VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202309-1522 CVE-2023-41029 Juplink  of  RX4-1500  Command injection vulnerability in firmware CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
Command injection vulnerability in the homemng.htm endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows authenticated remote attackers to execute commands as root via specially crafted HTTP requests to the vulnerable endpoint. Juplink of RX4-1500 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202309-1767 CVE-2023-43129 D-Link DIR-806 command execution vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection due to lax filtering of REMOTE_PORT parameters. D-Link DIR-806 is a wireless router made by China D-Link Company. D-Link DIR-806 has a command execution vulnerability. This vulnerability is caused by the failure of the REMOTE_PORT parameter to correctly filter special characters, commands, etc. in constructed commands. An attacker can use this vulnerability to execute arbitrary commands on the system
VAR-202309-1523 CVE-2023-41027 Juplink  of  RX4-1500  Firmware error message information disclosure vulnerability CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
Credential disclosure in the '/webs/userpasswd.htm' endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.4 and V1.0.5 allows an authenticated attacker to leak the password for the administrative account via requests to the vulnerable endpoint. Juplink of RX4-1500 Firmware contains an information disclosure vulnerability through an error message.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202309-1521 CVE-2023-41031 CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
Command injection in homemng.htm in Juplink RX4-1500 versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows remote authenticated attackers to execute commands via specially crafted requests to the vulnerable endpoint
VAR-202309-1119 CVE-2023-43130 CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection
VAR-202309-2445 CVE-2023-43128 D-Link Systems, Inc.  of  DIR-806  Command injection vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection due to lax filtering of HTTP_ST parameters. D-Link Systems, Inc. of DIR-806 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202309-2116 CVE-2023-43241 D-Link Systems, Inc.  of  DIR-823G  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-823G v1.0.2B05 was discovered to contain a stack overflow via parameter TXPower and GuardInt in SetWLanRadioSecurity. D-Link Systems, Inc. of DIR-823G An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202309-2442 CVE-2023-43240 D-Link Systems, Inc.  of  DIR-816 A2  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter sip_address in ipportFilter. D-Link Systems, Inc. of DIR-816 A2 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202309-1784 CVE-2023-43239 D-Link Systems, Inc.  of  DIR-816 A2  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter flag_5G in showMACfilterMAC. D-Link Systems, Inc. of DIR-816 A2 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202309-2527 CVE-2023-43238 D-Link Systems, Inc.  of  DIR-816 A2  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter nvmacaddr in form2Dhcpip.cgi. D-Link Systems, Inc. of DIR-816 A2 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202309-2274 CVE-2023-43237 D-Link Systems, Inc.  of  DIR-816 A2  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter macCloneMac in setMAC. D-Link Systems, Inc. of DIR-816 A2 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202309-2195 CVE-2023-43236 D-Link Systems, Inc.  of  DIR-816 A2  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter statuscheckpppoeuser in dir_setWanWifi. D-Link Systems, Inc. of DIR-816 A2 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202309-2275 CVE-2023-43235 D-Link Systems, Inc.  of  DIR-823G  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-823G v1.0.2B05 was discovered to contain a stack overflow via parameter StartTime and EndTime in SetWifiDownSettings. D-Link Systems, Inc. of DIR-823G An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202309-1870 CVE-2023-43135 TP-LINK Technologies  of  TL-ER5120G  Lack of Authentication Vulnerability in Firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
There is an unauthorized access vulnerability in TP-LINK ER5120G 4.0 2.0.0 Build 210817 Rel.80868n, which allows attackers to obtain sensitive information of the device without authentication, obtain user tokens, and ultimately log in to the device backend management. TP-LINK Technologies of TL-ER5120G A lack of authentication vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202309-1787 CVE-2023-43138 TP-LINK Technologies  of  TL-ER5120G  Command injection vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
TPLINK TL-ER5120G 4.0 2.0.0 Build 210817 Rel.80868n has a command injection vulnerability, when an attacker adds NAPT rules after authentication, and the rule name has an injection point. TP-LINK Technologies of TL-ER5120G Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202309-2529 CVE-2023-43137 TP-LINK Technologies  of  TL-ER5120G  Command injection vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
TPLINK TL-ER5120G 4.0 2.0.0 Build 210817 Rel.80868n has a command injection vulnerability, when an attacker adds ACL rules after authentication, and the rule name parameter has injection points. TP-LINK Technologies of TL-ER5120G Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK TL-ER5120G is a multi-WAN port Gigabit commercial router from China TP-LINK Company. TP-LINK TL-ER5120G has a command execution vulnerability. The vulnerability is due to the failure of the rule name to correctly filter special characters, commands, etc. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution
VAR-202309-2098 CVE-2023-2262 CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.
VAR-202309-2366 CVE-2023-43203 D-LINK DWL-6610 Buffer Overflow Vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-LINK DWL-6610 FW_v_4.3.0.8B003C was discovered to contain a stack overflow vulnerability in the function update_users. D-Link DWL-6610 is a wireless access point from China D-Link Company. This vulnerability is caused by the failure to correctly verify the length of input data in the function update_users. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202309-2381 CVE-2023-41030 Juplink  of  RX4-1500  Vulnerability related to use of hardcoded credentials in firmware CVSS V2: 5.8
CVSS V3: 6.3
Severity: MEDIUM
Hard-coded credentials in Juplink RX4-1500 versions V1.0.2 through V1.0.5 allow unauthenticated attackers to log in to the web interface or telnet service as the 'user' user. Juplink of RX4-1500 A vulnerability exists in the firmware regarding the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202309-0777 CVE-2023-42320 Shenzhen Tenda Technology Co.,Ltd.  of  AC10  Classic buffer overflow vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Buffer Overflow vulnerability in Tenda AC10V4 v.US_AC10V4.0si_V16.03.10.13_cn_TDC01 allows a remote attacker to cause a denial of service via the mac parameter in the GetParentControlInfo function. Shenzhen Tenda Technology Co.,Ltd. of AC10 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state