VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202402-1982 CVE-2023-32330 IBM  of  Security Verify Access  Certificate validation vulnerabilities in CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
IBM Security Verify Access 10.0.0.0 through 10.0.6.1 uses insecure calls that could allow an attacker on the network to take control of the server. IBM X-Force ID: 254977. (DoS) It may be in a state
VAR-202402-1514 CVE-2023-32328 IBM  of  Security Verify Access  Vulnerability in plaintext transmission of important information in CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
IBM Security Verify Access 10.0.0.0 through 10.0.6.1 uses insecure protocols in some instances that could allow an attacker on the network to take control of the server. IBM X-Force Id: 254957. IBM of Security Verify Access Contains a vulnerability in the transmission of important information in clear text.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-0523 CVE-2024-22012 Google  of  Android  Out-of-bounds write vulnerability in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone made by the American company Google. Google Pixel has a buffer overflow vulnerability caused by a lack of bounds checking. An attacker could exploit this vulnerability to escalate privileges
VAR-202402-0660 CVE-2023-47209 TP-LINK Technologies  of  er7206  in the firmware  OS  Command injection vulnerability CVSS V2: 8.3
CVSS V3: 7.2
Severity: HIGH
A post authentication command injection vulnerability exists in the ipsec policy functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. TP-LINK Technologies of er7206 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK ER7206 is a multifunctional Gigabit router from China TP-LINK Company. TP-LINK ER7206 1.3.0 build 20230322 Rel.70591 version has an operating system command injection vulnerability
VAR-202402-0356 CVE-2023-47167 TP-LINK Technologies  of  er7206  in the firmware  OS  Command injection vulnerability CVSS V2: 8.3
CVSS V3: 7.2
Severity: HIGH
A post authentication command injection vulnerability exists in the GRE policy functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. TP-LINK Technologies of er7206 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK ER7206 is a multifunctional Gigabit router from China TP-LINK Company. TP-LINK ER7206 1.3.0 build 20230322 Rel.70591 version has an operating system command injection vulnerability
VAR-202402-0339 CVE-2023-46683 TP-LINK Technologies  of  er7206  in the firmware  OS  Command injection vulnerability CVSS V2: 8.3
CVSS V3: 7.2
Severity: HIGH
A post authentication command injection vulnerability exists when configuring the wireguard VPN functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection . An attacker can make an authenticated HTTP request to trigger this vulnerability. TP-LINK Technologies of er7206 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK ER7206 is a multifunctional Gigabit router from China TP-LINK Company. There is an input validation vulnerability in the TP-LINK ER7206 wireguard VPN configuration. A remote attacker can exploit this vulnerability to submit special requests and execute arbitrary code in the application context
VAR-202402-1428 CVE-2023-43482 TP-LINK Technologies  of  er7206  in the firmware  OS  Command injection vulnerability CVSS V2: 8.3
CVSS V3: 7.2
Severity: HIGH
A command execution vulnerability exists in the guest resource functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. TP-LINK Technologies of er7206 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK ER7206 is a multifunctional Gigabit router from China TP-LINK Company. TP-LINK ER7206 1.3.0 build 20230322 Rel.70591 version has an operating system command injection vulnerability
VAR-202402-1245 CVE-2023-33069 Classic buffer overflow vulnerability in multiple Qualcomm products CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Memory corruption in Audio while processing the calibration data returned from ACDB loader. 9206 lte modem firmware, AQT1000 firmware, AR8035 Multiple Qualcomm products such as firmware have a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-1352 CVE-2023-33068 Classic buffer overflow vulnerability in multiple Qualcomm products CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Memory corruption in Audio while processing IIR config data from AFE calibration block. 9206 lte modem firmware, AQT1000 firmware, AR8035 Multiple Qualcomm products such as firmware have a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-1418 CVE-2023-33067 Out-of-bounds write vulnerability in multiple Qualcomm products CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Memory corruption in Audio while calling START command on host voice PCM multiple times for the same RX or TX tap points. 9206 lte modem firmware, AQT1000 firmware, AR8035 Several Qualcomm products, such as firmware, contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-1427 CVE-2023-33065 Out-of-bounds read vulnerability in multiple Qualcomm products CVSS V2: -
