a state
VAR-202410-1349 CVE-2024-35520 of netgear  R7000  Command injection vulnerability in firmware CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
Netgear R7000 1.0.11.136 is vulnerable to Command Injection in RMT_invite.cgi via device_name2 parameter. of netgear R7000 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR R7000 is a wireless router from NETGEAR. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202410-1222 CVE-2024-35519 Command injection vulnerability in multiple Netgear products CVSS V2: -
CVSS V3: 6.8
Severity: MEDIUM
Netgear EX6120 v1.0.0.68, Netgear EX6100 v1.0.2.28, and Netgear EX3700 v1.0.0.96 are vulnerable to command injection in operating_mode.cgi via the ap_mode parameter. of netgear EX3700 firmware, EX6100 firmware, EX6120 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202410-1113 CVE-2024-35518 of netgear  EX6120  Command injection vulnerability in firmware CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
Netgear EX6120 v1.0.0.68 is vulnerable to Command Injection in genie_fix2.cgi via the wan_dns1_pri parameter. of netgear EX6120 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR EX6120 is a wireless extender from NETGEAR. Attackers can exploit this vulnerability to cause arbitrary command execution