VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202401-1064 CVE-2024-0992 Shenzhen Tenda Technology Co.,Ltd.  of  i6  Out-of-bounds write vulnerability in firmware CVSS V2: 8.3
CVSS V3: 7.2
Severity: HIGH
A vulnerability was found in Tenda i6 1.0.0.9(3857) and classified as critical. This issue affects the function formwrlSSIDset of the file /goform/wifiSSIDset of the component httpd. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252257 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of i6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda i6 is a wireless access point from the Chinese company Tenda. The vulnerability is caused by the index parameter of the formwrlSSIDset function of /goform/wifiSSIDset failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or Lead to denial of service attacks
VAR-202401-1128 CVE-2024-0991 Shenzhen Tenda Technology Co.,Ltd.  of  i6  Out-of-bounds write vulnerability in firmware CVSS V2: 8.3
CVSS V3: 7.2
Severity: HIGH
A vulnerability has been found in Tenda i6 1.0.0.9(3857) and classified as critical. This vulnerability affects the function formSetCfm of the file /goform/setcfm of the component httpd. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252256. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of i6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda i6 is a wireless access point from the Chinese company Tenda. This vulnerability is caused by the funcpara1 parameter of the formSetCfm function of /goform/setcfm failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or Lead to denial of service attacks
VAR-202401-1085 CVE-2024-0990 Shenzhen Tenda Technology Co.,Ltd.  of  i6  Out-of-bounds write vulnerability in firmware CVSS V2: 8.3
CVSS V3: 7.2
Severity: HIGH
A vulnerability, which was classified as critical, was found in Tenda i6 1.0.0.9(3857). This affects the function formSetAutoPing of the file /goform/setAutoPing of the component httpd. The manipulation of the argument ping1 leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252255. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of i6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda i6 is a wireless access point from the Chinese company Tenda. This vulnerability is caused by the ping1 parameter of the formSetAutoPing function of /goform/setAutoPing failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or Causing denial of service
VAR-202401-1620 CVE-2024-23940 Made by Trend Micro  Air  Support Improper Permission Assignment Vulnerability CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Trend Micro uiAirSupport, included in the Trend Micro Security 2023 family of consumer products, version 6.0.2092 and below is vulnerable to a DLL hijacking/proxying vulnerability, which if exploited could allow an attacker to impersonate and modify a library to execute code on the system and ultimately escalate privileges on an affected system. From Trend Micro Inc. Air An update has been released for support. The proof-of-concept code ( PoC ) are published on the Internet. This vulnerability information is provided by the developer for the purpose of disseminating the information to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.A user under a standard user account may be able to escalate privileges and execute arbitrary programs
VAR-202401-1161 CVE-2024-0943 TOTOLINK  of  n350rt  Firmware Session Expiration Vulnerability CVSS V2: 2.6
CVSS V3: 3.7
Severity: LOW
A vulnerability was found in Totolink N350RT 9.3.5u.6255. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/cstecgi.cgi. The manipulation leads to session expiration. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252187. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK N350RT is a small home router from China's Zeon Electronics (TOTOLINK) company. An attacker could exploit this vulnerability to gain access to other users' sessions
VAR-202401-1105 CVE-2024-0932 Tenda  of  AC10U  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability, which was classified as critical, has been found in Tenda AC10U 15.03.06.49_multi_TDE01. This issue affects the function setSmartPowerManagement. The manipulation of the argument time leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252137 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10U is a wireless router from China's Tenda company. The vulnerability is caused by the setSmartPowerManagement function failing to properly check the boundaries. An attacker can exploit this vulnerability to overflow the buffer and execute arbitrary code on the system
VAR-202401-1038 CVE-2024-0931 Tenda  of  AC10U  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability classified as critical was found in Tenda AC10U 15.03.06.49_multi_TDE01. This vulnerability affects the function saveParentControlInfo. The manipulation of the argument deviceId/time/urls leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252136. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10U is a wireless router from China's Tenda company. An attacker can exploit this vulnerability to execute arbitrary code on the system
VAR-202401-1131 CVE-2024-0930 Tenda  of  AC10U  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability classified as critical has been found in Tenda AC10U 15.03.06.49_multi_TDE01. This affects the function fromSetWirelessRepeat. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252135. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10U is a wireless router made by the Chinese company Tenda. This vulnerability is caused by the wpapsk_crypto parameter of the fromSetWirelessRepeat function failing to correctly verify the length of the input data. An attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202401-1162 CVE-2024-0929 Tenda  of  AC10U  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been rated as critical. Affected by this issue is the function fromNatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252134 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker can exploit this vulnerability to execute arbitrary code on the system
