VARIoT IoT vulnerabilities database
| VAR-202602-1336 | CVE-2026-20098 | Cisco Systems Cisco Meeting Management Vulnerability in unlimited upload of dangerous types of files in |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the Certificate Management feature of Cisco Meeting Management could allow an authenticated, remote attacker to upload arbitrary files, execute arbitrary commands, and elevate privileges to root on an affected system.
This vulnerability is due to improper input validation in certain sections of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to upload arbitrary files to the affected system. The malicious files could overwrite system files that are processed by the root system account and allow arbitrary command execution with root privileges. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of video operator. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202602-0082 | CVE-2020-37097 | EDIMAX Technology of EW-7438RPn Mini Insufficient Credential Protection Vulnerability in Firmware |
CVSS V2: - CVSS V3: 7.5 Severity: High |
Edimax EW-7438RPn 1.13 contains an information disclosure vulnerability that exposes WiFi network configuration details through the wlencrypt_wiz.asp file. Attackers can access the script to retrieve sensitive information including WiFi network name and plaintext password stored in device configuration variables. In addition, information handled by the software will not be rewritten. Furthermore, the software will not stop. Furthermore, attacks exploiting this vulnerability will not affect other software
| VAR-202602-0150 | CVE-2020-37096 | EDIMAX Technology of EW-7438RPn Mini Cross-site request forgery vulnerability in firmware |
CVSS V2: - CVSS V3: 5.3 Severity: Medium |
Edimax EW-7438RPn 1.13 contains a cross-site request forgery vulnerability in the MAC filtering configuration interface. Attackers can craft malicious web pages to trick users into adding unauthorized MAC addresses to the device's filtering rules without their consent. MAC You can add an address.Information handled by the software will not be leaked to the outside. However, some of the information handled by the software may be rewritten. Furthermore, the software will not stop running. Furthermore, attacks exploiting this vulnerability will not affect other software
| VAR-202602-0303 | CVE-2026-20422 | media tech's NR15 Vulnerabilities related to reachable assertions in multiple products, including |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00827332; Issue ID: MSV-5919. ID teeth MOLY00827332 And the problem ID teeth MSV-5919 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202602-0342 | CVE-2026-20421 | media tech's NR15 Out-of-bounds read vulnerability in |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738293; Issue ID: MSV-5922. ID teeth MOLY01738293 ,problem ID teeth MSV-5922 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202602-0284 | CVE-2026-20420 | media tech's NR15 Vulnerabilities related to out-of-bounds reading in multiple products, including |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738313; Issue ID: MSV-5935. Improper error handling in modems can lead to system crashes, which can expose malicious base stations controlled by attackers. UE connects, it can allow a remote denial of service ( DoS ) may occur. Patch ID teeth MOLY01738313 ,problem ID teeth MSV-5935 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202602-0422 | CVE-2026-20406 | media tech's NR15 Multiple vulnerabilities in multiple products, including |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01726634; Issue ID: MSV-5728. Patch ID teeth MOLY01726634 So, the problem ID teeth MSV-5728 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202602-0302 | CVE-2026-20405 | media tech's NR15 Vulnerabilities related to reachable assertions in multiple products, including |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01688495; Issue ID: MSV-4818. ID teeth MOLY01688495 So, the problem ID teeth MSV-4818 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202602-0315 | CVE-2026-20404 | media tech's NR15 Out-of-bounds write vulnerabilities in multiple products, including |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689248; Issue ID: MSV-4837. Patch ID teeth MOLY01689248 ,problem ID teeth MSV-4837 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202602-0439 | CVE-2026-20403 | media tech's NR15 Out-of-bounds write vulnerabilities in multiple products, including |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689254 (Note: For N15 and NR16) / MOLY01689259 (Note: For NR17 and NR17R); Issue ID: MSV-4843. Patch ID teeth MOLY01689254 (( N15 and NR16 for) and MOLY01689259 (( NR17 and NR17R (used) and the problem ID teeth MSV-4843 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202602-0240 | CVE-2026-20402 | media tech's NR15 Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00693083; Issue ID: MSV-5928. UE ) connects, it could allow a remote denial of service ( DoS ) exploit. Patch ID teeth MOLY00693083 ,problem ID teeth MSV-5928 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202602-0269 | CVE-2026-20401 | media tech's NR15 Multiple vulnerabilities in |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738310; Issue ID: MSV-5933. Patch ID teeth MOLY01738310 ,problem ID teeth MSV-5933 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-4151 | CVE-2026-1638 | Shenzhen Tenda Technology Co.,Ltd. of ac21 Multiple vulnerabilities in firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A security flaw has been discovered in Tenda AC21 1.1.1.1/1.dmzip/16.03.08.16. The impacted element is the function mDMZSetCfg of the file /goform/mDMZSetCfg. The manipulation of the argument dmzIp results in command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. Exploits are publicly available and may be used in attacks.All information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, the software may stop working completely
