VARIoT IoT vulnerabilities database
VAR-202501-0033 | CVE-2024-13103 | D-Link DIR-816 A2 /goform/form2AddVrtsrv.cgi Access Control Error Vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: Medium |
A vulnerability, which was classified as critical, has been found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. This issue affects some unknown processing of the file /goform/form2AddVrtsrv.cgi of the component Virtual Service Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link DIR-816 is a wireless router from D-Link of China. Attackers can use this vulnerability to set up virtual services on the device
VAR-202412-3017 | CVE-2023-7266 | plural Huawei Product vulnerabilities |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Some Huawei home routers have a connection hijacking vulnerability. Successful exploitation of this vulnerability may cause DoS or information leakage.(Vulnerability ID:HWPSIRT-2023-76605)
This vulnerability has been assigned a (CVE)ID:CVE-2023-7266. Huawei of TC7001-10 firmware, WS7200-10 firmware, WS7206-10 There are unspecified vulnerabilities in the firmware.Information is obtained and service operation is interrupted (DoS) It may be in a state
VAR-202412-3262 | CVE-2020-9253 | Huawei of Lion-AL00C Out-of-bounds write vulnerability in firmware |
CVSS V2: 7.5 CVSS V3: 6.3 Severity: MEDIUM |
There is a stack overflow vulnerability in some Huawei smart phone. An attacker can craft specific packet to exploit this vulnerability. Due to insufficient verification, this could be exploited to tamper with the information to affect the availability. (Vulnerability ID: HWPSIRT-2019-11030)
This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9253. Huawei of Lion-AL00C An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. Huawei Lion-AL00C is a smartphone from Huawei, a Chinese company
VAR-202412-2693 | CVE-2020-9210 | Huawei of Myna Vulnerability related to insufficient data integrity verification in firmware |
CVSS V2: - CVSS V3: 6.8 Severity: MEDIUM |
There is an insufficient integrity vulnerability in Huawei products. A module does not perform sufficient integrity check in a specific scenario. Attackers can exploit the vulnerability by physically install malware. This could compromise normal service of the affected device. (Vulnerability ID: HWPSIRT-2020-00145)
This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9210. Huawei of Myna Firmware contains a vulnerability related to insufficient data integrity validation.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202412-3294 | CVE-2024-54907 | TOTOLINK A3002R Remote Code Injection Vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK A3002R V4.0.0-B20230531.1404 is vulnerable to Remote Code Execution in /bin/boa via formWsc. TOTOLINK A3002R is a wireless dual-band Gigabit router. An attacker can exploit this vulnerability to remotely execute malicious code in the target
VAR-202412-2591 | CVE-2024-51471 | IBM MQ Appliance Buffer Overflow Vulnerability (CNVD-2025-0031176) |
CVSS V2: 4.9 CVSS V3: 5.3 Severity: MEDIUM |
IBM MQ Appliance 9.3 LTS, 9.3 CD, and 9.4 LTS web console could allow an authenticated user to cause a denial-of-service when trace is enabled due to information being written into memory outside of the intended buffer size. IBM MQ Appliance is an all-in-one device for rapid deployment of enterprise-level messaging middleware from International Business Machines (IBM).
IBM MQ Appliance 9.3 LTS, 9.3 CD, and 9.4 LTS versions have a buffer overflow vulnerability. The vulnerability is caused by the information being written into the memory exceeding the expected buffer size. Attackers can exploit this vulnerability to cause a denial of service attack
VAR-202412-2559 | CVE-2023-4617 | Vulnerability in Govee Home mobile application (Android & iOS) |
CVSS V2: - CVSS V3: 10.0 Severity: CRITICAL |
Incorrect authorization vulnerability in HTTP POST method in Govee Home application on Android and iOS allows remote attacker to control devices owned by other users via changing "device", "sku" and "type" fields' values.
This issue affects Govee Home applications on Android and iOS in versions before 5.9
VAR-202412-2770 | CVE-2024-12569 | Siemens Siveillance Video Camera Driver Information Disclosure Vulnerability |
CVSS V2: 5.6 CVSS V3: 7.8 Severity: Medium |
Disclosure
of sensitive information in a Milestone XProtect Device Pack driver’s log file for third-party cameras, allows an attacker to read camera
credentials stored in the Recording Server under specific conditions. Siveillance Video (formerly known as Siveillance VMS) is a powerful IP video management software designed for deployments ranging from small and simple to large and high security. The Siveillance Video portfolio includes four versions: Siveillance Video Core, Core Plus, Advanced and Pro, which can meet specific needs from small and medium solutions to large and complex deployments
VAR-202412-2528 | CVE-2024-12175 | Rockwell Automation of Arena Vulnerability in using free memory in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. (DoS) It may be in a state. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Rockwell Automation Arena Simulation is a set of simulation software from Rockwell Automation, an American company, that provides 3D animation and graphics functions
VAR-202412-2454 | CVE-2024-12371 | Rockwell Automation Power Monitor 1000 Device Takeover Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: Critical |
A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset.
