VARIoT IoT vulnerabilities database

VAR-202504-2258 | No CVE | Topsec Technology Group Co., Ltd. Internet Behavior Management System has a command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Topsec Technology Group Co., Ltd. is a high-tech enterprise focusing on network security and cloud computing solutions.
Topsec Technology Group Co., Ltd.'s Internet behavior management system has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202504-1213 | CVE-2025-3786 | Shenzhen Tenda Technology Co.,Ltd. of AC15 Classic buffer overflow vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in Tenda AC15 up to 15.03.05.19 and classified as critical. This issue affects the function fromSetWirelessRepeat of the file /goform/WifiExtraSet. The manipulation of the argument mac leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of AC15 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-1580 | CVE-2025-2492 | ASUS AiCloud Improper Authentication Control Vulnerability |
CVSS V2: 9.7 CVSS V3: - Severity: Critical |
An improper authentication control vulnerability exists in AiCloud. This vulnerability can be triggered by a crafted request, potentially leading to unauthorized execution of functions.
Refer to the 'ASUS Router AiCloud vulnerability' section on the ASUS Security Advisory for more information. AiCloud is a cloud service launched by ASUS, which aims to provide easy access to data in devices connected to the router, such as USB or PC, and provides functions such as uploading, downloading, online music playback, online document browsing, sharing links to Facebook, and setting Smart Sync cloud synchronization
VAR-202504-1378 | CVE-2025-25455 | Shenzhen Tenda Technology Co.,Ltd. of AC10 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via wanMTU2. Shenzhen Tenda Technology Co.,Ltd. of AC10 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. Tenda AC10 is a home wireless router that provides stable and fast network connection. The vulnerability is caused by the fact that the AdvSetMacMtuWan function does not effectively check the input data length when processing the wanMTU2 parameter. No detailed vulnerability details are currently provided
VAR-202504-2585 | CVE-2025-25454 | Shenzhen Tenda Technology Co.,Ltd. of AC10 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via wanSpeed2. Shenzhen Tenda Technology Co.,Ltd. of AC10 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state
VAR-202504-2202 | CVE-2025-25457 | Shenzhen Tenda Technology Co.,Ltd. of AC10 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via cloneType2. Shenzhen Tenda Technology Co.,Ltd. of AC10 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state
VAR-202504-3156 | CVE-2025-29044 | of netgear R6100 Classic buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Buffer Overflow vulnerability in Netgear- R61 router V1.0.1.28 allows a remote attacker to execute arbitrary code via the QUERY_STRING key value. of netgear R6100 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-1969 | CVE-2025-29649 | TP-LINK Technologies of TL-WR840N in the firmware SQL Injection vulnerability |
CVSS V2: - CVSS V3: 7.3 Severity: HIGH |
SQL Injection vulnerability exists in the TP-Link TL-WR840N router s login dashboard (version 1.0), allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing. TP-LINK Technologies of TL-WR840N The firmware has SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-1089 | CVE-2025-32871 | Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08363) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'MigrateDatabase' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany
VAR-202504-1098 | CVE-2025-32870 | Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08365) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetTraces' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany
VAR-202504-1119 | CVE-2025-32869 | Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08364) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'ImportCertificate' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany
VAR-202504-1088 | CVE-2025-32868 | Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08366) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'ExportCertificate' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany
VAR-202504-1137 | CVE-2025-32867 | Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08368) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'CreateBackup' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany
VAR-202504-1114 | CVE-2025-32866 | Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08367) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetLogs' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany
VAR-202504-1117 | CVE-2025-32865 | Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08370) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'CreateLog' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany
VAR-202504-1076 | CVE-2025-32864 | Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08369) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany
VAR-202504-1136 | CVE-2025-32863 | Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08371) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockTraceLevelSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany
VAR-202504-1112 | CVE-2025-32862 | Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08373) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockTraceLevelSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany
VAR-202504-1109 | CVE-2025-32861 | Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08372) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateTraceLevelSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany
VAR-202504-1133 | CVE-2025-32860 | Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08591) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockWebServerGatewaySettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany