IoT vulnerabilities

Showing 1 - 26 of 26 CVEs

  1. CVE-2026-24061 Published Jan 21, 2026

    telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

  2. CVE-2025-15047 Published Dec 23, 2025

    A vulnerability was found in Tenda WH450 1.0.0.18. This affects an unknown function of the file /goform/PPTPDClient of the component HTTP Request Handler. Performing a manipulation of the argument Username results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used.

  3. CVE-2025-2189 Published Mar 11, 2025

    This vulnerability exists in the Tinxy smart devices due to storage of credentials in plaintext within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the plaintext credentials stored on the vulnerable device.

  4. CVE-2024-9991 Published Oct 25, 2024

    This vulnerability exists in Philips lighting devices due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the plaintext Wi-Fi credentials stored on the vulnerable device. Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to the Wi-Fi network to which vulnerable device is connected.

  5. CVE-2024-7029 Published Aug 2, 2024

    Commands can be injected over the network and executed without authentication.

  6. CVE-2024-21887 Published Jan 12, 2024

    A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

  7. CVE-2023-46805 Published Jan 12, 2024

    An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.

  8. CVE-2023-1748 Published Apr 4, 2023

    The listed versions of Nexx Smart Home devices use hard-coded credentials. An attacker with unauthenticated access to the Nexx Home mobile application or the affected firmware could view the credentials and access the MQ Telemetry Server (MQTT) server and the ability to remotely control garage doors or smart plugs for any customer.

  9. CVE-2022-37055 Published Aug 28, 2022

    D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Buffer Overflow via cgibin, hnap_main,

  10. CVE-2020-15858 Published Aug 21, 2020

    Some devices of Thales DIS (formerly Gemalto, formerly Cinterion) allow Directory Traversal by physically proximate attackers. The directory path access check of the internal flash file system can be circumvented. This flash file system can store application-specific data and data needed for customer Java applications, TLS and OTAP (Java over-the-air-provisioning) functionality. The affected products and releases are: BGS5 up to and including SW RN 02.000 / ARN 01.001.06 EHSx and PDSx up to and including SW RN 04.003 / ARN 01.000.04 ELS61 up to and including SW RN 02.002 / ARN 01.000.04 ELS81 up to and including SW RN 05.002 / ARN 01.000.04 PLS62 up to and including SW RN 02.000 / ARN 01.000.04

  11. CVE-2020-10987 Published Jul 13, 2020

    The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.

  12. CVE-2020-5902 Published Jul 1, 2020

    In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.

  13. CVE-2020-11907 Published Jun 17, 2020

    The Treck TCP/IP stack before 6.0.1.66 improperly handles a Length Parameter Inconsistency in TCP.

  14. CVE-2020-11906 Published Jun 17, 2020

    The Treck TCP/IP stack before 6.0.1.66 has an Ethernet Link Layer Integer Underflow.

  15. CVE-2020-11905 Published Jun 17, 2020

    The Treck TCP/IP stack before 6.0.1.66 has a DHCPv6 Out-of-bounds Read.

  16. CVE-2020-11904 Published Jun 17, 2020

    The Treck TCP/IP stack before 6.0.1.66 has an Integer Overflow during Memory Allocation that causes an Out-of-Bounds Write.

  17. CVE-2020-11903 Published Jun 17, 2020

    The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.

  18. CVE-2020-11902 Published Jun 17, 2020

    The Treck TCP/IP stack before 6.0.1.66 has an IPv6OverIPv4 tunneling Out-of-bounds Read.

  19. CVE-2020-11901 Published Jun 17, 2020

    The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.

  20. CVE-2020-11900 Published Jun 17, 2020

    The Treck TCP/IP stack before 6.0.1.41 has an IPv4 tunneling Double Free.

  21. CVE-2020-11899 Published Jun 17, 2020

    The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.

  22. CVE-2020-11898 Published Jun 17, 2020

    The Treck TCP/IP stack before 6.0.1.66 improperly handles an IPv4/ICMPv4 Length Parameter Inconsistency, which might allow remote attackers to trigger an information leak.

  23. CVE-2020-11897 Published Jun 17, 2020

    The Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets.

  24. CVE-2020-11896 Published Jun 17, 2020

    The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.

  25. CVE-2020-10173 Published Mar 5, 2020

    Comtrend VR-3033 DE11-416SSG-C01_R02.A2pvI042j1.d26m devices have Multiple Authenticated Command Injection vulnerabilities via the ping and traceroute diagnostic pages, as demonstrated by shell metacharacters in the pingIpAddress parameter to ping.cgi.

  26. CVE-2020-4207 Published Jan 28, 2020

    IBM Watson IoT Message Gateway 2.0.0.x, 5.0.0.0, 5.0.0.1, and 5.0.0.2 is vulnerable to a buffer overflow, caused by improper bounds checking when handling a failed HTTP request with specific content in the headers. By sending a specially crafted HTTP request, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause a denial of service. IBM X-Force ID: 174972.