VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202503-1739 CVE-2025-29032 Tenda  of  AC9  Classic buffer overflow vulnerability in firmware CVSS V2: 6.1
CVSS V3: 5.9
Severity: MEDIUM
Tenda AC9 v15.03.05.19(6318) was discovered to contain a buffer overflow via the formWifiWpsOOB function. Tenda of AC9 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC9 is a wireless router from China's Tenda company. No detailed vulnerability details are currently available
VAR-202503-0654 CVE-2025-29031 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the fromAddressNat function. Shenzhen Tenda Technology Co.,Ltd. of AC6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the fromAddressNat function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202503-0607 CVE-2025-29030 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the formWifiWpsOOB function. Shenzhen Tenda Technology Co.,Ltd. of AC6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the formWifiWpsOOB function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202503-0498 CVE-2025-29029 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the formSetSpeedWan function. Shenzhen Tenda Technology Co.,Ltd. of AC6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the formSetSpeedWan function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202503-0401 CVE-2024-12858 Delta Electronics CNCSoft-G2 Input Validation Error Vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. *** Duplicate of CVE-2025-22880 ***. Delta Electronics CNCSoft-G2 is a human-machine interface (HMI) software from Delta Electronics, a Chinese company. Delta Electronics CNCSoft-G2 2.1.0.16 and earlier versions have an input validation error vulnerability. The vulnerability is caused by not properly validating the length of the data provided by the user. Attackers can exploit this vulnerability to execute code in the current process environment
VAR-202503-1941 CVE-2025-29363 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to buffer overflow via the schedStartTime and schedEndTime parameters at /goform/saveParentControlInfo. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a dual-band WiFi home wireless router from China's Tenda Company
VAR-202503-2140 CVE-2025-29362 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the list parameter at /goform/setPptpUserList. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a dual-band WiFi 6 home wireless router from China's Tenda Company
VAR-202503-1031 CVE-2025-29361 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the list parameter at /goform/SetVirtualServerCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
VAR-202503-0683 CVE-2025-29360 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the time and timeZone parameters at /goform/SetSysTimeCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
VAR-202503-0851 CVE-2025-29359 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the deviceId parameter at /goform/saveParentControlInfo. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
VAR-202503-1032 CVE-2025-29358 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the firewallEn parameter at /goform/SetFirewallCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a dual-band WiFi 6 home wireless router from China's Tenda company. It is used for home network coverage and supports high-speed wireless connections. The vulnerability is caused by the firewallEn parameter in /goform/SetFirewallCfg failing to correctly verify the length of the input data
VAR-202503-2141 CVE-2025-29357 Tenda  of  RX3  Improper Shutdown and Release of Resources in Firmware Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the startIp and endIp parameters at /goform/SetPptpServerCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda of RX3 A vulnerability exists in firmware related to improper shutdown and release of resources.Service operation interruption (DoS) It may be in a state. Tenda RX3 is a dual-band WiFi 6 home wireless router from China's Tenda company. It is used for home network coverage and supports high-speed wireless connections. The vulnerability is caused by the startIp and endIp parameters in /goform/SetPptpServerCfg failing to correctly verify the length of the input data
VAR-202503-0471 CVE-2025-0813 Schneider Electric EcoStruxure Power Automation System User Interface Authorization Issue Vulnerability CVSS V2: 7.2
CVSS V3: 6.8
Severity: High
CWE-287: Improper Authentication vulnerability exists that could cause an Authentication Bypass when an unauthorized user without permission rights has physical access to the EPAS-UI computer and is able to reboot the workstation and interrupt the normal boot process. Schneider Electric EcoStruxure Power Automation System User Interface is a user interface software for power automation systems developed by Schneider Electric of France. It is used for operators to interact with power automation systems to improve operational efficiency. Schneider Electric EcoStruxure Power Automation System User Interface has an authorization vulnerability. The vulnerability is caused by improper authentication
VAR-202503-1168 CVE-2024-13872 BitDefender  of  Bitdefender BOX  Vulnerability in cleartext transmission of sensitive information in firmware CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device. BitDefender of Bitdefender BOX A vulnerability exists in the firmware regarding the transmission of sensitive information in plaintext.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202503-2100 CVE-2024-13871 BitDefender  of  Bitdefender BOX  Command injection vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
A command injection vulnerability exists in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 (firmware version 1.3.11.490). This flaw allows an unauthenticated, network-adjacent attacker to execute arbitrary commands on the device, potentially leading to full remote code execution (RCE). (DoS) It may be in a state
VAR-202503-1337 CVE-2024-13870 BitDefender  of  Bitdefender BOX  Vulnerability in firmware where security version number can be changed to an older version CVSS V2: -
CVSS V3: 5.7
Severity: MEDIUM
An improper access control vulnerability exists in Bitdefender Box 1 (firmware version 1.3.52.928 and below) that allows an unauthenticated attacker to downgrade the device's firmware to an older, potentially vulnerable version of a Bitdefender-signed firmware. The attack requires Bitdefender BOX to be booted in Recovery Mode and that the attacker be present within the WiFi range of the BOX unit
VAR-202503-2006 CVE-2025-24070 Microsoft's  ASP.NET Core  and  Microsoft Visual Studio  Elevated Privileges in CVSS V2: -
CVSS V3: 7.0
Severity: HIGH
Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network
VAR-202503-0792 CVE-2024-54026 CVSS V2: -
CVSS V3: 4.3
Severity: MEDIUM
An improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiSandbox 4.4.0 through 4.4.6, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions, FortiSandbox 3.2 all versions, FortiSandbox 3.1 all versions, FortiSandbox 3.0 all versions, FortiSandbox Cloud 24.1 allows attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
VAR-202503-2484 CVE-2024-54018 fortinet's  FortiSandbox  In  OS  Command injection vulnerability CVSS V2: -
CVSS V3: 7.2
Severity: HIGH
Multiple improper neutralization of special elements used in an OS Command vulnerabilities [CWE-78] in FortiSandbox before 4.4.5 allows a privileged attacker to execute unauthorized commands via crafted requests. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202503-1498 CVE-2024-52961 fortinet's  FortiSandbox  In  OS  Command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] vulnerability in Fortinet FortiSandbox 5.0.0, FortiSandbox 4.4.0 through 4.4.6, FortiSandbox 4.2.1 through 4.2.7, FortiSandbox 4.0.0 through 4.0.5, FortiSandbox 3.2 all versions, FortiSandbox 3.1 all versions, FortiSandbox 3.0 all versions allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiSandbox is an APT (Advanced Persistent Threat) protection device from Fortinet Systems, Inc. It offers dual sandbox technology, a dynamic threat intelligence system, a real-time control panel, and reporting capabilities. The Fortinet FortiSandbox contains an operating system command injection vulnerability