VARIoT IoT vulnerabilities database
| VAR-202601-2333 | CVE-2026-0975 | Delta Electronics, INC. of DIAView Command injection vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Delta Electronics DIAView has Command Injection vulnerability. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DIAView. User interaction is required to exploit this vulnerability in that the target must open and run a malicious project.The specific flaw exists within the DIAView script component. The issue results from the lack of restrictions on script in DIAView projects. An attacker can leverage this vulnerability to execute code in the context of the current process
| VAR-202601-2403 | CVE-2025-62582 | Delta Electronics, INC. of DIAView Vulnerability regarding lack of authentication for critical features in |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Delta Electronics DIAView has multiple vulnerabilities. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-2377 | CVE-2025-62581 | Delta Electronics, INC. of DIAView Vulnerability related to the use of hard-coded encryption keys in |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Delta Electronics DIAView has multiple vulnerabilities. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-4272 | CVE-2025-9014 | TP-LINK Technologies of TL-WR841N Multiple vulnerabilities in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
A Null Pointer Dereference vulnerability exists in the referer header check of the web portal of TP-Link TL-WR841N v14, caused by improper input validation. A remote, unauthenticated attacker can exploit this flaw and cause Denial of Service on the web portal service.This issue affects TL-WR841N v14: before 250908. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-1135 | CVE-2025-67685 | fortinet's FortiSandbox Server-side request forgery vulnerability in |
CVSS V2: - CVSS V3: 3.8 Severity: LOW |
A Server-Side Request Forgery (SSRF) vulnerability [CWE-918] vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.4, FortiSandbox 4.4 all versions, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions may allow an authenticated attacker to proxy internal requests limited to plaintext endpoints only via crafted HTTP requests. Also, some of the information handled by the software may be rewritten. Furthermore, the software will not stop. Furthermore, attacks that exploit this vulnerability will not affect other software. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Fortinet FortiSandbox. Authentication is required to exploit this vulnerability.The specific flaw exists within the handling of web sockets. The issue results from the lack of proper validation of a URI prior to accessing resources. An attacker can leverage this vulnerability to execute code in the context of the current process
| VAR-202601-0734 | CVE-2025-58693 | fortinet's FortiVoice Past traversal vulnerability in |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiVoice 7.2.0 through 7.2.2, FortiVoice 7.0.0 through 7.0.7 allows a privileged attacker to delete files from the underlying filesystem via crafted HTTP or HTTPs requests. However, all information handled by the software may be rewritten. Furthermore, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability do not affect other software
| VAR-202601-1483 | CVE-2026-0405 | of netgear CBR750 Authentication vulnerabilities in multiple products, including firmware |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
An authentication bypass vulnerability in NETGEAR Orbi devices allows
users connected to the local network to access the router web interface
as an admin. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-2770 | CVE-2026-0404 | of netgear RBR750 Vulnerabilities related to input validation in multiple products, such as firmware |
CVSS V2: - CVSS V3: 8.0 Severity: HIGH |
An insufficient input validation vulnerability in NETGEAR Orbi devices'
DHCPv6 functionality allows network adjacent attackers authenticated
over WiFi or on LAN to execute OS command injections on the router.
DHCPv6 is not enabled by default. DHCPv6 is disabled by default.All information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-1875 | CVE-2026-0403 | of netgear RBE970 FIRMWARE Vulnerabilities related to input confirmation in multiple products such as |
CVSS V2: - CVSS V3: 8.0 Severity: HIGH |
An insufficient input validation vulnerability in NETGEAR Orbi routers
allows attackers connected to the router's LAN to execute OS command
injections. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-1302 | CVE-2025-71027 | Shenzhen Tenda Technology Co.,Ltd. of AX3 Multiple vulnerabilities in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the wanMTU2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. DoS ) attacks.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-0482 | CVE-2025-71026 | Shenzhen Tenda Technology Co.,Ltd. of AX3 Multiple vulnerabilities in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the wanSpeed2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. DoS ) may cause attacks.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-1882 | CVE-2025-71025 | Shenzhen Tenda Technology Co.,Ltd. of AX3 Multiple vulnerabilities in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the cloneType2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. DoS ) may cause attacks.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-1487 | CVE-2025-71024 | Shenzhen Tenda Technology Co.,Ltd. of AX3 Multiple vulnerabilities in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the serviceName2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. DoS ) attacks.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-0689 | CVE-2025-71023 | Shenzhen Tenda Technology Co.,Ltd. of AX3 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the mac2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. DoS ) attacks.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-0370 | CVE-2025-40942 | Siemens' telecontrol server basic Unnecessary Privileged Execution Vulnerability in |
CVSS V2: - CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.4). Affected application contains a local privilege escalation vulnerability that could allow an attacker to run arbitrary code with elevated privileges. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-1872 | CVE-2026-0513 | SAP of SAP Supplier Relationship Management Open redirect vulnerability in |
CVSS V2: - CVSS V3: 4.7 Severity: MEDIUM |
Due to an Open Redirect Vulnerability in SAP Supplier Relationship Management (SICF Handler in SRM Catalog), an unauthenticated attacker could craft a malicious URL that, if accessed by a victim, redirects them to an attacker-controlled site.This causes low impact on integrity of the application. Confidentiality and availability are not impacted. This vulnerability has a low impact on the integrity of the application, but does not affect confidentiality or availability.Information handled by the software will not be leaked to the outside. However, some of the information handled by the software may be rewritten. Furthermore, the software will not stop. Furthermore, attacks exploiting this vulnerability may affect other software
| VAR-202601-1992 | CVE-2025-29329 | Sagemcom of F@ST 3686 Firmware Classic buffer overflow vulnerability in |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Buffer Overflow in the ippprint (Internet Printing Protocol) service in Sagemcom F@st 3686 MAGYAR_4.121.0 allows remote attacker to execute arbitrary code by sending a crafted HTTP request. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-3748 | CVE-2025-70161 | EDIMAX Technology of BR-6208AC Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because the pppUserName field is directly passed to a shell command via the system() function without proper sanitization. An attacker can exploit this by injecting malicious commands into the pppUserName field, allowing arbitrary code execution. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-2351 | CVE-2026-20976 | Samsung's Galaxy Store Unspecified vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Improper input validation in Galaxy Store prior to version 4.6.02 allows local attacker to execute arbitrary script. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-0196 | CVE-2026-0640 | Shenzhen Tenda Technology Co.,Ltd. of ac23 Multiple vulnerabilities in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A weakness has been identified in Tenda AC23 16.03.07.52. This affects the function sscanf of the file /goform/PowerSaveSet. Executing a manipulation of the argument Time can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. Tenda AC23 16.03.07.52 The vulnerability was discovered in the file /goform/PowerSaveSet function of sscanf Affects the argument Time The following operation can cause a buffer overflow. Exploits are publicly available and may be used in attacks.All information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, the software may stop working completely