VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202405-3469 CVE-2024-35340 Tenda FH1206 Command Execution Vulnerability CVSS V2: 9.0
CVSS V3: 8.6
Severity: HIGH
Tenda FH1206 V1.2.0.8(8155) was discovered to contain a command injection vulnerability via the cmdinput parameter at ip/goform/formexeCommand. Tenda FH1206 is a wireless router from China's Tenda company. The vulnerability is caused by the cmdinput parameter of ip/goform/formexeCommand failing to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to execute arbitrary commands on the system
VAR-202405-0209 CVE-2024-5295 (0Day) D-Link G416 flupl self Command Injection Remote Code Execution Vulnerability CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
D-Link G416 flupl self Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 wireless routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21294. D-Link G416 is a wireless router from D-Link, a Chinese company. D-Link G416 has a code execution vulnerability, which is caused by the application failing to properly filter special elements in the constructed code segment
VAR-202405-0224 CVE-2024-5294 (0Day) D-Link DIR-3040 prog.cgi websSecurityHandler Memory Leak Denial-of-Service Vulnerability CVSS V2: 3.3
CVSS V3: 4.3
Severity: MEDIUM
D-Link DIR-3040 prog.cgi websSecurityHandler Memory Leak Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of D-Link DIR-3040 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the prog.cgi program, which handles HNAP requests made to the lighttpd webserver listening on ports 80 and 443. The issue results from the lack of proper memory management when processing HTTP cookie values. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-21668. D-Link DIR-3040 is a router of D-Link, a Chinese company. It provides the function of connecting to the network. The vulnerability is caused by not releasing or failing to release dynamically allocated heap memory
VAR-202405-0217 CVE-2024-5293 (0Day) D-Link DIR-2640 HTTP Referer Stack-Based Buffer Overflow Remote Code Execution Vulnerability CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
D-Link DIR-2640 HTTP Referer Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2640-US routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within prog.cgi, which handles HNAP requests made to the lighttpd webserver listening on TCP ports 80 and 443. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21853. D-Link DIR-2640 is a high-power Wi-Fi router from D-Link, a Chinese company. D-Link DIR-2640 has a buffer overflow vulnerability. The vulnerability is caused by the program failing to properly verify the length of the input data
VAR-202405-0178 CVE-2024-5291 (0Day) D-Link DIR-2150 GetDeviceSettings Target Command Injection Remote Code Execution Vulnerability CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
D-Link DIR-2150 GetDeviceSettings Target Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21235. D-Link DIR-2150 is a wireless router from D-Link, a Chinese company. D-Link DIR-2150 has a code execution vulnerability, which is caused by the application failing to properly filter special elements in the constructed code segment
VAR-202405-3772 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. EG2000CE has a command execution vulnerability (CNVD-2024-22811) CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
EG2000CE is an intelligent router. EG2000CE of Beijing Xingwang Ruijie Network Technology Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to obtain server permissions.
VAR-202405-2040 No CVE H3C ER5100G2 system management has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
ER5100G2 is a new generation enterprise-class Gigabit wired router. H3C ER5100G2 system management has a command execution vulnerability, which can be exploited by attackers to obtain server permissions.
VAR-202405-2251 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. EG3210 has a command execution vulnerability (CNVD-2024-23199) CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
EG3210 is a multi-service security gateway. Beijing Xingwang Ruijie Network Technology Co., Ltd. EG3210 has a command execution vulnerability, which can be exploited by attackers to gain control of the server.
VAR-202405-3031 No CVE Shenzhen Tongwei Digital Technology Co., Ltd. InVid Tech has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shenzhen Tongwei Digital Technology Co., Ltd. is an international provider of video security products and system solutions integrating R&D, production, sales and services. Shenzhen Tongwei Digital Technology Co., Ltd. InVid Tech has a weak password vulnerability, which attackers use to log in to the system backend and obtain sensitive information.
VAR-202405-3505 CVE-2024-22429 CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to arbitrary code execution.