VAR-202401-1150 CVE-2024-0928 Tenda  of  AC10U  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been declared as critical. Affected by this vulnerability is the function fromDhcpListClient. The manipulation of the argument page/listN leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252133 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the page/listN parameter of the fromDhcpListClient function failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to overflow the buffer and execute arbitrary code on the system
VAR-202401-1090 CVE-2024-0927 Tenda  of  AC10U  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been classified as critical. Affected is the function fromAddressNat. The manipulation of the argument entrys/mitInterface/page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252132. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the Entrys/mitInterface/page parameter of the fromAddressNat function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to overflow the buffer and execute arbitrary code on the system
VAR-202401-1039 CVE-2024-0926 Tenda  of  AC10U  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01 and classified as critical. This issue affects the function formWifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252131. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10U is a wireless router made by China Tenda Company. The vulnerability is caused by the index parameter of the formWifiWpsOOB function failing to correctly verify the length of the input data. An attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202401-1091 CVE-2024-0925 Tenda  of  AC10U  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability has been found in Tenda AC10U 15.03.06.49_multi_TDE01 and classified as critical. This vulnerability affects the function formSetVirtualSer. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-252130 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10 is a wireless router made by China Tenda Company
VAR-202401-1132 CVE-2024-0924 Shenzhen Tenda Technology Co.,Ltd.  of  ac10u  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability, which was classified as critical, was found in Tenda AC10U 15.03.06.49_multi_TDE01. This affects the function formSetPPTPServer. The manipulation of the argument startIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252129 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Shenzhen Tenda Technology Co.,Ltd. of ac10u A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the startIp parameter of the formSetPPTPServer function failing to correctly verify the length of the input data. An attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202401-1133 CVE-2024-0923 Tenda  of  AC10U  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability, which was classified as critical, has been found in Tenda AC10U 15.03.06.49_multi_TDE01. Affected by this issue is the function formSetDeviceName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252128. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10U is a wireless router made by the Chinese company Tenda
VAR-202401-1144 CVE-2024-0922 Tenda  of  AC10U  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability classified as critical was found in Tenda AC10U 15.03.06.49_multi_TDE01. Affected by this vulnerability is the function formQuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252127. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Tenda of AC10U A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10U is a wireless router made by the Chinese company Tenda. A remote attacker could exploit this vulnerability to overflow a buffer and execute arbitrary code on the system
VAR-202401-1079 CVE-2024-0921 D-Link Systems, Inc.  of  DIR-816 A2  in the firmware  OS  Command injection vulnerability CVSS V2: 5.8
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/setDeviceSettings of the component Web Interface. The manipulation of the argument statuscheckpppoeuser leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252139. D-Link Systems, Inc. of DIR-816 A2 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-816 A2 is a wireless router made by China D-Link Company. This vulnerability is caused by the failure of the parameter statuscheckpppoeuser to correctly filter special characters, commands, etc. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-1949 CVE-2024-22651 D-Link Systems, Inc.  of  DIR-815  Command injection vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
There is a command injection vulnerability in the ssdpcgi_main function of cgibin binary in D-Link DIR-815 router firmware v1.04. D-Link Systems, Inc. of DIR-815 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-1097 CVE-2022-45790 Vulnerability related to improper restriction of excessive authentication attempts in multiple OMRON Corporation products CVSS V2: -
CVSS V3: 9.1
Severity: CRITICAL
The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic. cj1g-cpu45p firmware, cj1g-cpu45p-gtc firmware, cj1g-cpu44p Multiple OMRON Corporation products, including firmware, contain a vulnerability related to improper restriction of excessive authentication attempts.Information may be obtained and information may be tampered with
VAR-202401-0919 CVE-2024-0769 D-Link Systems, Inc.  of  DIR-859  Path traversal vulnerability in firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. D-Link Systems, Inc. of DIR-859 A path traversal vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state