VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202309-0028 CVE-2023-36187 Classic buffer overflow vulnerability in multiple Netgear products CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Buffer Overflow vulnerability in NETGEAR R6400v2 before version 1.0.4.118, allows remote unauthenticated attackers to execute arbitrary code via crafted URL to httpd. CBR40 firmware, LAX20 firmware, MK62 A classic buffer overflow vulnerability exists in multiple Netgear products, including firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202308-3626 CVE-2023-4299 Digi International  Made  RealPort Protocol  Authentication vulnerability using password hashes instead of passwords in CVSS V2: -
CVSS V3: 8.1
Severity: HIGH
Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment. Digi International Provided by Digi RealPort Protocol The following vulnerabilities exist in. It was * Authentication using password hashes instead of passwords (CWE-836) - CVE-2023-4299If the vulnerability is exploited, it may be affected as follows. It was * Authentication is bypassed and connected devices are accessed by a remote third party
VAR-202308-3520 CVE-2023-41184 TP-Link Tapo C210 ActiveCells Stack-based Buffer Overflow Remote Code Execution Vulnerability CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
TP-Link Tapo C210 ActiveCells Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Tapo C210 IP cameras. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the ActiveCells parameter of the CreateRules and ModifyRules APIs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20589. TP-LINK Tapo C210 is a network camera device from China's TP-LINK company
VAR-202308-4133 CVE-2023-40837 Tenda AC6 sub_ADD50 function command execution vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin function 'sub_ADD50' contains a command execution vulnerability. In the "formSetIptv" function, obtaining the "list" and "vlanId" fields, unfiltered passing these two fields as parameters to the "sub_ADD50" function to execute commands. Tenda AC6 is a wireless router made by China Tenda Company. The vulnerability is caused by the failure of the sub_ADD50 function to correctly filter special characters, commands, etc. in the constructed command
VAR-202308-3841 CVE-2023-41563 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  firmware and  AC5  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC9 V3.0 V15.03.06.42_multi and Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter mac at url /goform/GetParentControlInfo. Shenzhen Tenda Technology Co.,Ltd. of AC9 firmware and AC5 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202308-4199 CVE-2023-41562 plural  Shenzhen Tenda Technology Co.,Ltd.  Out-of-bounds write vulnerabilities in the product CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC7 V1.0 V15.03.06.44, Tenda AC9 V3.0 V15.03.06.42_multi, and Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter time at url /goform/PowerSaveSet. Shenzhen Tenda Technology Co.,Ltd. of AC9 firmware, AC7 firmware, AC5 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202308-3957 CVE-2023-41561 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  firmware and  AC5  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC9 V3.0 V15.03.06.42_multi and Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter startIp and endIp at url /goform/SetPptpServerCfg. Shenzhen Tenda Technology Co.,Ltd. of AC9 firmware and AC5 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202308-4129 CVE-2023-41560 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC9 V3.0 V15.03.06.42_multi was discovered to contain a stack overflow via parameter firewallEn at url /goform/SetFirewallCfg. Shenzhen Tenda Technology Co.,Ltd. of AC9 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202308-4265 CVE-2023-41559 plural  Shenzhen Tenda Technology Co.,Ltd.  Out-of-bounds write vulnerabilities in the product CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC7 V1.0 V15.03.06.44, Tenda AC9 V3.0 V15.03.06.42_multi, and Tenda AC5 V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter page at url /goform/NatStaticSetting. Shenzhen Tenda Technology Co.,Ltd. of AC9 firmware, AC7 firmware, AC5 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202308-4017 CVE-2023-41556 plural  Shenzhen Tenda Technology Co.,Ltd.  Out-of-bounds write vulnerabilities in the product CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC7 V1.0 V15.03.06.44, Tenda AC9 V3.0 V15.03.06.42_multi, and Tenda AC5 V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter list at url /goform/SetIpMacBind. Shenzhen Tenda Technology Co.,Ltd. of AC9 firmware, AC7 firmware, AC5 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202308-3842 CVE-2023-41554 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC9 V3.0 V15.03.06.42_multi was discovered to contain a stack overflow via parameter wpapsk_crypto at url /goform/WifiExtraSet. Shenzhen Tenda Technology Co.,Ltd. of AC9 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202308-4200 CVE-2023-41553 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  firmware and  AC5  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC9 V3.0 V15.03.06.42_multi and Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter list at url /goform/SetStaticRouteCfg. Shenzhen Tenda Technology Co.,Ltd. of AC9 firmware and AC5 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202308-3958 CVE-2023-41552 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  firmware and  AC7  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC7 V1.0 V15.03.06.44 and Tenda AC9 V3.0 V15.03.06.42_multi were discovered to contain a stack overflow via parameter ssid at url /goform/fast_setting_wifi_set. Shenzhen Tenda Technology Co.,Ltd. of AC9 firmware and AC7 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202308-3695 CVE-2023-41557 Shenzhen Tenda Technology Co.,Ltd.  of  AC7  firmware and  AC5  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC7 V1.0 V15.03.06.44 and Tenda AC5 V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter entrys and mitInterface at url /goform/addressNat. Shenzhen Tenda Technology Co.,Ltd. of AC7 firmware and AC5 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202308-3502 CVE-2023-41182 of netgear  ProSAFE Network Management System  Past traversal vulnerability in CVSS V2: 8.3
CVSS V3: 7.2
Severity: HIGH
NETGEAR ProSAFE Network Management System ZipUtils Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ZipUtils class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-19716. (DoS) It may be in a state
VAR-202308-3671 CVE-2023-40846 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function sub_90998. Shenzhen Tenda Technology Co.,Ltd. of AC6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability is caused by the failure of function sub_90998 to correctly verify the length of input data. A remote attacker can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202308-3761 No CVE Several products of Beijing StarNet Ruijie Network Technology Co., Ltd. have command execution vulnerabilities (CNVD-2023-68249) CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Beijing Xingwang Ruijie Network Technology Co., Ltd. is an ICT infrastructure and industry solution provider. Several products of Beijing Xingwang Ruijie Network Technology Co., Ltd. have command execution vulnerabilities that attackers can use to gain server permissions.
VAR-202308-4325 No CVE There is a binary vulnerability in H3C-R230 of H3C Technology Co., Ltd. CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
H3C R230 is a home wireless router. There is a binary vulnerability in H3C-R230 of H3C Technology Co., Ltd., which can be used by attackers to trigger stack overflow.
VAR-202308-4313 No CVE Buffer overflow vulnerability exists in H3C B6 of H3C Technology Co., Ltd. CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
H3C B6 Gigabit dual-band router is a newly designed Wi-Fi 6 home wireless smart router by H3C Intelligent Terminal Co., Ltd. H3C B6 of New H3C Technology Co., Ltd. has a buffer overflow vulnerability. An attacker can use the vulnerability to trigger a stack overflow.
VAR-202308-3583 CVE-2023-40798 Shenzhen Tenda Technology Co.,Ltd.  of  ac23  Firmware Input Validation Vulnerability CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
In Tenda AC23 v16.03.07.45_cn, the formSetIPv6status and formGetWanParameter functions do not authenticate user input parameters, resulting in a post-authentication stack overflow vulnerability. Shenzhen Tenda Technology Co.,Ltd. of ac23 There is an input validation vulnerability in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state