CVSS V3: 7.1
Severity: HIGH
Information disclosure in Audio while accessing AVCS services from ADSP payload. AQT1000 firmware, AR8035 firmware, c-v2x 9150 Multiple Qualcomm products, such as firmware, contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
VAR-202402-1471 CVE-2023-33064 Out-of-bounds read vulnerability in multiple Qualcomm products CVSS V2: -
CVSS V3: 5.5
Severity: MEDIUM
Transient DOS in Audio when invoking callback function of ASM driver. AQT1000 firmware, AR8035 firmware, c-v2x 9150 Multiple Qualcomm products, such as firmware, contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202402-1457 CVE-2024-20825 Samsung's  Galaxy Store  Vulnerability in CVSS V2: -
CVSS V3: 5.5
Severity: MEDIUM
Implicit intent hijacking vulnerability in IAP of Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent. Samsung's Galaxy Store Exists in unspecified vulnerabilities.Information may be obtained
VAR-202402-1489 CVE-2024-20824 Samsung's  Galaxy Store  Vulnerability in CVSS V2: -
CVSS V3: 5.5
Severity: MEDIUM
Implicit intent hijacking vulnerability in VoiceSearch of Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent. Samsung's Galaxy Store Exists in unspecified vulnerabilities.Information may be obtained
VAR-202402-1488 CVE-2024-20823 Samsung's  Galaxy Store  Vulnerability in CVSS V2: -
CVSS V3: 5.5
Severity: MEDIUM
Implicit intent hijacking vulnerability in SamsungAccount of Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent. Samsung's Galaxy Store Exists in unspecified vulnerabilities.Information may be obtained
VAR-202402-1475 CVE-2024-20822 Samsung's  Galaxy Store  Vulnerability in CVSS V2: -
CVSS V3: 5.5
Severity: MEDIUM
Implicit intent hijacking vulnerability in AccountActivity of Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent. Samsung's Galaxy Store Exists in unspecified vulnerabilities.Information may be obtained
VAR-202402-2401 No CVE There is a command execution vulnerability in Huawei Technologies Co., Ltd. Agile Controller CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Agile Controller is an automation controller suitable for various industrial application scenarios. There is a command execution vulnerability in Huawei Technologies Co., Ltd. Agile Controller. An attacker can use this vulnerability to gain server permissions.
VAR-202402-0736 CVE-2024-20827 Samsung's  Gallery  Vulnerability in CVSS V2: -
CVSS V3: 4.6
Severity: MEDIUM
Improper access control vulnerability in Samsung Gallery prior to version 14.5.04.4 allows physical attackers to access the picture using physical keyboard on the lockscreen. Samsung's Gallery Exists in unspecified vulnerabilities.Information may be obtained
VAR-202402-0826 CVE-2024-24543 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Buffer Overflow vulnerability in the function setSchedWifi in Tenda AC9 v.3.0, firmware version v.15.03.06.42_multi allows a remote attacker to cause a denial of service or run arbitrary code via crafted overflow data. Shenzhen Tenda Technology Co.,Ltd. of AC9 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC9 has a buffer overflow vulnerability. The vulnerability stems from the failure of the setSchedWifi function to correctly verify the length of input data
VAR-202402-2610 No CVE There is a command execution vulnerability (CNVD-2024-0589958) in the RG-UAC Ruijie unified Internet behavior management and auditing system of Beijing StarNet Ruijie Network Technology Co., Ltd. CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
RG-UAC Ruijie unified online behavior management and audit system is an online behavior management and audit product. There is a command execution vulnerability in the RG-UAC Ruijie unified Internet behavior management and auditing system of Beijing StarNet Ruijie Network Technology Co., Ltd. An attacker can use this vulnerability to obtain server permissions.