VARIoT IoT vulnerabilities database
VAR-202404-3328 | CVE-2024-22450 |
CVSS V2: - CVSS V3: 7.4 Severity: HIGH |
Dell Alienware Command Center, versions prior to 6.2.7.0, contain an uncontrolled search path element vulnerability. A local malicious user could potentially inject malicious files in the file search path, leading to system compromise.
VAR-202404-3640 | CVE-2024-0159 |
CVSS V2: - CVSS V3: 6.7 Severity: MEDIUM |
Dell Alienware Command Center, versions 5.5.52.0 and prior, contain improper access control vulnerability, leading to Denial of Service on local system.
VAR-202404-3219 | CVE-2024-31487 | fortinet's FortiSandbox Past traversal vulnerability in |
CVSS V2: - CVSS V3: 5.9 Severity: MEDIUM |
A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.4 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.0 through 2.4.1 may allows attacker to information disclosure via crafted http requests. fortinet's FortiSandbox Exists in a past traversal vulnerability.Information may be obtained
VAR-202404-3527 | CVE-2024-23671 | fortinet's FortiSandbox Past traversal vulnerability in |
CVSS V2: - CVSS V3: 8.1 Severity: HIGH |
A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted HTTP requests. fortinet's FortiSandbox Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be in a state
VAR-202404-3533 | CVE-2024-21756 | fortinet's FortiSandbox In OS Command injection vulnerability |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted requests.. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202404-3263 | CVE-2024-21755 | fortinet's FortiSandbox In OS Command injection vulnerability |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted requests.. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202404-0371 | CVE-2023-49913 | TP-LINK AC1350 has an unspecified vulnerability (CNVD-2024-20287) |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `action` parameter at offset `0x422448` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115. TP-LINK AC1350 is a router from China's TP-LINK company
VAR-202405-1812 | CVE-2023-49909 | TP-LINK AC1350 has an unspecified vulnerability (CNVD-2024-23784) |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `action` parameter at offset `0x0045ab38` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225. TP-LINK AC1350 is a router from China's TP-LINK company
VAR-202404-0250 | CVE-2023-49134 | TP-LINK AC1350/N300 Command Execution Vulnerability |
CVSS V2: 7.6 CVSS V3: 8.1 Severity: HIGH |
A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point. TP-LINK AC1350/N300 is a router from TP-LINK of China
VAR-202404-0249 | CVE-2023-49133 | TP-LINK AC1350 and N300 command injection vulnerability |
CVSS V2: 7.6 CVSS V3: 8.1 Severity: HIGH |
A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP225(V3) 5.1.0 Build 20220926 of the AC1350 Wireless MU-MIMO Gigabit Access Point. TP-LINK AC1350/N300 is a router from TP-LINK of China.
TP-LINK AC1350 and TP-LINK N300 have a command injection vulnerability. The vulnerability is caused by the tddpd enable_test_mode function failing to properly filter special characters and commands in constructing commands
VAR-202404-0248 | CVE-2023-49074 | TP-LINK AC1350 has an unspecified vulnerability (CNVD-2024-20286) |
CVSS V2: 7.1 CVSS V3: 7.4 Severity: HIGH |
A denial of service vulnerability exists in the TDDP functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of network requests can lead to reset to factory settings. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability. TP-LINK AC1350 is a router from China's TP-LINK company
VAR-202404-0331 | CVE-2023-48724 | TP-LINK AC1350 Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A memory corruption vulnerability exists in the web interface functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted HTTP POST request can lead to denial of service of the device's web interface. An attacker can send an unauthenticated HTTP POST request to trigger this vulnerability. TP-LINK AC1350 is a router from China's TP-LINK company
VAR-202404-3003 | CVE-2023-47541 | fortinet's FortiSandbox Past traversal vulnerability in |
CVSS V2: - CVSS V3: 6.7 Severity: MEDIUM |
An improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.2 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.0 through 2.4.1 and 2.3.0 through 2.3.3 and 2.2.0 through 2.2.2 and 2.1.0 through 2.1.3 and 2.0.0 through 2.0.3 allows attacker to execute unauthorized code or commands via CLI. fortinet's FortiSandbox Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202404-2098 | CVE-2023-47540 | fortinet's FortiSandbox In OS Command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 6.7 Severity: MEDIUM |
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.2 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.0.5 through 3.0.7 may allows attacker to execute unauthorized code or commands via CLI. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiSandbox is an APT (Advanced Persistent Threat) protection device from Fortinet. The device provides dual sandbox technology, dynamic threat intelligence system, real-time control panel and reporting.
Fortinet FortiSandbox has an operating system command injection vulnerability, which is caused by an operating system command injection vulnerability
VAR-202404-0165 | CVE-2023-50821 | Siemens SIMATIC WinCC Denial of Service Vulnerability (CNVD-2024-17302) |
CVSS V2: 4.9 CVSS V3: 6.2 Severity: Medium |
A vulnerability has been identified in SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC04), SIMATIC WinCC Runtime Professional V17 (All versions < V17 Update 8), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 1), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 16), SIMATIC WinCC V8.0 (All versions < V8.0 Update 5). The affected products do not properly validate the input provided in the login dialog box. An attacker could leverage this vulnerability to cause a persistent denial of service condition. SIMATIC PCS 7 is a process control system. SIMATIC WinCC is an automated supervisory control and data acquisition (SCADA) system. SIMATIC WinCC Runtime Professional is a visualization runtime platform for operators to control and monitor machines and equipment
VAR-202404-0057 | CVE-2024-280010 | NEC Aterm Multiple vulnerabilities in series |
CVSS V2: - CVSS V3: 6.5 Severity: Medium |
None
VAR-202404-0059 | CVE-2024-280016 | NEC Aterm Multiple vulnerabilities in series |
CVSS V2: - CVSS V3: 4.3 Severity: Medium |
None
VAR-202404-0055 | CVE-2024-280013 | NEC Aterm Multiple vulnerabilities in series |
CVSS V2: - CVSS V3: 4.3 Severity: Medium |
None
VAR-202404-0056 | CVE-2024-280011 | NEC Aterm Multiple vulnerabilities in series |
CVSS V2: - CVSS V3: 4.3 Severity: Medium |
None
VAR-202404-0058 | CVE-2024-280015 | NEC Aterm Multiple vulnerabilities in series |
CVSS V2: - CVSS V3: 6.8 Severity: Medium |
None