VARIoT IoT vulnerabilities database
VAR-202409-0681 | CVE-2024-46424 | TOTOLINK of T8 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the UploadCustomModule function, which allows attackers to cause a Denial of Service (DoS) via the File parameter. TOTOLINK AC1200 is a dual-band Wi-Fi router from China's TOTOLINK Electronics.
There is a buffer overflow vulnerability in the UploadCustomModule function of TOTOLINK AC1200. The vulnerability is caused by the File parameter of the UploadCustomModule function failing to correctly verify the length of the input data
VAR-202409-1026 | CVE-2024-45698 | D-Link Systems, Inc. of dir-x4860 Vulnerability related to use of hardcoded credentials in firmware |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on the device. D-Link Systems, Inc. of dir-x4860 A vulnerability exists in the firmware regarding the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202409-1099 | CVE-2024-45697 | D-Link Systems, Inc. of dir-x4860 Vulnerabilities related to private functions in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Certain models of D-Link wireless routers have a hidden functionality where the telnet service is enabled when the WAN port is plugged in. Unauthorized remote attackers can log in and execute OS commands using hard-coded credentials. D-Link Systems, Inc. of dir-x4860 The firmware contains a vulnerability related to an undisclosed function.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. DIR-X4860 is a wireless router of D-Link, a Chinese company.
D-Link Electronics (Shanghai) Co., Ltd
VAR-202409-2267 | No CVE | Siemens SIMATIC S7-200 SMART has a Denial of Service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Siemens SIMATIC S7-200 SMART is a programmable logic controller (PLC) used in small and medium-sized automation systems of Siemens, Germany.
Siemens SIMATIC S7-200 SMART has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202409-1200 | CVE-2024-46049 | Shenzhen Tenda Technology Co.,Ltd. of o6 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda O6 V3.0 firmware V1.0.0.7(2054) contains a stack overflow vulnerability in the formexeCommand function. Shenzhen Tenda Technology Co.,Ltd. of o6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda O6 is a wireless bridge from China's Tenda company. No detailed vulnerability details are currently available
VAR-202409-0787 | CVE-2024-46048 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Command injection vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 9.8 Severity: CRITICAL |
Tenda FH451 v1.0.0.9 has a command injection vulnerability in the formexeCommand function i. Shenzhen Tenda Technology Co.,Ltd. of fh451 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202409-0809 | CVE-2024-46047 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Out-of-bounds write vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 7.5 Severity: HIGH |
Tenda FH451 v1.0.0.9 has a stack overflow vulnerability in the fromDhcpListClient function. Shenzhen Tenda Technology Co.,Ltd. of fh451 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state
VAR-202409-0810 | CVE-2024-46046 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Out-of-bounds write vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 9.8 Severity: CRITICAL |
Tenda FH451 v1.0.0.9 has a stack overflow vulnerability located in the RouteStatic function. Shenzhen Tenda Technology Co.,Ltd. of fh451 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state.
Tenda FH451 has a buffer overflow vulnerability, which can be exploited by attackers to overflow the buffer and execute arbitrary code on the system or cause the application to crash
VAR-202409-1127 | CVE-2024-46045 | Shenzhen Tenda Technology Co.,Ltd. of ch22 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda CH22 V1.0.0.6(468) has a stack overflow vulnerability located in the frmL7PlotForm function. Shenzhen Tenda Technology Co.,Ltd. of ch22 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. No detailed vulnerability details are currently provided
VAR-202409-1009 | CVE-2024-46044 | Shenzhen Tenda Technology Co.,Ltd. of ch22 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
CH22 V1.0.0.6(468) has a stack overflow vulnerability located in the fromqossetting function. Shenzhen Tenda Technology Co.,Ltd. of ch22 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. No detailed vulnerability details are provided at present
VAR-202409-0396 | CVE-2024-34057 | Triangle MicroWorks of iec 61850 source code library Classic buffer overflow vulnerabilities in products from multiple vendors |
CVSS V2: 8.5 CVSS V3: 7.5 Severity: HIGH |
Triangle Microworks TMW IEC 61850 Client source code libraries before 12.2.0 lack a buffer size check when processing received messages. The resulting buffer overflow can cause a crash, resulting in a denial of service. Triangle MicroWorks of iec 61850 source code library Classic buffer overflow vulnerabilities exist in products from multiple vendors.Service operation interruption (DoS) It may be in a state. SICAM 8 Power automation platform is a universal, hardware- and software-based, all-in-one solution for all applications in the field of power supply. SICAM A8000 RTUs (Remote Terminal Units) are modular devices for remote control and automation applications in all areas of energy supply. SICAM EGS (Enhanced Grid Sensor) is a gateway for local substations in distribution networks. SICAM SCC is a process and visualization system for energy automation solutions. SITIPE AT (Automated Testing) is a computer-aided test system for integrating and simplifying functional test procedures for substation automation, remote control and protection panels manufactured by Siemens.
A buffer overflow vulnerability exists in third-party components of Siemens SICAM and SITIPE products. An attacker can exploit this vulnerability to create a denial of service condition by sending a specially crafted MMS message
VAR-202409-2266 | No CVE | Zhejiang Uniview Technology Co., Ltd. NVR301-08-P8 has an information leakage vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
NVR301-08-P8 is an NVR recorder device produced by Zhejiang Uniview Technology Co., Ltd.
Zhejiang Uniview Technology Co., Ltd. NVR301-08-P8 has an information leakage vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202409-0797 | CVE-2024-7961 | Rockwell Automation of Pavilion8 Past traversal vulnerability in |
CVSS V2: 9.0 CVSS V3: 9.8 Severity: CRITICAL |
A path traversal vulnerability exists in the Rockwell Automation affected product. If exploited, the threat actor could upload arbitrary files to the server that could result in a remote code execution. (DoS) It may be in a state. Rockwell Automation Pavilion8 is a model prediction console of Rockwell Automation in the United States. The vulnerability is caused by the program failing to properly filter special elements in resource or file paths
VAR-202409-0743 | CVE-2024-7960 | Rockwell Automation of Pavilion8 Vulnerability in |
CVSS V2: 8.0 CVSS V3: 9.1 Severity: CRITICAL |
The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view sensitive information and change settings. The vulnerability exists due to having an incorrect privilege matrix that allows users to have access to functions they should not. Rockwell Automation of Pavilion8 Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with. Rockwell Automation Pavilion8 is a model prediction console of Rockwell Automation, an American company
VAR-202409-1723 | CVE-2024-45826 | Rockwell Automation of thinmanager Vulnerability in externally controllable references to resources in another region of |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
CVE-2024-45826 IMPACT
Due to improper input validation, a path traversal and remote code execution vulnerability exists when the ThinManager® processes a crafted POST request. If exploited, a user can install an executable file. Rockwell Automation of thinmanager Exists in a vulnerability in externally controllable references to resources in another region.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation ThinManager is a thin client management software from Rockwell Automation, an American company. It allows thin clients to be assigned to multiple remote desktop servers at the same time
VAR-202409-1722 | CVE-2024-45825 | Rockwell Automation of 5015-u8ihft Firmware vulnerabilities |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
CVE-2024-45825 IMPACT
A denial-of-service vulnerability exists in the affected products. The vulnerability occurs when a malformed CIP packet is sent over the network to the device and results in a major nonrecoverable fault causing a denial-of-service. Rockwell Automation of 5015-u8ihft There are unspecified vulnerabilities in the firmware.Service operation interruption (DoS) It may be in a state. Rockwell Automation 5015-U8IHFT is a universal module of Rockwell Automation, USA.
Rockwell Automation 5015-U8IHFT has a denial of service vulnerability, which can be exploited by attackers to cause denial of service by sending specially crafted data packets to CIP security objects
VAR-202409-2108 | CVE-2024-45824 | Rockwell Automation FactoryTalk View Site Edition Remote Code Execution Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: Critical |
CVE-2024-45824 IMPACT
A remote
code vulnerability exists in the affected products. The vulnerability occurs
when chained with Path Traversal, Command Injection, and XSS Vulnerabilities
and allows for full unauthenticated remote code execution. The link in the
mitigations section below contains patches to fix this issue. Rockwell Automation FactoryTalk View Site Edition is an integrated software package of Rockwell Automation, Inc., USA. It is used for development and operation
VAR-202409-1266 | CVE-2023-36103 | Shenzhen Tenda Technology Co.,Ltd. of AC15 Command injection vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Command Injection vulnerability in goform/SetIPTVCfg interface of Tenda AC15 V15.03.05.20 allows remote attackers to run arbitrary commands via crafted POST request. Shenzhen Tenda Technology Co.,Ltd. of AC15 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202409-0961 | CVE-2024-36511 | fortinet's FortiADC Vulnerability in |
CVSS V2: 2.6 CVSS V3: 3.7 Severity: LOW |
An improperly implemented security check for standard vulnerability [CWE-358] in FortiADC Web Application Firewall (WAF) 7.4.0 through 7.4.4, 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions, 6.0 all versions when cookie security policy is enabled may allow an attacker, under specific conditions, to retrieve the initial encrypted and signed cookie protected by the feature. fortinet's FortiADC Exists in unspecified vulnerabilities.Information may be obtained. Fortinet FortiADC is an application delivery controller of Fortinet.
Fortinet FortiADC has a security feature vulnerability, which is caused by improper implementation of security checks
VAR-202409-0983 | CVE-2024-31490 | fortinet's FortiSandbox Vulnerability in |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
An exposure of sensitive information to an unauthorized actor in Fortinet FortiSandbox version 4.4.0 through 4.4.4 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.2 through 3.2.4 and 3.1.5 allows attacker to information disclosure via HTTP get requests. fortinet's FortiSandbox Exists in unspecified vulnerabilities.Information may be obtained