VARIoT IoT vulnerabilities database
VAR-202410-0099 | CVE-2024-45465 | Siemens' Tecnomatix Plant Simulation Out-of-bounds read vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens' Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202410-0111 | CVE-2024-45464 | Siemens' Tecnomatix Plant Simulation Out-of-bounds read vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens' Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202410-0108 | CVE-2024-45463 | Siemens' Tecnomatix Plant Simulation Out-of-bounds read vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens' Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202410-0128 | CVE-2024-41798 | Siemens SENTRON PAC Meter Authentication Error Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: Critical |
A vulnerability has been identified in SENTRON 7KM PAC3200 (All versions). Affected devices only provide a 4-digit PIN to protect from administrative access via Modbus TCP interface. Attackers with access to the Modbus TCP interface could easily bypass this protection by brute-force attacks or by sniffing the Modbus clear text communication. SENTRON PAC Meter is a power measurement device for precise energy management and transparent information collection
VAR-202410-1481 | CVE-2024-46325 | TP-LINK TL-WR740N Buffer Overflow Vulnerability |
CVSS V2: 5.2 CVSS V3: 5.5 Severity: MEDIUM |
TP-Link WR740N V6 has a stack overflow vulnerability via the ssid parameter in /userRpm/popupSiteSurveyRpm.htm url. TP-LINK TL-WR740N is a wireless router from TP-LINK of China. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202410-0063 | CVE-2024-9565 | D-Link Systems, Inc. of DIR-605L Classic buffer overflow vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been found in D-Link DIR-605L 2.13B01 BETA and classified as critical. Affected by this vulnerability is the function formSetPassword of the file /goform/formSetPassword. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-605L Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-605L is a wireless router from D-Link of China. The vulnerability is caused by the curTime parameter of the formSetPassword function in the /goform/formSetPassword page failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202410-0055 | CVE-2024-9552 | D-Link Systems, Inc. of DIR-605L Classic buffer overflow vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been rated as critical. Affected by this issue is the function formSetWanNonLogin of the file /goform/formSetWanNonLogin. The manipulation of the argument webpage leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-605L Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-605L is a wireless router from D-Link of China. The vulnerability is caused by the webpage parameter of the formSetWanNonLogin function in the /goform/formSetWanNonLogin page failing to properly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202410-0066 | CVE-2024-9551 | D-Link Systems, Inc. of DIR-605L Classic buffer overflow vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been declared as critical. Affected by this vulnerability is the function formSetWanL2TP of the file /goform/formSetWanL2TP. The manipulation of the argument webpage leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-605L Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-605L is a wireless router from D-Link of China. The vulnerability is caused by the webpage parameter of the formSetWanL2TP function in the /goform/formSetWanL2TP page failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202410-2970 | No CVE | Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR800G has a command execution vulnerability (CNVD-2024-40101) |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
NBR800G is an enterprise-class router.
Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR800G has a command execution vulnerability, and attackers can exploit the vulnerability to obtain server permissions.
VAR-202410-1018 | No CVE | Ruisikangda Technology Development Co., Ltd. MSG5200-2GEC-4E-X4 and MSG2100E-UPON-4V have file upload vulnerabilities |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Ruisikangda Technology Development Co., Ltd. is an industry-leading provider of optical network products and system solutions.
Ruisikangda Technology Development Co., Ltd.'s MSG5200-2GEC-4E-X4 and MSG2100E-UPON-4V have a file upload vulnerability that an attacker can exploit to gain server permissions.
VAR-202410-0033 | CVE-2024-9532 | D-Link Systems, Inc. of DIR-605L Classic buffer overflow vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been found in D-Link DIR-605L 2.13B01 BETA and classified as critical. This vulnerability affects the function formAdvanceSetup of the file /goform/formAdvanceSetup. The manipulation of the argument webpage leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-605L Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-605L is a wireless router from D-Link of China.
D-Link DIR-605L 2.13B01 has a buffer overflow vulnerability. The vulnerability is caused by the webpage parameter of the formAdvanceSetup function in the /goform/formAdvanceSetup page failing to properly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202410-2512 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. AC10 has a binary vulnerability (CNVD-2024-41108) |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
AC10 is an 11ac dual-band router designed for 200M and above fiber homes.
Shenzhen Jixiang Tengda Technology Co., Ltd. AC10 has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202410-0022 | CVE-2024-43699 | Delta Electronics, INC. of DIAEnergie In SQL Injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Delta Electronics DIAEnergie is vulnerable to an SQL injection in the script AM_RegReport.aspx. An unauthenticated attacker may be able to exploit this issue to obtain records contained in the targeted product. Delta Electronics, INC. of DIAEnergie for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state.
Delta Electronics DIAEnergie AM_RegReport.aspx has a SQL injection vulnerability, which can be exploited by attackers to view, add, modify or delete information in the backend database
VAR-202410-0021 | CVE-2024-42417 | Delta Electronics, INC. of DIAEnergie In SQL Injection vulnerability |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: HIGH |
Delta Electronics DIAEnergie is vulnerable to an SQL injection in the script Handler_CFG.ashx. An authenticated attacker may be able to exploit this issue to cause delay in the targeted product. Delta Electronics, INC. of DIAEnergie for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state.
Delta Electronics DIAEnergie Handler_CFG.ashx has a SQL injection vulnerability, which can be exploited by attackers to view, add, modify or delete information in the backend database
VAR-202410-0179 | CVE-2024-41594 | plural DrayTek Corporation Vulnerability related to encryption strength in products |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation The product contains a cryptographic strength vulnerability.Information may be obtained
VAR-202410-0281 | CVE-2024-41593 | plural DrayTek Corporation Out-of-bounds write vulnerabilities in the product |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow. vigor3912 firmware, vigor2962 firmware, vigor3910 firmware etc. DrayTek Corporation The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202410-0186 | CVE-2024-41591 | plural DrayTek Corporation Cross-site scripting vulnerability in the product |
CVSS V2: - CVSS V3: 6.1 Severity: MEDIUM |
DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with
VAR-202410-0075 | CVE-2024-41587 | DrayTek Corporation of vigor3910 Cross-site scripting vulnerability in firmware |
CVSS V2: - CVSS V3: 5.4 Severity: MEDIUM |
Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6. DrayTek Corporation of vigor3910 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
VAR-202410-0195 | CVE-2024-20524 | Out-of-bounds write vulnerability in multiple Cisco Systems products |
CVSS V2: - CVSS V3: 6.8 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. RV042 Dual WAN VPN firmware, RV042G Dual Gigabit WAN VPN firmware, Cisco RV320 Dual Gigabit WAN VPN Multiple Cisco Systems products, including router firmware, contain an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202410-0215 | CVE-2024-20523 | Out-of-bounds write vulnerability in multiple Cisco Systems products |
CVSS V2: - CVSS V3: 6.8 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. RV042 Dual WAN VPN firmware, RV042G Dual Gigabit WAN VPN firmware, Cisco RV320 Dual Gigabit WAN VPN Multiple Cisco Systems products, including router firmware, contain an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state