VARIoT IoT vulnerabilities database
VAR-202402-1982 | CVE-2023-32330 | IBM of Security Verify Access Certificate validation vulnerabilities in |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
IBM Security Verify Access 10.0.0.0 through 10.0.6.1 uses insecure calls that could allow an attacker on the network to take control of the server. IBM X-Force ID: 254977. (DoS) It may be in a state
VAR-202402-1514 | CVE-2023-32328 | IBM of Security Verify Access Vulnerability in plaintext transmission of important information in |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
IBM Security Verify Access 10.0.0.0 through 10.0.6.1 uses insecure protocols in some instances that could allow an attacker on the network to take control of the server. IBM X-Force Id: 254957. IBM of Security Verify Access Contains a vulnerability in the transmission of important information in clear text.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-0523 | CVE-2024-22012 | Google of Android Out-of-bounds write vulnerability in |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone made by the American company Google.
Google Pixel has a buffer overflow vulnerability caused by a lack of bounds checking. An attacker could exploit this vulnerability to escalate privileges
VAR-202402-0660 | CVE-2023-47209 | TP-LINK Technologies of er7206 in the firmware OS Command injection vulnerability |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A post authentication command injection vulnerability exists in the ipsec policy functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. TP-LINK Technologies of er7206 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK ER7206 is a multifunctional Gigabit router from China TP-LINK Company.
TP-LINK ER7206 1.3.0 build 20230322 Rel.70591 version has an operating system command injection vulnerability
VAR-202402-0356 | CVE-2023-47167 | TP-LINK Technologies of er7206 in the firmware OS Command injection vulnerability |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A post authentication command injection vulnerability exists in the GRE policy functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. TP-LINK Technologies of er7206 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK ER7206 is a multifunctional Gigabit router from China TP-LINK Company.
TP-LINK ER7206 1.3.0 build 20230322 Rel.70591 version has an operating system command injection vulnerability
VAR-202402-0339 | CVE-2023-46683 | TP-LINK Technologies of er7206 in the firmware OS Command injection vulnerability |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A post authentication command injection vulnerability exists when configuring the wireguard VPN functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection . An attacker can make an authenticated HTTP request to trigger this vulnerability. TP-LINK Technologies of er7206 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK ER7206 is a multifunctional Gigabit router from China TP-LINK Company.
There is an input validation vulnerability in the TP-LINK ER7206 wireguard VPN configuration. A remote attacker can exploit this vulnerability to submit special requests and execute arbitrary code in the application context
VAR-202402-1428 | CVE-2023-43482 | TP-LINK Technologies of er7206 in the firmware OS Command injection vulnerability |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A command execution vulnerability exists in the guest resource functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. TP-LINK Technologies of er7206 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK ER7206 is a multifunctional Gigabit router from China TP-LINK Company.
