VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202511-0262 CVE-2025-13189 D-Link DIR-816L buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been found in D-Link DIR-816L 2_06_b09_beta. This affects the function genacgi_main of the file gena.cgi. The manipulation of the argument SERVER_ID/HTTP_SID leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. The DIR-816L is a wireless router device from D-Link. An attacker could exploit this vulnerability to remotely manipulate the parameters, triggering a stack overflow that could then execute arbitrary code or cause service crashes
VAR-202511-0038 CVE-2025-13188 CVSS V2: 10.0
CVSS V3: 9.8
Severity: High
A vulnerability was detected in D-Link DIR-816L 2_06_b09_beta. Affected by this vulnerability is the function authenticationcgi_main of the file /authentication.cgi. Performing manipulation of the argument Password results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
VAR-202511-0869 CVE-2025-60702 TOTOLINK A950RG Command Injection Vulnerability CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
A command injection vulnerability exists in the TOTOLINK A950RG Router firmware V5.9c.4592_B20191022_ALL within the `system.so` binary. The `setDiagnosisCfg` function retrieves the `ipDoamin` parameter from user input via `websGetVar` and concatenates it directly into a `ping` system command executed via `CsteSystem()` without any sanitization. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device through specially crafted HTTP requests to the router's web interface. The TOTOLINK A950RG is a next-generation Gigabit wireless router launched by TOTOLINK, a Chinese electronics company, supporting high-speed network connectivity and multi-device management. This vulnerability stems from the system.so binary file's failure to properly filter special characters and commands used in command construction. Detailed vulnerability information is currently unavailable
VAR-202511-1198 CVE-2025-60699 TOTOLINK  of  a950rg  Stack-based buffer overflow vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
A buffer overflow vulnerability exists in the TOTOLINK A950RG Router firmware V5.9c.4592_B20191022_ALL within the `global.so` binary. The `getSaveConfig` function retrieves the `http_host` parameter from user input via `websGetVar` and copies it into a fixed-size stack buffer (`v13`) using `strcpy()` without performing any length checks. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted HTTP request to the router's web interface, potentially leading to arbitrary code execution. The TOTOLINK A950RG is a next-generation Gigabit wireless router launched by TOTOLINK, a Chinese electronics company, supporting high-speed network connectivity and multi-device management. This vulnerability stems from a failure to properly validate the length of input data in the global.so binary file. Detailed vulnerability information is currently unavailable
VAR-202511-1177 CVE-2025-60679 D-Link Corporation  of  DIR-816  Stack-based buffer overflow vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
A stack buffer overflow vulnerability exists in the D-Link DIR-816A2 router firmware DIR-816A2_FWv1.10CNB05_R1B011D88210.img in the upload.cgi module, which handles firmware version information. The vulnerability occurs because /proc/version is read into a 512-byte buffer and then concatenated using sprintf() into another 512-byte buffer containing a 29-byte constant. Input exceeding 481 bytes triggers a stack buffer overflow, allowing an attacker who can control /proc/version content to potentially execute arbitrary code on the device. (DoS) It may be in a state
VAR-202511-2179 CVE-2025-46370 Dell's  Alienware Command Center  Process control vulnerabilities in CVSS V2: -
CVSS V3: 3.3
Severity: LOW
Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contain a Process Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information Disclosure
VAR-202511-1342 CVE-2025-46369 Dell's  Alienware Command Center  Insecure Temporary File Vulnerability in CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contains an Insecure Temporary File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Privilege Escalation. (DoS) It may be in a state
VAR-202511-1650 CVE-2025-46368 CVSS V2: -
CVSS V3: 6.6
Severity: MEDIUM
Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contains an Insecure Temporary File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information tampering.
VAR-202511-0579 CVE-2025-46367 Dell's  Alienware Command Center  Vulnerability in detecting errors without error handling CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contain a Detection of Error Condition Without Action vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Arbitrary Code Execution. (DoS) It may be in a state
VAR-202511-0413 CVE-2025-46362 Dell's  Alienware Command Center  access control vulnerabilities in CVSS V2: -
CVSS V3: 6.6
Severity: MEDIUM
Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contain an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information Tampering
VAR-202511-1037 CVE-2025-60676 CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetNetworkSettings' functionality of prog.cgi, where the 'IPAddress' and 'SubnetMask' parameters are directly concatenated into shell commands executed via system(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.
VAR-202511-1190 CVE-2025-60675 D-Link Corporation  of  DIR-823G  Command injection vulnerability in firmware CVSS V2: 5.5
CVSS V3: 5.4
Severity: MEDIUM
A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /tmp/new_qos.rule configuration file. The vulnerability occurs because parsed fields from the configuration file are concatenated into command strings and executed via system() without any sanitization. An attacker with write access to /tmp/new_qos.rule can execute arbitrary commands on the device. D-Link Corporation of DIR-823G Firmware contains a command injection vulnerability.Information may be obtained and information may be tampered with. The D-Link DIR-823G is a wireless router manufactured by D-Link, a Chinese company
VAR-202511-1189 CVE-2025-60674 D-Link Corporation  of  DIR-878  Stack-based buffer overflow vulnerability in firmware CVSS V2: -
CVSS V3: 6.8
Severity: MEDIUM
A stack buffer overflow vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin in the rc binary's USB storage handling module. The vulnerability occurs when the "Serial Number" field from a USB device is read via sscanf into a 64-byte stack buffer, while fgets reads up to 127 bytes, causing a stack overflow. An attacker with physical access or control over a USB device can exploit this vulnerability to potentially execute arbitrary code on the device. D-Link Corporation of DIR-878 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202511-1325 CVE-2025-60673 D-Link Corporation  of  DIR-878  Command injection vulnerability in firmware CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDMZSettings' functionality, where the 'IPAddress' parameter in prog.cgi is stored in NVRAM and later used by librcm.so to construct iptables commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device
VAR-202511-0385 CVE-2025-60672 D-Link Corporation  of  DIR-878  Command injection vulnerability in firmware CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDynamicDNSSettings' functionality, where the 'ServerAddress' and 'Hostname' parameters in prog.cgi are stored in NVRAM and later used by rc to construct system commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device
VAR-202511-1191 CVE-2025-60701 D-Link Corporation  of  DIR-882  Command injection vulnerability in firmware CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog.cgi` and `rc` binaries. The `sub_433188` function in `prog.cgi` stores user-supplied email configuration parameters (`EmailFrom`, `EmailTo`, `SMTPServerAddress`, `SMTPServerPort`, `AccountName`) in NVRAM via `nvram_safe_set`. These values are later retrieved in the `sub_448FDC` function of `rc` using `nvram_safe_get` and concatenated into shell commands executed via `twsystem()` without sanitization. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device through specially crafted HTTP requests to the router's web interface
VAR-202511-0547 CVE-2025-60700 CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog.cgi` and `librcm.so` binaries. The `sub_4455BC` function in `prog.cgi` stores user-supplied `SetDMZSettings/IPAddress` values in NVRAM via `nvram_safe_set("dmz_ipaddr", ...)`. These values are later retrieved in the `DMZ_run` function of `librcm.so` using `nvram_safe_get` and concatenated into `iptables` shell commands executed via `twsystem()` without any sanitization. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device through specially crafted HTTP requests to the router's web interface.
VAR-202511-1035 CVE-2025-60698 D-Link Corporation  of  DIR-882  Command injection vulnerability in firmware CVSS V2: -
CVSS V3: 7.3
Severity: HIGH
A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog.cgi` and `rc` binaries. The `sub_432F60` function in `prog.cgi` stores user-supplied `SetSysLogSettings/IPAddress` values in NVRAM via `nvram_safe_set("SysLogRemote_IPAddress", ...)`. These values are later retrieved in the `sub_448DCC` function of `rc` using `nvram_safe_get` and concatenated into a shell command executed via `twsystem()` without any sanitization. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device through specially crafted HTTP requests to the router's web interface. D-Link Corporation of DIR-882 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202511-1433 CVE-2025-60697 CVSS V2: -
CVSS V3: 7.3
Severity: HIGH
A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog.cgi` and `rc` binaries. The `sub_4438A4` function in `prog.cgi` stores user-supplied DDNS parameters (`ServerAddress` and `Hostname`) in NVRAM via `nvram_safe_set`. These values are later retrieved in the `start_DDNS_ipv4` function of `rc` using `nvram_safe_get` and concatenated into DDNS shell commands executed via `twsystem()` without proper sanitization. Partial string comparison is performed but is insufficient to prevent command injection. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device through specially crafted HTTP requests to the router's web interface.
VAR-202511-0870 CVE-2025-60693 CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
A stack-based buffer overflow exists in the get_merge_mac function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to six user-supplied CGI parameters matching <parameter>_0~5 into a fixed-size buffer (a2) without proper bounds checking, appending colon delimiters during concatenation. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service without authentication.