| VAR-202601-4145 | CVE-2026-24714 | Support has ended NETGEAR "Not described in the product manual TelnetEnable "function |
CVSS V2: - CVSS V3: 7.5 Severity: High |
Some end of service NETGEAR products provide "TelnetEnable" functionality, which allows a magic packet to activate telnet service on the box. LAN By processing specific packets received from the side interface, Telnet The service may be enabled. LAN By processing specific packets received from the side interface, Telnet The service may be enabled
| VAR-202601-4247 | CVE-2026-1637 | Shenzhen Tenda Technology Co.,Ltd. of ac21 Multiple vulnerabilities in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The affected elements are files /goform/AdvSetMacMtuWan Functions in fromAdvSetMacMtuWan This action results in a stack-based buffer overflow that can be exploited remotely. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-4617 | CVE-2022-40620 | of netgear R6230 Certificate verification vulnerability in multiple products, including firmware |
CVSS V2: - CVSS V3: 7.7 Severity: HIGH |
FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, does not properly validate TLS certificates when downloading update packages through its auto-update mechanism. An attacker (suitably positioned on the network) could intercept the update request and deliver a malicious update package in order to gain arbitrary code execution on affected devices. This affects R6230 before 1.1.0.112, R6260 before 1.1.0.88, R7000 before 1.0.11.134, R8900 before 1.0.5.42, R9000 before 1.0.5.42, and XR300 before 1.0.3.72 and Orbi RBR20 before 2.7.2.26, RBR50 before 2.7.4.26, RBS20 before 2.7.2.26, and RBS50 before 2.7.4.26. TLS It does not properly validate certificates. This is due to R6230 version of 1.1.0.112 less than, R6260 of 1.1.0.88 less than, R7000 of 1.0.11.134 less than, R8900 of 1.0.5.42 less than, R9000 of 1.0.5.42 less than, XR300 of 1.0.3.72 Less than and Orbi of RBR20 of 2.7.2.26 less than, RBR50 of 2.7.4.26 less than, RBS20 of 2.7.2.26 less than, RBS50 of 2.7.4.26 Vulnerabilities affecting less thanAll information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, part of the software may stop functioning. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-4765 | CVE-2022-40619 | of netgear R6230 Command injection vulnerabilities in multiple firmware and other products |
CVSS V2: - CVSS V3: 7.7 Severity: HIGH |
FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, exposes an HTTP server over the LAN interface of affected devices. This interface is vulnerable to unauthenticated arbitrary command injection through the funjsq_access_token parameter. This affects R6230 before 1.1.0.112, R6260 before 1.1.0.88, R7000 before 1.0.11.134, R8900 before 1.0.5.42, R9000 before 1.0.5.42, and XR300 before 1.0.3.72 and Orbi RBR20 before 2.7.2.26, RBR50 before 2.7.4.26, RBS20 before 2.7.2.26, and RBS50 before 2.7.4.26. R6230 (version 1.1.0.112 before), R6260 (( 1.1.0.88 before), R7000 (( 1.0.11.134 before), R8900 (( 1.0.5.42 before), R9000 (( 1.0.5.42 before), XR300 (( 1.0.3.72 before), and Orbi RBR20 (( 2.7.2.26 before), RBR50 (( 2.7.4.26 before), RBS20 (( 2.7.2.26 before), RBS50 (( 2.7.4.26 This affects all models (before ).All information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, part of the software may stop functioning. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-4142 | CVE-2026-1506 | D-Link Corporation of DIR-615 Multiple vulnerabilities in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
A vulnerability was determined in D-Link DIR-615 4.10. Impacted is an unknown function of the file /adv_mac_filter.php of the component MAC Filter Configuration. This manipulation of the argument mac causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-3982 | CVE-2026-1505 | D-Link Corporation of DIR-615 Multiple vulnerabilities in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
A vulnerability was found in D-Link DIR-615 4.10. This issue affects some unknown processing of the file /set_temp_nodes.php of the component URL Filter. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. An exploit for this vulnerability has been published and is available in the wild. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-4019 | CVE-2026-1448 | D-Link Corporation of DIR-615 Multiple vulnerabilities in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
A vulnerability was detected in D-Link DIR-615 up to 4.10. This impacts an unknown function of the file /wiz_policy_3_machine.php of the component Web Management Interface. Performing a manipulation of the argument ipaddr results in os command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. It can be performed remotely. Exploits have been published and are available in the wild. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software