TP-LINK ER7206 1.3.0 build 20230322 Rel.70591 version has an operating system command injection vulnerability
VAR-202402-1245 | CVE-2023-33069 | Classic buffer overflow vulnerability in multiple Qualcomm products |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Memory corruption in Audio while processing the calibration data returned from ACDB loader. 9206 lte modem firmware, AQT1000 firmware, AR8035 Multiple Qualcomm products such as firmware have a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-1352 | CVE-2023-33068 | Classic buffer overflow vulnerability in multiple Qualcomm products |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Memory corruption in Audio while processing IIR config data from AFE calibration block. 9206 lte modem firmware, AQT1000 firmware, AR8035 Multiple Qualcomm products such as firmware have a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-1418 | CVE-2023-33067 | Out-of-bounds write vulnerability in multiple Qualcomm products |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Memory corruption in Audio while calling START command on host voice PCM multiple times for the same RX or TX tap points. 9206 lte modem firmware, AQT1000 firmware, AR8035 Several Qualcomm products, such as firmware, contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-1427 | CVE-2023-33065 | Out-of-bounds read vulnerability in multiple Qualcomm products |
CVSS V2: - CVSS V3: 7.1 Severity: HIGH |
Information disclosure in Audio while accessing AVCS services from ADSP payload. AQT1000 firmware, AR8035 firmware, c-v2x 9150 Multiple Qualcomm products, such as firmware, contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
VAR-202402-1471 | CVE-2023-33064 | Out-of-bounds read vulnerability in multiple Qualcomm products |
CVSS V2: - CVSS V3: 5.5 Severity: MEDIUM |
Transient DOS in Audio when invoking callback function of ASM driver. AQT1000 firmware, AR8035 firmware, c-v2x 9150 Multiple Qualcomm products, such as firmware, contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202402-1457 | CVE-2024-20825 | Samsung's Galaxy Store Vulnerability in |
CVSS V2: - CVSS V3: 5.5 Severity: MEDIUM |
Implicit intent hijacking vulnerability in IAP of Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent. Samsung's Galaxy Store Exists in unspecified vulnerabilities.Information may be obtained
VAR-202402-1489 | CVE-2024-20824 | Samsung's Galaxy Store Vulnerability in |
CVSS V2: - CVSS V3: 5.5 Severity: MEDIUM |
Implicit intent hijacking vulnerability in VoiceSearch of Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent. Samsung's Galaxy Store Exists in unspecified vulnerabilities.Information may be obtained
VAR-202402-1488 | CVE-2024-20823 | Samsung's Galaxy Store Vulnerability in |
CVSS V2: - CVSS V3: 5.5 Severity: MEDIUM |
Implicit intent hijacking vulnerability in SamsungAccount of Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent. Samsung's Galaxy Store Exists in unspecified vulnerabilities.Information may be obtained
VAR-202402-1475 | CVE-2024-20822 | Samsung's Galaxy Store Vulnerability in |
CVSS V2: - CVSS V3: 5.5 Severity: MEDIUM |
Implicit intent hijacking vulnerability in AccountActivity of Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent. Samsung's Galaxy Store Exists in unspecified vulnerabilities.Information may be obtained
VAR-202402-2401 | No CVE | There is a command execution vulnerability in Huawei Technologies Co., Ltd. Agile Controller |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Agile Controller is an automation controller suitable for various industrial application scenarios.
There is a command execution vulnerability in Huawei Technologies Co., Ltd. Agile Controller. An attacker can use this vulnerability to gain server permissions.
VAR-202402-0736 | CVE-2024-20827 | Samsung's Gallery Vulnerability in |
CVSS V2: - CVSS V3: 4.6 Severity: MEDIUM |
Improper access control vulnerability in Samsung Gallery prior to version 14.5.04.4 allows physical attackers to access the picture using physical keyboard on the lockscreen. Samsung's Gallery Exists in unspecified vulnerabilities.Information may be obtained
VAR-202402-0826 | CVE-2024-24543 | Shenzhen Tenda Technology Co.,Ltd. of AC9 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Buffer Overflow vulnerability in the function setSchedWifi in Tenda AC9 v.3.0, firmware version v.15.03.06.42_multi allows a remote attacker to cause a denial of service or run arbitrary code via crafted overflow data. Shenzhen Tenda Technology Co.,Ltd. of AC9 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state.
Tenda AC9 has a buffer overflow vulnerability. The vulnerability stems from the failure of the setSchedWifi function to correctly verify the length of input data
VAR-202402-2610 | No CVE | There is a command execution vulnerability (CNVD-2024-0589958) in the RG-UAC Ruijie unified Internet behavior management and auditing system of Beijing StarNet Ruijie Network Technology Co., Ltd. |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
RG-UAC Ruijie unified online behavior management and audit system is an online behavior management and audit product.
There is a command execution vulnerability in the RG-UAC Ruijie unified Internet behavior management and auditing system of Beijing StarNet Ruijie Network Technology Co., Ltd. An attacker can use this vulnerability to obtain server permissions.