VARIoT IoT vulnerabilities database
| VAR-202503-1739 | CVE-2025-29032 | Tenda of AC9 Classic buffer overflow vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 5.9 Severity: MEDIUM |
Tenda AC9 v15.03.05.19(6318) was discovered to contain a buffer overflow via the formWifiWpsOOB function. Tenda of AC9 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC9 is a wireless router from China's Tenda company. No detailed vulnerability details are currently available
| VAR-202503-0654 | CVE-2025-29031 | Shenzhen Tenda Technology Co.,Ltd. of AC6 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the fromAddressNat function. Shenzhen Tenda Technology Co.,Ltd. of AC6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the fromAddressNat function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202503-0607 | CVE-2025-29030 | Shenzhen Tenda Technology Co.,Ltd. of AC6 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the formWifiWpsOOB function. Shenzhen Tenda Technology Co.,Ltd. of AC6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the formWifiWpsOOB function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202503-0498 | CVE-2025-29029 | Shenzhen Tenda Technology Co.,Ltd. of AC6 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the formSetSpeedWan function. Shenzhen Tenda Technology Co.,Ltd. of AC6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the formSetSpeedWan function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202503-0401 | CVE-2024-12858 | Delta Electronics CNCSoft-G2 Input Validation Error Vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
*** Duplicate of
CVE-2025-22880
***. Delta Electronics CNCSoft-G2 is a human-machine interface (HMI) software from Delta Electronics, a Chinese company.
Delta Electronics CNCSoft-G2 2.1.0.16 and earlier versions have an input validation error vulnerability. The vulnerability is caused by not properly validating the length of the data provided by the user. Attackers can exploit this vulnerability to execute code in the current process environment
| VAR-202503-1941 | CVE-2025-29363 | Tenda of RX3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to buffer overflow via the schedStartTime and schedEndTime parameters at /goform/saveParentControlInfo. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a dual-band WiFi home wireless router from China's Tenda Company
| VAR-202503-2140 | CVE-2025-29362 | Tenda of RX3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the list parameter at /goform/setPptpUserList. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a dual-band WiFi 6 home wireless router from China's Tenda Company
| VAR-202503-1031 | CVE-2025-29361 | Tenda of RX3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the list parameter at /goform/SetVirtualServerCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
| VAR-202503-0683 | CVE-2025-29360 | Tenda of RX3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the time and timeZone parameters at /goform/SetSysTimeCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
| VAR-202503-0851 | CVE-2025-29359 | Tenda of RX3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the deviceId parameter at /goform/saveParentControlInfo. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
| VAR-202503-1032 | CVE-2025-29358 | Tenda of RX3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the firewallEn parameter at /goform/SetFirewallCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a dual-band WiFi 6 home wireless router from China's Tenda company. It is used for home network coverage and supports high-speed wireless connections. The vulnerability is caused by the firewallEn parameter in /goform/SetFirewallCfg failing to correctly verify the length of the input data
| VAR-202503-2141 | CVE-2025-29357 | Tenda of RX3 Improper Shutdown and Release of Resources in Firmware Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the startIp and endIp parameters at /goform/SetPptpServerCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda of RX3 A vulnerability exists in firmware related to improper shutdown and release of resources.Service operation interruption (DoS) It may be in a state. Tenda RX3 is a dual-band WiFi 6 home wireless router from China's Tenda company. It is used for home network coverage and supports high-speed wireless connections. The vulnerability is caused by the startIp and endIp parameters in /goform/SetPptpServerCfg failing to correctly verify the length of the input data
| VAR-202503-0471 | CVE-2025-0813 | Schneider Electric EcoStruxure Power Automation System User Interface Authorization Issue Vulnerability |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: High |
CWE-287: Improper Authentication vulnerability exists that could cause an Authentication Bypass when an
unauthorized user without permission rights has physical access to the EPAS-UI computer and is able to
reboot the workstation and interrupt the normal boot process. Schneider Electric EcoStruxure Power Automation System User Interface is a user interface software for power automation systems developed by Schneider Electric of France. It is used for operators to interact with power automation systems to improve operational efficiency.
Schneider Electric EcoStruxure Power Automation System User Interface has an authorization vulnerability. The vulnerability is caused by improper authentication
| VAR-202503-1168 | CVE-2024-13872 | BitDefender of Bitdefender BOX Vulnerability in cleartext transmission of sensitive information in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device. BitDefender of Bitdefender BOX A vulnerability exists in the firmware regarding the transmission of sensitive information in plaintext.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202503-2100 | CVE-2024-13871 | BitDefender of Bitdefender BOX Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
A command injection vulnerability exists in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 (firmware version 1.3.11.490). This flaw allows an unauthenticated, network-adjacent attacker to execute arbitrary commands on the device, potentially leading to full remote code execution (RCE). (DoS) It may be in a state
| VAR-202503-1337 | CVE-2024-13870 | BitDefender of Bitdefender BOX Vulnerability in firmware where security version number can be changed to an older version |
CVSS V2: - CVSS V3: 5.7 Severity: MEDIUM |
An improper access control vulnerability exists in Bitdefender Box 1 (firmware version 1.3.52.928 and below) that allows an unauthenticated attacker to downgrade the device's firmware to an older, potentially vulnerable version of a Bitdefender-signed firmware. The attack requires Bitdefender BOX to be booted in Recovery Mode and that the attacker be present within the WiFi range of the BOX unit
| VAR-202503-2006 | CVE-2025-24070 | Microsoft's ASP.NET Core and Microsoft Visual Studio Elevated Privileges in |
CVSS V2: - CVSS V3: 7.0 Severity: HIGH |
Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network
| VAR-202503-0792 | CVE-2024-54026 |
CVSS V2: - CVSS V3: 4.3 Severity: MEDIUM |
An improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiSandbox 4.4.0 through 4.4.6, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions, FortiSandbox 3.2 all versions, FortiSandbox 3.1 all versions, FortiSandbox 3.0 all versions, FortiSandbox Cloud 24.1 allows attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
| VAR-202503-2484 | CVE-2024-54018 | fortinet's FortiSandbox In OS Command injection vulnerability |
CVSS V2: - CVSS V3: 7.2 Severity: HIGH |
Multiple improper neutralization of special elements used in an OS Command vulnerabilities [CWE-78] in FortiSandbox before 4.4.5 allows a privileged attacker to execute unauthorized commands via crafted requests. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202503-1498 | CVE-2024-52961 | fortinet's FortiSandbox In OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] vulnerability in Fortinet FortiSandbox 5.0.0, FortiSandbox 4.4.0 through 4.4.6, FortiSandbox 4.2.1 through 4.2.7, FortiSandbox 4.0.0 through 4.0.5, FortiSandbox 3.2 all versions, FortiSandbox 3.1 all versions, FortiSandbox 3.0 all versions allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiSandbox is an APT (Advanced Persistent Threat) protection device from Fortinet Systems, Inc. It offers dual sandbox technology, a dynamic threat intelligence system, a real-time control panel, and reporting capabilities.
The Fortinet FortiSandbox contains an operating system command injection vulnerability