VARIoT IoT vulnerabilities database
| VAR-202510-4098 | CVE-2025-12476 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 information disclosure vulnerabilities (CNVD-2025-29078) |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Resource Lacking AuthN.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a security vulnerability stemming from a lack of authentication. Attackers could exploit this vulnerability to obtain sensitive information
| VAR-202510-4200 | CVE-2025-12425 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 privilege escalation vulnerabilities |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
Local Privilege Escalation.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a privilege escalation vulnerability caused by improper privilege management. An attacker could exploit this vulnerability to achieve local privilege escalation
| VAR-202510-3388 | CVE-2025-12424 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 privilege escalation vulnerabilities (CNVD-2025-29084) |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Privilege Escalation through SUID-bit Binary.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a privilege escalation vulnerability caused by improper privilege management in the SUID bit binary. An attacker could exploit this vulnerability to gain elevated privileges on the system
| VAR-202510-3902 | CVE-2025-12423 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 Denial-of-Service Vulnerabilities (CNVD-2025-29082) |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Protocol manipulation might lead to denial of service.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a denial-of-service vulnerability caused by an uncaught exception during protocol operation. An attacker could exploit this vulnerability to cause a denial-of-service attack
| VAR-202510-4375 | CVE-2025-12422 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 privilege escalation vulnerabilities (CNVD-2025-29083) |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Vulnerable Upgrade Feature (Arbitrary File Write) may lead to obtaining super user permissions on board.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a privilege escalation vulnerability caused by an arbitrary file write flaw in the escalation feature. An attacker could exploit this vulnerability to gain escalated privileges on the system
| VAR-202510-2217 | CVE-2025-12322 | Tenda CH22 buffer overflow vulnerability fromNatStaticSetting function |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A flaw has been found in Tenda CH22 1.0.0.1. Affected by this issue is the function fromNatStaticSetting of the file /goform/NatStaticSetting. Executing manipulation of the argument page can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company.
Version 1.0.0.1 of the Tenda CH22 contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `page` parameter of the function `fromNatStaticSetting` in the file `/goform/NatStaticSetting` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
| VAR-202510-2966 | CVE-2025-12365 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 information disclosure vulnerabilities (CNVD-2025-29150) |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Error Messages Wrapped In HTTP Header.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain an information disclosure vulnerability caused by an error message wrapped in the HTTP header. An attacker could exploit this vulnerability to obtain sensitive information
| VAR-202510-4374 | CVE-2025-12364 | An unidentified vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29151). |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Weak Password Policy.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a security vulnerability stemming from a weak password policy. Detailed vulnerability information is not currently available
| VAR-202510-3719 | CVE-2025-12363 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 information disclosure vulnerabilities (CNVD-2025-29149) |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Email Password Disclosure.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain an information disclosure vulnerability caused by improper authorization verification. An attacker could exploit this vulnerability to obtain email password information
| VAR-202510-2330 | CVE-2025-12274 | Tenda CH22 buffer overflow vulnerability in the fromP2pListFilter function |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A security vulnerability has been detected in Tenda CH22 1.0.0.1. Affected by this vulnerability is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. This vulnerability stems from the fact that the `page` parameter of the function `fromP2pListFilter` in the file `/goform/P2pListFilter` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
| VAR-202510-2277 | CVE-2025-12273 | Tenda CH22 formwebExcptypemanFilter function buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A weakness has been identified in Tenda CH22 1.0.0.1. Affected is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing manipulation of the argument page can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company.
Version 1.0.0.1 of the Tenda CH22 contains a buffer overflow vulnerability. This vulnerability stems from the fact that the parameter `page` in the file `/goform/webExcptypemanFilter` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
| VAR-202510-2345 | CVE-2025-12272 | Tenda CH22 formaddressNat function buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A security flaw has been discovered in Tenda CH22 1.0.0.1. This impacts the function fromAddressNat of the file /goform/addressNat. Performing manipulation of the argument page results in buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be exploited. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company.
