VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202401-0279 CVE-2024-0533 Shenzhen Tenda Technology Co.,Ltd.  of  A15  Out-of-bounds write vulnerability in firmware CVSS V2: 8.3
CVSS V3: 7.2
Severity: HIGH
A vulnerability was found in Tenda A15 15.13.07.13. It has been rated as critical. This issue affects some unknown processing of the file /goform/SetOnlineDevName of the component Web-based Management Interface. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250703. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of A15 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability is caused by the devName parameter of the /goform/SetOnlineDevName file failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of Service attacks
VAR-202401-0743 CVE-2024-0532 Shenzhen Tenda Technology Co.,Ltd.  of  A15  Out-of-bounds write vulnerability in firmware CVSS V2: 8.3
CVSS V3: 7.2
Severity: HIGH
A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects unknown code of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250702 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of A15 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability is caused by the wpapsk_crypto2_4g parameter of the /goform/WifiExtraSet file failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of Service attacks
VAR-202401-0377 CVE-2024-0531 Shenzhen Tenda Technology Co.,Ltd.  of  A15  Out-of-bounds write vulnerability in firmware CVSS V2: 8.3
CVSS V3: 7.2
Severity: HIGH
A vulnerability was found in Tenda A15 15.13.07.13. It has been classified as critical. This affects an unknown part of the file /goform/setBlackRule of the component Web-based Management Interface. The manipulation of the argument deviceList leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250701 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. of A15 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability is caused by the deviceList parameter of the /goform/setBlackRule file failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of Service attacks
VAR-202401-2457 CVE-2023-52026 TOTOLINK EX1800T command execution vulnerability (CNVD-2024-13795) CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOlink EX1800T V9.1.0cu.2112_B20220316 was discovered to contain a remote command execution (RCE) vulnerability via the telnet_enabled parameter of the setTelnetCfg interface. TOTOLINK EX1800T is a Wi-Fi range extender from China's Zeon Electronics (TOTOLINK) company. An attacker could exploit this vulnerability to execute arbitrary commands on the system
VAR-202401-1392 CVE-2024-23061 TOTOLINK A3300R setScheduleCfg method command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the minute parameter in the setScheduleCfg function. TOTOLINK A3300R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-1393 CVE-2024-23060 TOTOLINK A3300R setDmzCfg method command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the ip parameter in the setDmzCfg function. TOTOLINK A3300R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-1378 CVE-2024-23059 TOTOLINK A3300R setDdnsCfg method command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the username parameter in the setDdnsCfg function. TOTOLINK A3300R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-1561 CVE-2024-23058 TOTOLINK A3300R setTr069Cfg method command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the pass parameter in the setTr069Cfg function. TOTOLINK A3300R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-1367 CVE-2024-23057 TOTOLINK A3300R setNtpCfg method command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the tz parameter in the setNtpCfg function. TOTOLINK A3300R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-1391 CVE-2024-22942 TOTOLINK A3300R setWanCfg method command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the hostName parameter in the setWanCfg function. TOTOLINK A3300R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202401-1120 CVE-2023-51987 D-Link DIR-822 Access Control Error Vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-822+ V1.0.2 contains a login bypass in the HNAP1 interface, which allows attackers to log in to administrator accounts with empty passwords. D-Link DIR-822 is a wireless router made by China D-Link Company. D-Link DIR-822+ V1.0.2 version has an access control error vulnerability
VAR-202401-1148 CVE-2023-51984 D-X Electronic Equipment (Shanghai) Co., Ltd. DIR-822+ V1.0.2 version has a command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-822+ V1.0.2 was found to contain a command injection in SetStaticRouteSettings function. allows remote attackers to execute arbitrary commands via shell. D-Link Electronic Equipment (Shanghai) Co., Ltd. DIR-822 is a wireless router made by China D-Link Company. There is a command injection vulnerability in the DIR-822+ V1.0.2 version of D-X Electronic Equipment (Shanghai) Co., Ltd. The vulnerability is caused by the SetStaticRouteSettings function failing to correctly filter special characters, commands, etc. in the constructed command
VAR-202401-0875 CVE-2023-52032 TOTOLINK EX1200T command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOlink EX1200T V4.1.2cu.5232_B20210713 was discovered to contain a remote command execution (RCE) vulnerability via the "main" function. TOTOLINK EX1200T is a Wi-Fi range extender from China's Zeon Electronics (TOTOLINK) company. TOTOLINK EX1200T V4.1.2cu.5232_B20210713 version has a command injection vulnerability. This vulnerability is caused by the failure of the main method to correctly filter special characters, commands, etc. in the constructed command
VAR-202401-1377 CVE-2023-52031 TOTOLINK A3700R UploadFirmwareFile method command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the UploadFirmwareFile function. TOTOLINK A3700R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. There is a command injection vulnerability in the TOTOLINK A3700R v9.1.2u.5822_B20200513 version. The vulnerability is caused by the UploadFirmwareFile method failing to correctly filter special characters, commands, etc. in the constructed command
VAR-202401-1560 CVE-2023-52030 TOTOLINK A3700R setOpModeCfg method command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the setOpModeCfg function. TOTOLINK A3700R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. TOTOLINK A3700R v9.1.2u.5822_B20200513 version has a command injection vulnerability. This vulnerability is caused by the setOpModeCfg method failing to correctly filter special characters, commands, etc. in the constructed command
VAR-202401-1360 CVE-2023-52029 TOTOLINK A3700R setDiagnosisCfg method command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the setDiagnosisCfg function. TOTOLINK A3700R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. TOTOLINK A3700R v9.1.2u.5822_B20200513 version has a command injection vulnerability. The vulnerability is caused by the setDiagnosisCfg method failing to correctly filter special characters, commands, etc. in the constructed command
VAR-202401-1390 CVE-2023-52028 TOTOLINK A3700R setTracerouteCfg method command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the setTracerouteCfg function. TOTOLINK A3700R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. There is a command injection vulnerability in the TOTOLINK A3700R v9.1.2u.5822_B20200513 version. The vulnerability is caused by the setTracerouteCfg method failing to correctly filter special characters, commands, etc. in the constructed command
VAR-202401-1366 CVE-2023-52027 TOTOLINK A3700R NTPSyncWithHost method command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the NTPSyncWithHost function. TOTOLINK A3700R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. There is a command injection vulnerability in the TOTOLINK A3700R v9.1.2u.5822_B20200513 version. The vulnerability is caused by the failure of the NTPSyncWithHost method to correctly filter special characters, commands, etc. in the constructed command
VAR-202401-1842 CVE-2023-38267 IBM  of  Security Verify Access  and  Security Verify Access Docker  Vulnerability regarding lack of encryption of critical data in CVSS V2: -
CVSS V3: 5.5
Severity: MEDIUM
IBM Security Access Manager Appliance (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.6.1) could allow a local user to possibly elevate their privileges due to sensitive configuration information being exposed. IBM X-Force ID: 260584
VAR-202401-2519 CVE-2023-31003 CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.6.1) could allow a local user to obtain root access due to improper access controls. IBM X-Force ID: 254658.