VARIoT IoT vulnerabilities database
| VAR-202502-2111 | CVE-2025-25745 | D-Link Systems, Inc. of dir-853 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: HIGH |
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetQuickVPNSettings module. D-Link Systems, Inc. (DoS) It may be in a state. The D-Link DIR-853 is a dual-band wireless router that supports the 802.11ac protocol, providing dual-band network connections in 2.4GHz (up to 400Mbps) and 5GHz (up to 867Mbps), making it ideal for HD video streaming and online gaming. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202502-2912 | CVE-2025-25740 | D-Link Systems, Inc. of dir-853 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 6.5 CVSS V3: 5.5 Severity: MEDIUM |
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the PSK parameter in the SetQuickVPNSettings module. D-Link Systems, Inc. (DoS) It may be in a state. The D-Link DIR-853 is a dual-band wireless router that supports the 802.11ac protocol, providing dual-band network connections in 2.4GHz (up to 400Mbps) and 5GHz (up to 867Mbps), making it ideal for HD video streaming and online gaming. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202502-2078 | No CVE | Beijing Digital China Cloud Technology Co., Ltd. DCWS-6028 has an unauthorized access vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
DCWS-6028 is a new generation of high-performance 10G smart wireless controller, designed for large and medium-sized wireless network environments.
Beijing Digital China Cloud Technology Co., Ltd. DCWS-6028 has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202502-3257 | No CVE | Sharp Corporation MX-3071 has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
MX-3071 is a digital multifunction printer, mainly used for black and white copying, printing and scanning functions.
Sharp Corporation MX-3071 has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202502-0188 | CVE-2025-25067 | mySCADA Technologies of myPRO In OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: Critical |
mySCADA myPRO Manager
is vulnerable to an OS command injection which could allow a remote attacker to execute arbitrary OS commands. mySCADA Technologies of myPRO for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. mySCADA myPRO is a professional HMI/SCADA system from mySCADA, designed for visualization and control of industrial processes.
mySCADA myPRO has an operating system command injection vulnerability that stems from improper input validation
| VAR-202502-0190 | CVE-2025-24865 | mySCADA Technologies of myPRO Vulnerability regarding lack of authentication for critical features in |
CVSS V2: 10.0 CVSS V3: 10.0 Severity: Critical |
The administrative web interface of
mySCADA myPRO Manager
can be accessed without authentication
which could allow an unauthorized attacker to retrieve sensitive
information and upload files without the associated password. mySCADA Technologies of myPRO There is a vulnerability in the lack of authentication for critical features.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. mySCADA myPRO is a professional HMI/SCADA system from mySCADA, designed for visualization and control of industrial processes.
mySCADA myPRO has an access control error vulnerability that allows access to the management interface without authentication
| VAR-202502-0191 | CVE-2025-23411 | mySCADA Technologies of myPRO Cross-site request forgery vulnerability in |
CVSS V2: 7.5 CVSS V3: 6.3 Severity: Medium |
mySCADA myPRO Manager
is vulnerable to cross-site request forgery (CSRF), which could allow
an attacker to obtain sensitive information. An attacker would need to
trick the victim in to visiting an attacker-controlled website. mySCADA myPRO is a professional HMI/SCADA system from mySCADA, designed for visualization and control of industrial processes
| VAR-202502-0189 | CVE-2025-22896 | mySCADA Technologies of myPRO Vulnerability in plaintext storage of important information in |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: Critical |
mySCADA myPRO Manager
stores credentials in cleartext, which could allow an attacker to obtain sensitive information. mySCADA Technologies of myPRO There is a vulnerability in plaintext storage of important information.Information may be obtained. mySCADA myPRO is a professional HMI/SCADA system from mySCADA, designed for visualization and control of industrial processes.
mySCADA myPRO has an information leakage vulnerability due to the storage of credentials in plain text
| VAR-202502-1117 | CVE-2025-25901 | TP-LINK Technologies of TL-WR841ND Out-of-bounds write vulnerability in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11, triggered by the dnsserver1 and dnsserver2 parameters at /userRpm/WanSlaacCfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. TP-LINK Technologies of TL-WR841ND An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state
| VAR-202502-0688 | CVE-2025-25898 | TP-LINK Technologies of TL-WR841ND Out-of-bounds write vulnerability in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the pskSecret parameter at /userRpm/WlanSecurityRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. TP-LINK Technologies of TL-WR841ND An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state
| VAR-202502-1394 | CVE-2025-25897 | TP-LINK Technologies of TL-WR841ND Out-of-bounds write vulnerability in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the 'ip' parameter at /userRpm/WanStaticIpV6CfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. TP-LINK Technologies of TL-WR841ND An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state
| VAR-202502-2288 | No CVE | Qi'anxin Netshen Information Technology (Beijing) Co., Ltd. Netshen SecFox operation and maintenance security management and audit system has a command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
SecFox Operation and Maintenance Security Management and Auditing System is a comprehensive operation and maintenance management system that integrates identity authentication, account management, permission control and operation and maintenance auditing.
Qi'anxin SecFox Operation and Maintenance Security Management and Auditing System of SecFox ...
| VAR-202502-2077 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. AC8V4.0 has a binary vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
AC8V4.0 is an AC1200 dual-gigabit wireless router.
Shenzhen Jixiang Tengda Technology Co., Ltd. AC8V4.0 has a binary vulnerability that can be exploited by attackers to cause a denial of service.
| VAR-202502-1254 | CVE-2025-25343 | Shenzhen Tenda Technology Co.,Ltd. of AC6 Classic buffer overflow vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda AC6 V15.03.05.16 firmware has a buffer overflow vulnerability in the formexeCommand function. Shenzhen Tenda Technology Co.,Ltd. of AC6 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202502-1396 | CVE-2025-25741 | D-Link Systems, Inc. of dir-853 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 5.5 CVSS V3: 5.4 Severity: MEDIUM |
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the IPv6_PppoePassword parameter in the SetIPv6PppoeSettings module. D-Link Systems, Inc. D-Link DIR-853 is a router from D-Link, a Chinese company. No detailed vulnerability details are currently available
| VAR-202502-1395 | CVE-2025-25746 | D-Link Systems, Inc. of dir-853 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetWanSettings module. D-Link Systems, Inc. of dir-853 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-853 is a router from D-Link, a Chinese company. No detailed vulnerability details are currently provided
| VAR-202502-0689 | CVE-2025-25744 | D-Link Systems, Inc. of dir-853 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetDynamicDNSSettings module. D-Link Systems, Inc. of dir-853 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-853 is a router from D-Link, a Chinese company. No detailed vulnerability details are currently provided
| VAR-202502-0304 | CVE-2025-25743 | D-Link Systems, Inc. of dir-853 Command injection vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: HIGH |
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a command injection vulnerability in the SetVirtualServerSettings module. D-Link Systems, Inc. of dir-853 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-853 is a router from D-Link, a Chinese company. No detailed vulnerability details are currently available
| VAR-202502-0440 | CVE-2025-25742 | D-Link Systems, Inc. of dir-853 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the AccountPassword parameter in the SetSysEmailSettings module. D-Link Systems, Inc. of dir-853 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-853 is a router from D-Link, a Chinese company. No detailed vulnerability details are currently available
| VAR-202502-2079 | No CVE | The wireless AC controller of Shanghai Boda Data Communication Co., Ltd. has a logical defect vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Shanghai Boda Data Communication Co., Ltd. is a company that focuses on the research and development, production, sales and service of data network products.
Shanghai Boda Data Communication Co., Ltd.'s wireless AC controller has a logical defect vulnerability that can be exploited by attackers to obtain sensitive information.