Search Results (323850 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-11924 1 Wizconnected 2 Colors A60, Colors A60 Firmware 2024-11-21 5.5 Medium
An issue was discovered in WiZ Colors A60 1.14.0. Wi-Fi credentials are stored in cleartext in flash memory, which presents an information-disclosure risk for a discarded or resold device.
CVE-2020-11923 1 Wizconnected 1 Wiz 2024-11-21 5.5 Medium
An issue was discovered in WiZ Colors A60 1.14.0. API credentials are locally logged.
CVE-2020-11922 1 Wizconnected 2 A60 Colors, A60 Colors Firmware 2024-11-21 4.3 Medium
An issue was discovered in WiZ Colors A60 1.14.0. The device sends unnecessary information to the cloud controller server. Although this information is sent encrypted and has low risk in isolation, it decreases the privacy of the end user. The information sent includes the local IP address being used and the SSID of the Wi-Fi network the device is connected to. (Various resources such as wigle.net can be use for mapping of SSIDs to physical locations.)
CVE-2020-11920 1 Svakom 3 Siime Eye, Siime Eye Firmware, Svakom Siime Eye 2024-11-21 9.8 Critical
An issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. A command injection vulnerability resides in the HOST/IP section of the NFS settings menu in the webserver running on the device. By injecting Bash commands via shell metacharacters here, the device executes arbitrary code with root privileges (all of the device's services are running as root).
CVE-2020-11915 1 Svakom 3 Siime Eye, Siime Eye Firmware, Svakom Siime Eye Firmware 2024-11-21 6.8 Medium
An issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. By sending a set_params.cgi?telnetd=1&save=1&reboot=1 request to the webserver, it is possible to enable the telnet interface on the device. The telnet interface can then be used to obtain access to the device with root privileges via a reecam4debug default password. This default telnet password is the same across all Siime Eye devices. In order for the attack to be exploited, an attacker must be physically close in order to connect to the device's Wi-Fi access point.
CVE-2020-11914 1 Treck 1 Tcp\/ip 2024-11-21 4.3 Medium
The Treck TCP/IP stack before 6.0.1.66 has an ARP Out-of-bounds Read.
CVE-2020-11913 1 Treck 1 Tcp\/ip 2024-11-21 5.3 Medium
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
CVE-2020-11912 1 Treck 1 Tcp\/ip 2024-11-21 5.3 Medium
The Treck TCP/IP stack before 6.0.1.66 has a TCP Out-of-bounds Read.
CVE-2020-11911 1 Treck 1 Tcp\/ip 2024-11-21 5.3 Medium
The Treck TCP/IP stack before 6.0.1.66 has Improper ICMPv4 Access Control.
CVE-2020-11908 1 Treck 1 Tcp\/ip 2024-11-21 4.3 Medium
The Treck TCP/IP stack before 4.7.1.27 mishandles '\0' termination in DHCP.
CVE-2020-11907 1 Treck 1 Tcp\/ip 2024-11-21 6.3 Medium
The Treck TCP/IP stack before 6.0.1.66 improperly handles a Length Parameter Inconsistency in TCP.
CVE-2020-11906 1 Treck 1 Tcp\/ip 2024-11-21 6.3 Medium
The Treck TCP/IP stack before 6.0.1.66 has an Ethernet Link Layer Integer Underflow.
CVE-2020-11905 1 Treck 1 Tcp\/ip 2024-11-21 6.5 Medium
The Treck TCP/IP stack before 6.0.1.66 has a DHCPv6 Out-of-bounds Read.
CVE-2020-11903 1 Treck 1 Tcp\/ip 2024-11-21 6.5 Medium
The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.
CVE-2020-11902 1 Treck 1 Tcp\/ip 2024-11-21 7.3 High
The Treck TCP/IP stack before 6.0.1.66 has an IPv6OverIPv4 tunneling Out-of-bounds Read.
CVE-2020-11901 1 Treck 1 Tcp\/ip 2024-11-21 9.0 Critical
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.
CVE-2020-11900 1 Treck 1 Tcp\/ip 2024-11-21 8.2 High
The Treck TCP/IP stack before 6.0.1.41 has an IPv4 tunneling Double Free.
CVE-2020-11898 1 Treck 1 Tcp\/ip 2024-11-21 9.1 Critical
The Treck TCP/IP stack before 6.0.1.66 improperly handles an IPv4/ICMPv4 Length Parameter Inconsistency, which might allow remote attackers to trigger an information leak.
CVE-2020-11897 1 Treck 1 Tcp\/ip 2024-11-21 10.0 Critical
The Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets.
CVE-2020-11896 1 Treck 1 Tcp\/ip 2024-11-21 10.0 Critical
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.