VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202512-2468 CVE-2025-15076 CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A weakness has been identified in Tenda CH22 1.0.0.1. Impacted is an unknown function of the file /public/. Executing a manipulation can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
VAR-202512-5280 CVE-2025-50526 CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Netgear EX8000 V1.0.0.126 was discovered to contain a command injection vulnerability via the switch_status function.
VAR-202512-5175 CVE-2025-45493 CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
Netgear EX8000 V1.0.0.126 is vulnerable to Command Injection via the iface parameter in the action_bandwidth function.
VAR-202512-3707 CVE-2025-59886 Eaton of xComfort Ethernet Communication Interface Input verification vulnerability in CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
Improper input validation at one of the endpoints of Eaton xComfort ECI's web interface, could lead into an attacker with network access to the device executing privileged user commands.  As cybersecurity standards continue to evolve and to meet our requirements today, Eaton has decided to discontinue the product. Upon retirement or end of support, there will be no new security updates, non-security updates, or paid assisted support options, or online technical content updates. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202512-2430 CVE-2025-14994 CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A flaw has been found in Tenda FH1201 and FH1206 1.2.0.14(408)/1.2.0.8(8155). This impacts the function strcat of the file /goform/webtypelibrary of the component HTTP Request Handler. This manipulation of the argument webSiteId causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used.
VAR-202512-2348 CVE-2025-14993 CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was detected in Tenda AC18 15.03.05.05. This affects the function sprintf of the file /goform/SetDlnaCfg of the component HTTP Request Handler. The manipulation of the argument scanList results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.
VAR-202512-2405 CVE-2025-14992 CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security vulnerability has been detected in Tenda AC18 15.03.05.05. The impacted element is the function strcpy of the file /goform/GetParentControlInfo of the component HTTP Request Handler. The manipulation of the argument mac leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
VAR-202512-2524 CVE-2025-8065 TP-LINK Technologies of tapo c200  Multiple vulnerabilities in firmware CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
A buffer overflow vulnerability exists in the ONVIF XML parser of Tapo C200 V3. An unauthenticated attacker on the same local network segment can send specially crafted SOAP XML requests, causing memory overflow and device crash, resulting in denial-of-service (DoS). Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202512-2607 CVE-2025-14300 TP-LINK Technologies of tapo c200  Vulnerability related to lack of authentication for critical functions in firmware CVSS V2: -
CVSS V3: 8.1
Severity: HIGH
The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS). However, all information handled by the software may be rewritten. Furthermore, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability do not affect other software
VAR-202512-2773 CVE-2025-14299 TP-LINK Technologies of tapo c200  Multiple vulnerabilities in firmware CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS). Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202512-2302 CVE-2025-14910 EDIMAX Technology of BR-6208AC  Path traversal vulnerability in firmware CVSS V2: 4.0
CVSS V3: 4.3
Severity: Low
A vulnerability was detected in Edimax BR-6208AC 1.02. This impacts the function handle_retr of the component FTP Daemon Service. The manipulation results in path traversal. The attack may be launched remotely. The exploit is now public and may be used. Edimax confirms this issue: "This product is no longer available in the market and has been discontinued for five years. Consequently, Edimax no longer provides technical support, firmware updates, or security patches for this specific model. However, to ensure the safety of our remaining active users, we acknowledge this report and will take the following mitigation actions: (A) We will issue an official security advisory on our support website. (B) We will strongly advise users to disable the FTP service on this device to mitigate the reported risk, by which the product will still work for common use. (C) We will recommend users upgrade to newer, supported models." This vulnerability only affects products that are no longer supported by the maintainer. Exploits for this vulnerability are currently publicly available and may be exploited in the wild. 5 It was discontinued years ago. In addition, information handled by the software will not be rewritten. Furthermore, the software will not stop. Furthermore, attacks exploiting this vulnerability will not affect other software
VAR-202512-3503 CVE-2025-14738 TP-LINK Technologies of TL-WA850RE  Authentication vulnerability in firmware CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows unauthenticated attackers to download the configuration file.This issue affects: ≤ WA850RE V2_160527, ≤ WA850RE V3_160922. This issue is addressed in: WA850RE V2_160527 and WA850RE V3_160922 The following versions are affected:All information handled by the software may be leaked to the outside. In addition, information handled by the software will not be rewritten. Furthermore, the software will not stop. Furthermore, attacks exploiting this vulnerability will not affect other software
VAR-202512-4914 CVE-2025-14737 TP-LINK Technologies of TL-WA850RE  in the firmware OS  Command injection vulnerability CVSS V2: -
CVSS V3: 8.0
Severity: HIGH
Command Injection vulnerability in TP-Link WA850RE (httpd modules) allows authenticated adjacent attacker to inject arbitrary commands.This issue affects: ≤ WA850RE V2_160527, ≤ WA850RE V3_160922. This issue is addressed in: WA850RE V2_160527 and WA850RE V3_160922 The following versions are affected:All information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202512-2256 CVE-2025-14884 D-Link Corporation of DIR-605  Multiple vulnerabilities in firmware CVSS V2: 8.3
CVSS V3: 7.2
Severity: High
A vulnerability was detected in D-Link DIR-605 202WWB03. Affected by this issue is some unknown functionality of the component Firmware Update Service. Performing manipulation results in command injection. The attack can be initiated remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. Furthermore, an exploit has been published, which suggests that it can be exploited in the wild. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202512-4010 CVE-2025-47320 Qualcomm's 9206 lte modem  Vulnerabilities related to out-of-bounds writes in multiple firmware and other products CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Memory corruption while processing MFC channel configuration during music playback. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202512-3922 CVE-2025-67074 CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in Tenda AC10V4.0 V16.03.10.20 allows remote attackers to cause denial of service and possibly code execution by sending a post request with a crafted payload (field `serverName`) to /goform/AdvSetMacMtuWan.
VAR-202512-4721 CVE-2025-67073 CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in Tenda AC10V4.0 V16.03.10.20 allows remote attackers to cause denial of service and possibly code execution by sending a post request with a crafted payload (field `serviceName`) to /goform/AdvSetMacMtuWan.
VAR-202512-0551 CVE-2025-14656 Shenzhen Tenda Technology Co.,Ltd.  of  AC20  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A weakness has been identified in Tenda AC20 16.03.08.12. This affects the function httpd of the file /goform/openSchedWifi. Executing a manipulation of the argument schedStartTime/schedEndTime can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. Shenzhen Tenda Technology Co.,Ltd. of AC20 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202512-0138 CVE-2025-14655 CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security flaw has been discovered in Tenda AC20 16.03.08.12. The impacted element is the function formSetRebootTimer of the file /goform/SetSysAutoRebbotCfg of the component httpd. Performing a manipulation of the argument rebootTime results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
VAR-202512-0141 CVE-2025-14586 TOTOLINK  of  X5000R  Command injection vulnerability in firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was determined in TOTOLINK X5000R 9.1.0cu.2089_B20211224. Affected by this issue is the function snprintf of the file /cgi-bin/cstecgi.cgi?action=exportOvpn&type=user. This manipulation of the argument User causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. TOTOLINK of X5000R The firmware contains a command injection vulnerability. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state