Rockwell Automation Power Monitor 1000 versions prior to 4.020 have a security vulnerability that can be exploited by attackers to configure new policy holder users without any authentication through the API
VAR-202412-2453 | CVE-2023-34990 | Fortinet FortiWLM Path Traversal Vulnerability (CNVD-2024-4963848) |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests. Fortinet FortiWLM is a wireless manager of Fortinet, an American company.
Fortinet FortiWLM has a path traversal vulnerability, which is caused by the program failing to properly filter special elements in resource or file paths
VAR-202412-0615 | CVE-2024-37607 | D-Link DAP-2555 Denial of Service Vulnerability |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
A Buffer overflow vulnerability in D-Link DAP-2555 REVA_FIRMWARE_1.20 allows remote attackers to cause a Denial of Service (DoS) via a crafted HTTP request. D-Link DAP-2555 is a wireless access point of D-Link, a Chinese company.
D-Link DAP-2555 REVA_FIRMWARE_1.20 version has a denial of service vulnerability, which is caused by null pointer dereference
VAR-202412-0587 | CVE-2024-37606 | D-Link DCS-932L Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: 6.5 Severity: MEDIUM |
A Stack overflow vulnerability in D-Link DCS-932L REVB_FIRMWARE_2.18.01 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request. D-Link DCS-932L is a network surveillance camera from D-Link, a Chinese company. It is used for security and monitoring.
D-Link DCS-932L REVB_FIRMWARE_2.18.01 version has a denial of service vulnerability, which is caused by null pointer dereference
VAR-202412-0623 | CVE-2024-36832 | D-Link DAP-1513 Denial of Service Vulnerability |
CVSS V2: 7.6 CVSS V3: 7.5 Severity: HIGH |
A NULL pointer dereference in D-Link DAP-1513 REVA_FIRMWARE_1.01 allows attackers to cause a Denial of Service (DoS) via a crafted web request without authentication. The vulnerability occurs in the /bin/webs binary of the firmware. When /bin/webs receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference, leading to a denial of service attack to the device. D-Link DAP-1513 is a wireless bridge produced by D-Link of China. Attackers can exploit this vulnerability to cause a denial of service
VAR-202412-0630 | CVE-2024-36831 | D-Link DAP-1520 Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A NULL pointer dereference in the plugins_call_handle_uri_clean function of D-Link DAP-1520 REVA_FIRMWARE_1.10B04_BETA02_HOTFIX allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request without authentication. D-Link DAP-1520 is a wireless access point product of D-Link, a Chinese company. Attackers can exploit this vulnerability to cause a denial of service
VAR-202412-3099 | No CVE | Siemens Totally Integrated Automation Portal (TIA Portal) Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Totally Integrated Automation Portal (TIA Portal) is an integrated automation platform that provides a full range of digital automation services from digital planning to integrated engineering and transparent operation. TIA Portal is designed to shorten time to market, improve factory production efficiency, and increase system flexibility. It includes innovative simulation tools, seamlessly integrated engineering functions, and transparent operation management, and is particularly suitable for system integrators, machine manufacturers, and factory operators.
Siemens Totally Integrated Automation Portal (TIA Portal) has a buffer overflow vulnerability that can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-2941 | No CVE | Siemens Opcenter Intelligence Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Opcenter Intelligence is a manufacturing intelligence solution launched by Siemens, which aims to improve the efficiency and quality of the manufacturing process through big data analysis. The solution provides a variety of products and services to meet the needs of different users.
Siemens Opcenter Intelligence has a buffer overflow vulnerability, which can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-3098 | No CVE | Siemens SINEC NMS Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
SINEC NMS is a network management system (NMS) that can scale to handle network structures of all sizes in an increasingly digital world. The system can be used to centrally monitor, manage and configure industrial networks covering tens of thousands of devices around the clock, including safety-related areas.
A buffer overflow vulnerability exists in Siemens SINEC NMS that can be exploited by an unauthenticated remote attacker to execute arbitrary code.
VAR-202412-0834 | No CVE | Siemens SIMATIC PCS neo Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
SIMATIC PCS neo is a fully web-based process control system.
Siemens SIMATIC PCS neo has a buffer overflow vulnerability that can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-3346 | No CVE | Siemens Opcenter RDL Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
The Opcenter Research Development & Laboratory (RD&L) series of software products can simplify, optimize and adjust the formulation product development, improve the innovation efficiency of fast-moving consumer goods, and optimize the data management of fast-moving consumer goods.
Siemens Opcenter RDL has a buffer overflow vulnerability, which can be exploited by unauthenticated remote attackers to execute arbitrary code.