VARIoT IoT vulnerabilities database

VAR-202507-2397 | CVE-2025-7805 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. This affects the function fromPptpUserSetting of the file /goform/PPTPUserSetting. The manipulation of the argument delno leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of fh451 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda FH451 is a single-frequency 2.4GHz SOHO wireless router launched by China's Tenda Company. It has a maximum transmission rate of 450Mbps and belongs to the wall-penetrating king series of products. The vulnerability is caused by the failure to correctly verify the length of the input data in the parameter delno in the file /goform/PPTPUserSetting. Attackers can use this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202507-2414 | CVE-2025-7796 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability, which was classified as critical, was found in Tenda FH451 1.0.0.9. This affects the function fromPptpUserAdd of the file /goform/PPTPDClient. The manipulation of the argument Username leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of fh451 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda FH451 is a single-frequency 2.4GHz SOHO wireless router launched by China's Tenda Company. It has a maximum transmission rate of 450Mbps and belongs to the wall-penetrating king series of products. The vulnerability is caused by the parameter Username in the file /goform/PPTPDClient failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202507-2373 | CVE-2025-7795 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability, which was classified as critical, has been found in Tenda FH451 1.0.0.9. Affected by this issue is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of fh451 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda FH451 is a single-frequency 2.4GHz SOHO wireless router launched by China's Tenda Company. It has a maximum transmission rate of 450Mbps and belongs to the wall-penetrating king series of products. The vulnerability is caused by the failure to correctly verify the length of the input data in the parameter page in the file /goform/P2pListFilter. Attackers can use this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202507-2364 | CVE-2025-7794 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability classified as critical was found in Tenda FH451 1.0.0.9. Affected by this vulnerability is the function fromNatStaticSetting of the file /goform/NatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of fh451 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda FH451 is a single-frequency 2.4GHz SOHO wireless router launched by China's Tenda Company. It has a maximum transmission rate of 450Mbps and belongs to the wall-penetrating king series of products. The vulnerability is caused by the failure to correctly verify the length of the input data in the parameter page in the file /goform/NatStaticSetting. Attackers can use this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202507-2336 | CVE-2025-7793 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. Affected is the function formWebTypeLibrary of the file /goform/webtypelibrary. The manipulation of the argument webSiteId leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of fh451 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the failure of the parameter webSiteId in the file /goform/webtypelibrary to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202507-2387 | CVE-2025-7792 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in Tenda FH451 1.0.0.9. It has been rated as critical. This issue affects the function formSafeEmailFilter of the file /goform/SafeEmailFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. of fh451 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the failure to properly verify the length of the input data in the parameter page in the file /goform/SafeEmailFilter. Attackers can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202507-2388 | CVE-2025-7790 | D-Link Systems, Inc. of di-8100 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. This affects an unknown part of the file /menu_nat.asp of the component HTTP Request Handler. The manipulation of the argument out_addr/in_addr/out_port/proto leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. D-Link DI-8100 is an enterprise-level router device from D-Link. Attackers can exploit this vulnerability to trigger a stack overflow by remotely constructing malicious parameters, thereby executing arbitrary code or causing the system to crash
VAR-202507-2630 | CVE-2024-27779 | fortinet's FortiIsolator and FortiSandbox Session deadline vulnerability in |
CVSS V2: - CVSS V3: 6.7 Severity: MEDIUM |
An insufficient session expiration vulnerability [CWE-613] in FortiSandbox FortiSandbox version 4.4.4 and below, version 4.2.6 and below, 4.0 all versions, 3.2 all versions and FortiIsolator version 2.4 and below, 2.3 all versions, 2.2 all versions, 2.1 all versions, 2.0 all versions, 1.2 all versions may allow a remote attacker in possession of an admin session cookie to keep using that admin's session even after the admin user was deleted. fortinet's FortiIsolator and FortiSandbox contains a session expiration vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202507-3917 | No CVE | Ricoh M 320F has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Ricoh M320F is a monochrome laser multifunction printer.
The Ricoh M320F has an unauthorized access vulnerability that could allow an attacker to obtain sensitive information.
