VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202312-1293 CVE-2023-49417 CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
TOTOLink A7000R V9.1.0u.6115_B20201022 has a stack overflow vulnerability via setOpModeCfg.
VAR-202312-2135 CVE-2023-6181 CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
An oversight in BCB handling of reboot reason that allows for persistent code execution
VAR-202312-2038 CVE-2023-48425 CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
U-Boot vulnerability resulting in persistent Code Execution 
VAR-202312-1510 CVE-2023-48424 CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
U-Boot shell vulnerability resulting in Privilege escalation in a production device
VAR-202312-1847 CVE-2023-48417 CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Missing Permission checks resulting in unauthorized access and Manipulation in KeyChainActivity Application
VAR-202312-1601 CVE-2023-50463 CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
The caddy-geo-ip (aka GeoIP) middleware through 0.6.0 for Caddy 2, when trust_header X-Forwarded-For is used, allows attackers to spoof their source IP address via an X-Forwarded-For header, which may bypass a protection mechanism (trusted_proxy directive in reverse_proxy or IP address range restrictions).
VAR-202312-0246 CVE-2023-6612 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 5.2
CVSS V3: 5.5
Severity: MEDIUM
A vulnerability was found in Totolink X5000R 9.1.0cu.2300_B20230112. It has been rated as critical. This issue affects the function setDdnsCfg/setDynamicRoute/setFirewallType/setIPSecCfg/setIpPortFilterRules/setLancfg/setLoginPasswordCfg/setMacFilterRules/setMtknatCfg/setNetworkConfig/setPortForwardRules/setRemoteCfg/setSSServer/setScheduleCfg/setSmartQosCfg/setStaticDhcpRules/setStaticRoute/setVpnAccountCfg/setVpnPassCfg/setVpnUser/setWiFiAclAddConfig/setWiFiEasyGuestCfg/setWiFiGuestCfg/setWiFiRepeaterConfig/setWiFiScheduleCfg/setWizardCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to os command injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247247. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK of X5000R The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202312-2011 CVE-2023-49007 of netgear  RBR750  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
In Netgear Orbi RBR750 firmware before V7.2.6.21, there is a stack-based buffer overflow in /usr/sbin/httpd. of netgear RBR750 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202312-1571 No CVE Beijing StarNet Ruijie Network Technology Co., Ltd. EG2000SE has an information leakage vulnerability (CNVD-2023-88652) CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
EG2000SE is a multi-service router. Beijing Xingwang Ruijie Network Technology Co., Ltd. EG2000SE has an information leakage vulnerability. An attacker can use this vulnerability to obtain sensitive information.
VAR-202312-1415 No CVE Beijing StarNet Ruijie Network Technology Co., Ltd. EG2000SE has an information leakage vulnerability (CNVD-2023-94089) CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
EG2000SE is a router product. Beijing Xingwang Ruijie Network Technology Co., Ltd. EG2000SE has an information leakage vulnerability. An attacker can use this vulnerability to obtain sensitive information.
VAR-202312-2290 No CVE Beijing StarNet Ruijie Network Technology Co., Ltd. EG2000SE has an information leakage vulnerability (CNVD-2023-94096) CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
EG2000SE is a router product. Beijing Xingwang Ruijie Network Technology Co., Ltd. EG2000SE has an information leakage vulnerability. An attacker can use this vulnerability to obtain sensitive information.
VAR-202312-1414 No CVE Beijing StarNet Ruijie Network Technology Co., Ltd. EG2000SE has an information leakage vulnerability (CNVD-2023-94098) CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
EG2000SE is a router product. Beijing Xingwang Ruijie Network Technology Co., Ltd. EG2000SE has an information leakage vulnerability. An attacker can use this vulnerability to obtain sensitive information.
VAR-202312-1745 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. EG2000SE has an information leakage vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
EG2000SE is a multi-service router. Beijing Xingwang Ruijie Network Technology Co., Ltd. EG2000SE has an information leakage vulnerability. An attacker can use this vulnerability to obtain sensitive information.
VAR-202312-0247 CVE-2023-6581 D-Link Systems, Inc.  of  dar-7000  in the firmware  SQL  Injection vulnerability CVSS V2: 5.2
CVSS V3: 5.5
Severity: MEDIUM
A vulnerability has been found in D-Link DAR-7000 up to 20231126 and classified as critical. This vulnerability affects unknown code of the file /user/inc/workidajax.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-247162 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. D-Link Systems, Inc. of dar-7000 The firmware has SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-X Electronic Equipment (Shanghai) Co., Ltd. DAR-7000 is an Internet behavior audit gateway. D-X Electronic Equipment (Shanghai) Co., Ltd. The vulnerability stems from the lack of verification of the external input SQL statement in the parameter id of the file /user/inc/workidajax.php. An attacker can exploit this vulnerability to execute illegal SQL commands and steal sensitive data from the database
VAR-202312-0346 CVE-2023-6580 D-Link Systems, Inc.  of  DIR-846  Untrusted Data Deserialization Vulnerability in Firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability, which was classified as critical, was found in D-Link DIR-846 FW100A53DBR. This affects an unknown part of the file /HNAP1/ of the component QoS POST Handler. The manipulation of the argument smartqos_express_devices/smartqos_normal_devices leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247161 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. D-Link Systems, Inc. of DIR-846 An untrusted data deserialization vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-846 is a wireless router made by China D-Link Company. D-Link DIR-846 has a deserialization vulnerability. An attacker can exploit this vulnerability to cause code execution
VAR-202312-0480 CVE-2023-49411 Shenzhen Tenda Technology Co.,Ltd.  of  w30e  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda W30E V16.01.0.12(4843) contains a stack overflow vulnerability via the function formDeleteMeshNode. Shenzhen Tenda Technology Co.,Ltd. of w30e An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability is caused by the function formDeleteMeshNode failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service. attack
VAR-202312-0472 CVE-2023-49409 Shenzhen Tenda Technology Co.,Ltd.  of  AX3  Firmware vulnerabilities CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AX3 V16.03.12.11 was discovered to contain a Command Execution vulnerability via the function /goform/telnet. Shenzhen Tenda Technology Co.,Ltd. of AX3 There are unspecified vulnerabilities in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda Ax3 is an Ax1800 Gigabit port dual-band Wifi 6 wireless router from China's Tenda Company. The vulnerability is caused by the failure of the handler function of /goform/telnet to correctly filter special characters, commands, etc. in the constructed command
VAR-202312-0405 CVE-2023-49408 Shenzhen Tenda Technology Co.,Ltd.  of  AX3  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AX3 V16.03.12.11 was discovered to contain a stack overflow via the function set_device_name. Shenzhen Tenda Technology Co.,Ltd. of AX3 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda Ax3 is an Ax1800 Gigabit port dual-band Wifi 6 wireless router from China's Tenda Company. This vulnerability is caused by the function set_device_name failing to correctly verify the length of input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202312-0392 CVE-2023-49406 Shenzhen Tenda Technology Co.,Ltd.  of  w30e  Firmware vulnerabilities CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda W30E V16.01.0.12(4843) was discovered to contain a Command Execution vulnerability via the function /goform/telnet. Shenzhen Tenda Technology Co.,Ltd. of w30e There are unspecified vulnerabilities in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the failure of the handler function of /goform/telnet to correctly filter special characters, commands, etc. in the constructed command
VAR-202312-0391 CVE-2023-49405 Shenzhen Tenda Technology Co.,Ltd.  of  w30e  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function UploadCfg. Shenzhen Tenda Technology Co.,Ltd. of w30e An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability is caused by the function UploadCfg failing to correctly verify the length of the input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service. attack