VAR-202405-2830 No CVE Beijing Asia Control Technology Development Co., Ltd. Asia Control Giant SCADA Monitoring Platform has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Yakong Giant SCADA Monitoring Platform is a high-end industrial automation full-configuration monitoring software suitable for "all-trusted" industrial control systems. It supports the joint use of all mainstream trusted CPUs, operating systems, PLC devices, and databases. The Yakong Giant SCADA Monitoring Platform of Beijing Yakong Technology Development Co., Ltd. has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202405-3782 CVE-2024-4609 Rockwell Automation FactoryTalk View SE SQL Injection Vulnerability CVSS V2: 8.0
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability exists in the Rockwell Automation FactoryTalk® View SE Datalog function that could allow a threat actor to inject a malicious SQL statement if the SQL database has no authentication in place or if legitimate credentials were stolen. If exploited, the attack could result in information exposure, revealing sensitive information. Additionally, a threat actor could potentially modify and delete the data in a remote database. An attack would only affect the HMI design time, not runtime. Rockwell Automation FactoryTalk View SE is an industrial automation system view interface from Rockwell Automation of the United States
VAR-202405-0252 CVE-2024-4960 D-Link DAR-7000-40 Command Execution Vulnerability CVSS V2: 6.5
CVSS V3: 6.3
Severity: Medium
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in D-Link DAR-7000-40 V31R02B1413C. Affected is an unknown function of the file interface/sysmanage/licenseauthorization.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264528. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. D-Link DAR-7000-40 is an Internet behavior audit gateway of D-Link, a Chinese company. D-Link DAR-7000-40 has a command execution vulnerability, which is caused by the incorrect verification of the file extension by the interface/sysmanage/license authorization.php script. Attackers can use this vulnerability to upload malicious PHP scripts and execute arbitrary PHP code on the system
VAR-202405-0440 No CVE Schneider Electric (China) Co., Ltd. Quantum 140CPU65150PL has a denial of service vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Quantum 140CPU65150PL is a Unity processor in the Schneider Electric series. It combines the standard functions of a PLC with the diagnostic functions of a network server and uses an RJ-45 connection for communication. Schneider Electric (China) Co., Ltd. Quantum 140CPU65150PL has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202405-1356 No CVE Ruijie Networks Co., Ltd. EG3210 has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
EG3210 is a new generation of multi-service security gateway in the RG-EG3200 series. It is a comprehensive gateway device designed for small and medium-sized network egress. Ruijie Networks Co., Ltd. EG3210 has a command execution vulnerability, which can be exploited by attackers to execute commands.
VAR-202405-0649 No CVE Beijing Yakong Technology Development Co., Ltd. KingPortal development system has an information leakage vulnerability (CNVD-2024-16583) CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Beijing Yakong Technology Development Co., Ltd. is a high-tech enterprise of industrial automation and information software platform established in 1997. Beijing Yakong Technology Development Co., Ltd. KingPortal development system has information leakage vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202405-0708 CVE-2024-31491 fortinet's  FortiSandbox  Vulnerability in CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
A client-side enforcement of server-side security in Fortinet FortiSandbox version 4.4.0 through 4.4.4 and 4.2.0 through 4.2.6 allows attacker to execute unauthorized code or commands via HTTP requests. fortinet's FortiSandbox Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202405-0539 CVE-2023-40720 fortinet's  FortiVoice  Vulnerability in user-controlled key authentication evasion in CVSS V2: -
CVSS V3: 7.1
Severity: HIGH
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests. fortinet's FortiVoice Exists in a user-controlled key authentication evasion vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
VAR-202405-0161 CVE-2024-33583 Siemens SIMATIC RTLS Locating Manager Hidden Function Vulnerability CVSS V2: 2.1
CVSS V3: 3.3
Severity: LOW
A vulnerability has been identified in SIMATIC RTLS Locating Manager (6GT2780-0DA00) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA30) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA30) (All versions < V3.0.1.1). Affected application contains a hidden configuration item to enable debug functionality. This could allow an authenticated local attacker to gain insight into the internal configuration of the deployment. SIMATIC RTLS Locating Manager is used to configure, operate, and maintain SIMATIC RTLS devices, which is a real-time wireless location system that provides location solutions
VAR-202405-0216 CVE-2024-33577 Siemens Simcenter Nastran Stack Buffer Overflow Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: High
A vulnerability has been identified in Simcenter Femap (All versions < V2406). The affected applications contain a stack overflow vulnerability while parsing specially strings as argument for one of the application binaries. This could allow an attacker to execute code in the context of the current process. Simcenter Nastran is a finite element method solver. Siemens Simcenter Nastran has a stack buffer overflow vulnerability