VAR-202507-2366 | CVE-2025-7762 | D-Link Systems, Inc. of di-8100 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability, which was classified as critical, has been found in D-Link DI-8100 16.07.26A1. This issue affects some unknown processing of the file /menu_nat_more.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. The D-Link DI-8100 is a broadband router designed for small and medium-sized networks. It supports four Internet ports and four LAN ports, and uses a dedicated network processor, allowing up to 80 devices to connect to the network simultaneously. This vulnerability stems from a failure to properly validate the length of input data in the file /menu_nat_more.asp. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202507-2367 | CVE-2025-7758 | TOTOLINK of t6 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability, which was classified as critical, has been found in TOTOLINK T6 up to 4.1.5cu.748_B20211015. Affected by this issue is the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of t6 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK T6 is a wireless dual-band router released by China's Jiweng Electronics (TOTOLINK). It supports the MQTT protocol and Telnet service.
The TOTOLINK T6 suffers from a buffer overflow vulnerability caused by a failure to properly validate the length of input data in the parameter "ip" in the file "/cgi-bin/cstecgi.cgi". An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202507-1340 | CVE-2025-52046 | TOTOLINK A3300R Command Injection Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Totolink A3300R V17.0.0cu.596_B20250515 was found to contain a command injection vulnerability in the sub_4197C0 function via the mac and desc parameters. This vulnerability allows unauthenticated attackers to execute arbitrary commands via a crafted request. TOTOLINK A3300R is a wireless router from China's TOTOLINK Electronics
VAR-202507-1788 | CVE-2025-51630 | TOTOLINK N350RT Buffer Overflow Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a buffer overflow via the ePort parameter in the function setIpPortFilterRules. The TOTOLINK N350RT is a small home router manufactured by the Chinese company TOTOLINK. This vulnerability stems from a failure to properly validate the length of input data in the ePort parameter. A remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service
VAR-202507-2422 | CVE-2025-7747 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Classic buffer overflow vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. This affects the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. The manipulation of the argument PPW leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of fh451 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter PPW in the file /goform/WizardHandle failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202507-1298 | No CVE | HP LaserJet 600 M602 of HP Trading (Shanghai) Co., Ltd. has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
HP Trading (Shanghai) Co., Ltd. focuses on the research and development, production, sales and international trade of computer equipment, printing equipment and related parts.
HP LaserJet 600 M602 of HP Trading (Shanghai) Co., Ltd. has a weak password vulnerability, and attackers can use the vulnerability to log in to the system and obtain sensitive information.
VAR-202507-1637 | CVE-2025-53032 | Oracle MySQL of MySQL Server In Server: Optimizer Vulnerability |
CVSS V2: 6.1 CVSS V3: 4.9 Severity: MEDIUM |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). An attacker could exploit this vulnerability to cause a denial of service
VAR-202507-1786 | CVE-2025-52363 | Shenzhen Tenda Technology Co.,Ltd. of CP3 Pro Vulnerability related to use of hardcoded credentials in firmware |
CVSS V2: 5.6 CVSS V3: 6.8 Severity: MEDIUM |
Tenda CP3 Pro Firmware V22.5.4.93 contains a hardcoded root password hash in the /etc/passwd file and /etc/passwd-. An attacker with access to the firmware image can extract and attempt to crack the root password hash, potentially obtaining administrative access. Shenzhen Tenda Technology Co.,Ltd. Tenda CP3 Pro is an intelligent wireless PTZ camera that integrates 360° panoramic monitoring, 3-megapixel high-definition video, and Wi-Fi 6 network technology. It supports functions such as human/pet detection, crying detection, and one-click calling. No detailed vulnerability details are currently provided
VAR-202507-0681 | CVE-2025-7615 | TOTOLINK of t6 Injection Vulnerability in Firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability classified as critical was found in TOTOLINK T6 4.1.5cu.748. Affected by this vulnerability is the function clearPairCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of t6 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK T6 is a wireless dual-band router released by China's TOTOLINK Electronics. It supports the MQTT protocol and Telnet service. No detailed vulnerability details are currently available
VAR-202507-0626 | CVE-2025-7614 | TOTOLINK of t6 Injection Vulnerability in Firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability classified as critical has been found in TOTOLINK T6 4.1.5cu.748. Affected is the function delDevice of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ipAddr leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of t6 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK T6 is a wireless dual-band router released by China's TOTOLINK Electronics. It supports the MQTT protocol and Telnet service. No detailed vulnerability details are currently available
VAR-202507-0534 | CVE-2025-7613 | TOTOLINK of t6 Injection Vulnerability in Firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability was found in TOTOLINK T6 4.1.5cu.748. It has been rated as critical. This issue affects the function CloudSrvVersionCheck of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of t6 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK T6 is a wireless dual-band router released by China's TOTOLINK Electronics. It supports the MQTT protocol and Telnet service. No detailed vulnerability details are currently available