The Tenda CH22 contains a buffer overflow vulnerability. This vulnerability stems from the fact that the parameter `page` in the file `/goform/addressNat` fails to properly validate the length of input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
| VAR-202510-2132 | CVE-2025-12271 | Tenda CH22 formRouteStatic function buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was identified in Tenda CH22 1.0.0.1. This affects the function fromRouteStatic of the file /goform/RouteStatic. Such manipulation of the argument page leads to buffer overflow. The attack can be launched remotely. The exploit is publicly available and might be used. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. This vulnerability stems from the fact that the parameter `page` in the file `/goform/RouteStatic` fails to properly validate the length of input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
| VAR-202510-2333 | CVE-2025-12265 | Tenda CH22 fromVirtualSer function buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A weakness has been identified in Tenda CH22 1.0.0.1. Affected by this issue is the function fromVirtualSer of the file /goform/VirtualSer. This manipulation of the argument page causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. This vulnerability stems from the fact that the `page` parameter of the function `fromVirtualSer` in the file `/goform/VirtualSer` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
| VAR-202510-2091 | CVE-2025-46583 | ZTE MC889A Pro Denial-of-Service Vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
There is a Denial of Service(DoS)vulnerability in the ZTE MC889A Pro product. Due to insufficient validation of the input parameters of the Short Message Service interface, allowing an attacker to exploit it to carry out a DoS attack. The ZTE MC889A Pro is a router manufactured by ZTE Corporation, a Chinese company. Attackers can exploit this vulnerability to cause a denial-of-service attack
| VAR-202510-2239 | CVE-2025-12260 | TOTOLINK A3300R enable parameter buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been found in TOTOLINK A3300R 17.0.0cu.557_B20221024. The impacted element is the function setSyslogCfg of the file /cgi-bin/cstecgi.cgi of the component POST Parameter Handler. Such manipulation of the argument enable leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The TOTOLINK A3300R is a wireless router manufactured by TOTOLINK, a Chinese company.
Version 17.0.0cu.557_B20221024 of the TOTOLINK A3300R contains a buffer overflow vulnerability. This vulnerability stems from the fact that the parameter `enable` in the file `/cgi-bin/cstecgi.cgi` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
| VAR-202510-2269 | CVE-2025-12259 | TOTOLINK A3300R setScheduleCfg function stack buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A flaw has been found in TOTOLINK A3300R 17.0.0cu.557_B20221024. The affected element is the function setScheduleCfg of the file /cgi-bin/cstecgi.cgi of the component POST Parameter Handler. This manipulation of the argument recHour causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used. The TOTOLINK A3300R is a dual-band wireless router manufactured by TOTOLINK Electronics Co., Ltd. in China, primarily used in home and small network environments. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
| VAR-202510-2079 | CVE-2025-12258 | TOTOLINK A3300R setOpModeCfg function stack buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was detected in TOTOLINK A3300R 17.0.0cu.557_B20221024. Impacted is the function setOpModeCfg of the file /cgi-bin/cstecgi.cg of the component POST Parameter Handler. The manipulation of the argument opmode results in stack-based buffer overflow. The attack may be performed from remote. The TOTOLINK A3300R is a dual-band wireless router manufactured by TOTOLINK Electronics Co., Ltd. in China, primarily used in home and small network environments. This vulnerability stems from the fact that the `opmode` parameter in the `setOpModeCfg` function within the file `/cgi-bin/cstecgi.cg` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code or cause a denial-of-service attack on the system
| VAR-202510-2186 | CVE-2025-12241 | TOTOLINK A3300R lang parameter buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was detected in TOTOLINK A3300R 17.0.0cu.557_B20221024. This impacts the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi of the component POST Parameter Handler. The manipulation of the argument lang results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used. The TOTOLINK A3300R is a wireless router manufactured by TOTOLINK, a Chinese company.
Version 17.0.0cu.557_B20221024 of the TOTOLINK A3300R contains a buffer overflow vulnerability. This vulnerability stems from the fact that the parameter `lang` in the file `/cgi-bin/cstecgi.cgi` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
| VAR-202510-2241 | CVE-2025-12240 | TOTOLINK A3300R cstecgi.cgi file buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A security vulnerability has been detected in TOTOLINK A3300R 17.0.0cu.557_B20221024. This affects the function setDmzCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ip leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The TOTOLINK A3300R is a dual-band wireless router manufactured by TOTOLINK Electronics Co., Ltd. in China, primarily used in home and small network environments. This vulnerability stems from the fact that the parameter `ip` in the function `setDmzCfg` in the file `/cgi-bin/cstecgi.cgi` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack