VARIoT IoT vulnerabilities database
| VAR-202510-1896 | CVE-2025-9437 | Rockwell Automation ArmorStart AOP Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: High |
A security issue exists within the Studio 5000 Logix Designer add-on profile (AOP) for the ArmorStart Classic distributed motor controller, resulting in denial-of-service. This vulnerability is possible due to the input of invalid values into Component Object Model (COM) methods. Rockwell Automation ArmorStart AOP is a distributed motor controller from Rockwell Automation. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202510-0483 | CVE-2025-40774 | Siemens' SiPass integrated Vulnerability in storing passwords in a recoverable format in |
CVSS V2: - CVSS V3: 4.4 Severity: Medium |
A vulnerability has been identified in SiPass integrated (All versions < V3.0). Affected server applications store user passwords encrypted in its database. Decryption keys are accessible to users with administrative privileges, allowing them to recover passwords.
Successful exploitation of this vulnerability allows an attacker to obtain and use valid user passwords. This can lead to unauthorized access to user accounts, data breaches, and potential system compromise. Siemens' SiPass integrated contains a vulnerability related to storing passwords in a recoverable format.Information may be obtained
| VAR-202510-0484 | CVE-2025-40773 | Siemens' SiPass integrated Vulnerability in user-controlled key authentication evasion in |
CVSS V2: - CVSS V3: 3.5 Severity: Medium |
A vulnerability has been identified in SiPass integrated (All versions < V3.0). Affected server applications contains a broken access control vulnerability. The authorization mechanism lacks sufficient server-side checks, allowing an attacker to execute a specific API request.
Successful exploitation allows an attacker to potentially manipulate data belonging to other users. Siemens' SiPass integrated Exists in a user-controlled key authentication evasion vulnerability.Information may be tampered with
| VAR-202510-0482 | CVE-2025-40772 | Siemens' SiPass integrated Cross-site scripting vulnerability in |
CVSS V2: - CVSS V3: 7.4 Severity: High |
A vulnerability has been identified in SiPass integrated (All versions < V3.0). Affected server applications are vulnerable to stored Cross-Site Scripting (XSS), allowing an attacker to inject malicious code that can be executed by other users when they visit the affected page.
Successful exploitation allows an attacker to impersonate other users within the application and steal their session data. This could enable unauthorized access to accounts and potentially lead to privilege escalation. Siemens' SiPass integrated Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
| VAR-202510-0440 | CVE-2025-11665 | D-Link DAP-2695 Operating System Command Injection Vulnerability |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: Medium |
A vulnerability was detected in D-Link DAP-2695 2.00RC131. This affects the function fwupdater_main of the file rgbin of the component Firmware Update Handler. Performing manipulation results in os command injection. The attack may be initiated remotely. This vulnerability only affects products that are no longer supported by the maintainer. The D-Link DAP-2695 is a high-performance dual-band wireless access point from D-Link (China). An attacker could exploit this vulnerability to execute arbitrary commands
| VAR-202510-1041 | No CVE | D-Link DI-8003G has a command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The DI-8003G is a full-network 4G router that supports dual SIM cards, VPN, and load balancing, providing a stable mobile network for unmanned sites.
The D-Link DI-8003G has a command execution vulnerability that could allow an attacker to gain server privileges.
| VAR-202510-3025 | No CVE | Mosa Technology (Shanghai) Co., Ltd.'s NPort IA5250AI has an unauthorized access vulnerability. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The NPort IA5250AI is an industrial-grade serial port device networking server.
Mosa Technology (Shanghai) Co., Ltd.'s NPort IA5250AI contains an unauthorized access vulnerability, which attackers could exploit to obtain sensitive information.
| VAR-202510-0407 | CVE-2025-11586 | Tenda AC7 /goform/setNotUpgrade file buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was determined in Tenda AC7 15.03.06.44. This affects an unknown function of the file /goform/setNotUpgrade. This manipulation of the argument newVersion causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. The Tenda AC7 is a wireless router from the Chinese company Tenda. This vulnerability stems from the failure of the newVersion parameter in the /goform/setNotUpgrade file to properly validate the length of the input data. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202510-1837 | CVE-2025-21055 | SAMSUNG Mobile devices have an unspecified vulnerability (CNVD-2025-24783) |
CVSS V2: 5.0 CVSS V3: 4.3 Severity: MEDIUM |
Out-of-bounds read and write in libimagecodec.quram.so prior to SMR Oct-2025 Release 1 allows remote attackers to access out-of-bounds memory. SAMSUNG Mobile devices are a series of mobile devices manufactured by the South Korean company Samsung, including smartphones and tablets
| VAR-202510-1671 | CVE-2025-21052 | SAMSUNG Mobile devices have an unspecified vulnerability (CNVD-2025-24784) |
CVSS V2: 2.1 CVSS V3: 4.0 Severity: MEDIUM |
Out-of-bounds write under specific condition in the pre-processing of JPEG decoding in libpadm.so prior to SMR Oct-2025 Release 1 allows local attackers to cause memory corruption. SAMSUNG Mobile devices are a series of mobile devices manufactured by the South Korean company Samsung, including smartphones and tablets
| VAR-202510-0313 | CVE-2025-11550 | Tenda W12 NullPointer Dereference Vulnerability |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: Medium |
A vulnerability was found in Tenda W12 3.0.0.6(3948). The impacted element is the function wifiScheduledSet of the file /goform/modules of the component HTTP Request Handler. The manipulation of the argument wifiScheduledSet results in null pointer dereference. The attack may be performed from remote. The exploit has been made public and could be used. The Tenda W12 is a dual-band gigabit wireless panel access point (AP) launched by Tenda Technology, designed for scenarios such as hotels, villas, and large apartments. It supports the IEEE 802.11ac protocol and Wave2 standard, and boasts a dual-band concurrent speed of 1167Mbps. Detailed vulnerability information is currently unavailable
| VAR-202510-0318 | CVE-2025-11549 | Tenda W12 Buffer Overflow Vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been found in Tenda W12 3.0.0.6(3948). The affected element is the function wifiMacFilterSet of the file /goform/modules of the component HTTP Request Handler. The manipulation of the argument mac leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The W12 is a high-performance wireless access point from China's Tenda company.
