VARIoT IoT vulnerabilities database
![](/static/front/logo.webp)
VAR-202401-0279 | CVE-2024-0533 | Shenzhen Tenda Technology Co.,Ltd. of A15 Out-of-bounds write vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A vulnerability was found in Tenda A15 15.13.07.13. It has been rated as critical. This issue affects some unknown processing of the file /goform/SetOnlineDevName of the component Web-based Management Interface. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250703. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of A15 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability is caused by the devName parameter of the /goform/SetOnlineDevName file failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of Service attacks
VAR-202401-0743 | CVE-2024-0532 | Shenzhen Tenda Technology Co.,Ltd. of A15 Out-of-bounds write vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects unknown code of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250702 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of A15 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability is caused by the wpapsk_crypto2_4g parameter of the /goform/WifiExtraSet file failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of Service attacks
VAR-202401-0377 | CVE-2024-0531 | Shenzhen Tenda Technology Co.,Ltd. of A15 Out-of-bounds write vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
A vulnerability was found in Tenda A15 15.13.07.13. It has been classified as critical. This affects an unknown part of the file /goform/setBlackRule of the component Web-based Management Interface. The manipulation of the argument deviceList leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250701 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of A15 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability is caused by the deviceList parameter of the /goform/setBlackRule file failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of Service attacks
VAR-202401-2457 | CVE-2023-52026 | TOTOLINK EX1800T command execution vulnerability (CNVD-2024-13795) |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOlink EX1800T V9.1.0cu.2112_B20220316 was discovered to contain a remote command execution (RCE) vulnerability via the telnet_enabled parameter of the setTelnetCfg interface. TOTOLINK EX1800T is a Wi-Fi range extender from China's Zeon Electronics (TOTOLINK) company. An attacker could exploit this vulnerability to execute arbitrary commands on the system
VAR-202401-1392 | CVE-2024-23061 | TOTOLINK A3300R setScheduleCfg method command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the minute parameter in the setScheduleCfg function. TOTOLINK A3300R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-1393 | CVE-2024-23060 | TOTOLINK A3300R setDmzCfg method command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the ip parameter in the setDmzCfg function. TOTOLINK A3300R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-1378 | CVE-2024-23059 | TOTOLINK A3300R setDdnsCfg method command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the username parameter in the setDdnsCfg function. TOTOLINK A3300R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-1561 | CVE-2024-23058 | TOTOLINK A3300R setTr069Cfg method command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the pass parameter in the setTr069Cfg function. TOTOLINK A3300R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-1367 | CVE-2024-23057 | TOTOLINK A3300R setNtpCfg method command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the tz parameter in the setNtpCfg function. TOTOLINK A3300R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-1391 | CVE-2024-22942 | TOTOLINK A3300R setWanCfg method command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the hostName parameter in the setWanCfg function. TOTOLINK A3300R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-1120 | CVE-2023-51987 | D-Link DIR-822 Access Control Error Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-822+ V1.0.2 contains a login bypass in the HNAP1 interface, which allows attackers to log in to administrator accounts with empty passwords. D-Link DIR-822 is a wireless router made by China D-Link Company.
D-Link DIR-822+ V1.0.2 version has an access control error vulnerability
VAR-202401-1148 | CVE-2023-51984 | D-X Electronic Equipment (Shanghai) Co., Ltd. DIR-822+ V1.0.2 version has a command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-822+ V1.0.2 was found to contain a command injection in SetStaticRouteSettings function. allows remote attackers to execute arbitrary commands via shell. D-Link Electronic Equipment (Shanghai) Co., Ltd. DIR-822 is a wireless router made by China D-Link Company.
There is a command injection vulnerability in the DIR-822+ V1.0.2 version of D-X Electronic Equipment (Shanghai) Co., Ltd. The vulnerability is caused by the SetStaticRouteSettings function failing to correctly filter special characters, commands, etc. in the constructed command
VAR-202401-0875 | CVE-2023-52032 | TOTOLINK EX1200T command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOlink EX1200T V4.1.2cu.5232_B20210713 was discovered to contain a remote command execution (RCE) vulnerability via the "main" function. TOTOLINK EX1200T is a Wi-Fi range extender from China's Zeon Electronics (TOTOLINK) company.
TOTOLINK EX1200T V4.1.2cu.5232_B20210713 version has a command injection vulnerability. This vulnerability is caused by the failure of the main method to correctly filter special characters, commands, etc. in the constructed command
VAR-202401-1377 | CVE-2023-52031 | TOTOLINK A3700R UploadFirmwareFile method command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the UploadFirmwareFile function. TOTOLINK A3700R is a wireless router made by China Zeon Electronics (TOTOLINK) Company.
There is a command injection vulnerability in the TOTOLINK A3700R v9.1.2u.5822_B20200513 version. The vulnerability is caused by the UploadFirmwareFile method failing to correctly filter special characters, commands, etc. in the constructed command
VAR-202401-1560 | CVE-2023-52030 | TOTOLINK A3700R setOpModeCfg method command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the setOpModeCfg function. TOTOLINK A3700R is a wireless router made by China Zeon Electronics (TOTOLINK) Company.
TOTOLINK A3700R v9.1.2u.5822_B20200513 version has a command injection vulnerability. This vulnerability is caused by the setOpModeCfg method failing to correctly filter special characters, commands, etc. in the constructed command
VAR-202401-1360 | CVE-2023-52029 | TOTOLINK A3700R setDiagnosisCfg method command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the setDiagnosisCfg function. TOTOLINK A3700R is a wireless router made by China Zeon Electronics (TOTOLINK) Company.
TOTOLINK A3700R v9.1.2u.5822_B20200513 version has a command injection vulnerability. The vulnerability is caused by the setDiagnosisCfg method failing to correctly filter special characters, commands, etc. in the constructed command
VAR-202401-1390 | CVE-2023-52028 | TOTOLINK A3700R setTracerouteCfg method command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the setTracerouteCfg function. TOTOLINK A3700R is a wireless router made by China Zeon Electronics (TOTOLINK) Company.
There is a command injection vulnerability in the TOTOLINK A3700R v9.1.2u.5822_B20200513 version. The vulnerability is caused by the setTracerouteCfg method failing to correctly filter special characters, commands, etc. in the constructed command
VAR-202401-1366 | CVE-2023-52027 | TOTOLINK A3700R NTPSyncWithHost method command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the NTPSyncWithHost function. TOTOLINK A3700R is a wireless router made by China Zeon Electronics (TOTOLINK) Company.
There is a command injection vulnerability in the TOTOLINK A3700R v9.1.2u.5822_B20200513 version. The vulnerability is caused by the failure of the NTPSyncWithHost method to correctly filter special characters, commands, etc. in the constructed command
VAR-202401-1842 | CVE-2023-38267 | IBM of Security Verify Access and Security Verify Access Docker Vulnerability regarding lack of encryption of critical data in |
CVSS V2: - CVSS V3: 5.5 Severity: MEDIUM |
IBM Security Access Manager Appliance (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.6.1) could allow a local user to possibly elevate their privileges due to sensitive configuration information being exposed. IBM X-Force ID: 260584
VAR-202401-2519 | CVE-2023-31003 |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.6.1) could allow a local user to obtain root access due to improper access controls. IBM X-Force ID: 254658.