Shenzhen Jixiang Tenda Technology Co., Ltd.'s W12 version 3.0.0.6 suffers from a buffer overflow vulnerability. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202510-0895 | CVE-2025-61577 | D-Link DIR-816A2 Buffer Overflow Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
D-Link DIR-816A2_FWv1.10CNB05 was discovered to contain a stack overflow via the statuscheckpppoeuser parameter in the dir_setWanWifi function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. The D-Link DIR-816A2 is a router manufactured by D-Link, a Chinese company.
The D-Link DIR-816A2 version FWv1.10CNB05 contains a buffer overflow vulnerability. This vulnerability stems from the failure of the statuscheckpppoeuser parameter in the dir_setWanWifi function to properly validate the length of input data
| VAR-202510-0368 | CVE-2025-11528 | Tenda AC7 /goform/saveAutoQos file buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was identified in Tenda AC7 15.03.06.44. This affects an unknown function of the file /goform/saveAutoQos. The manipulation of the argument enable leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The Tenda AC7 is a wireless router from the Chinese company Tenda.
Tenda AC7 version 15.03.06.44 suffers from a buffer overflow vulnerability. This vulnerability stems from the failure of the enable parameter in the file /goform/saveAutoQos to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202510-0141 | CVE-2025-11527 | Tenda AC7 /goform/fast_setting_pppoe_set file buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was determined in Tenda AC7 15.03.06.44. The impacted element is an unknown function of the file /goform/fast_setting_pppoe_set. Executing manipulation of the argument Password can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The Tenda AC7 is a wireless router from the Chinese company Tenda. This vulnerability stems from a failure to properly validate the length of the input data in the "Password" parameter in the file /goform/fast_setting_pppoe_set. An attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service (DoS) attack
| VAR-202510-0224 | CVE-2025-11526 | Shenzhen Tenda Technology Co.,Ltd. of AC7 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in Tenda AC7 15.03.06.44. The affected element is an unknown function of the file /goform/WifiMacFilterSet. Performing manipulation of the argument wifi_chkHz results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made public and could be used. of AC7 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability stems from the failure of the wifi_chkHz parameter in the file /goform/WifiMacFilterSet to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service
| VAR-202510-0237 | CVE-2025-11525 | Shenzhen Tenda Technology Co.,Ltd. of AC7 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been found in Tenda AC7 15.03.06.44. Impacted is an unknown function of the file /goform/SetUpnpCfg. Such manipulation of the argument upnpEn leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. of AC7 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability stems from the failure of the upnpEn parameter in the file /goform/SetUpnpCfg to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202510-0163 | CVE-2025-11524 | Tenda AC7 /goform/SetDDNSCfg file buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A flaw has been found in Tenda AC7 15.03.06.44. This issue affects some unknown processing of the file /goform/SetDDNSCfg. This manipulation of the argument ddnsEn causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used. The Tenda AC7 is a wireless router from the Chinese company Tenda. This vulnerability stems from the failure of the ddnsEn parameter in the /goform/SetDDNSCfg file to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202510-0256 | CVE-2025-11523 | Shenzhen Tenda Technology Co.,Ltd. of AC7 Injection Vulnerability in Firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability was detected in Tenda AC7 15.03.06.44. This vulnerability affects unknown code of the file /goform/AdvSetLanip. The manipulation of the argument lanIp results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. Shenzhen Tenda Technology Co.,Ltd. of AC7 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability stems from the failure to properly sanitize special characters and commands in the lanIp parameter in the file /goform/AdvSetLanip. An attacker could exploit this vulnerability to execute arbitrary commands
| VAR-202510-4303 | No CVE | Zhongqi Technology Co., Ltd.'s NUX-6374R has a weak password vulnerability. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Chung-Chi Technology Co., Ltd., founded in 1986, offers a series of industry-leading DOCSIS (Domain-Oriented Broadband Access Network) equipment and related network products.
A weak password vulnerability exists in Chung-Chi Technology Co., Ltd.'s NUX-6374R device, which attackers could exploit to obtain sensitive information.