VARIoT IoT vulnerabilities database
| VAR-202501-3163 | CVE-2025-0354 | NEC Aterm Multiple vulnerabilities in the series ( NV25-003 ) |
CVSS V2: - CVSS V3: 4.8 Severity: MEDIUM |
Cross-site scripting vulnerability in NEC Corporation Aterm WG2600HS Ver.1.7.2 and earlier, WG2600HP4 Ver.1.4.2 and earlier, WG2600HM4 Ver.1.4.2 and earlier, WG2600HS2 Ver.1.3.2 and earlier, WX3000HP Ver.2.4.2 and earlier and WX4200D5 Ver.1.2.4 and earlier allows a attacker to inject an arbitrary script via the network. None
| VAR-202501-3115 | CVE-2025-22997 | Linksys of E5600 Cross-site scripting vulnerability in firmware |
CVSS V2: 4.1 CVSS V3: 4.8 Severity: MEDIUM |
A stored cross-site scripting (XSS) vulnerability in the prf_table_content component of Linksys E5600 Router Ver. 1.1.0.26 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the desc parameter. Linksys E5600 is a powerful, compact and reliable WiFi 5 router from Linksys of the United States. The vulnerability is caused by the lack of effective filtering and escaping of user-provided data by the application
| VAR-202501-2163 | CVE-2024-57483 | Shenzhen Tenda Technology Co.,Ltd. of i24 Classic buffer overflow vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda i24 V2.0.0.5 is vulnerable to Buffer Overflow in the addWifiMacFilter function. Shenzhen Tenda Technology Co.,Ltd. of i24 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202501-1336 | CVE-2024-39803 | WAVLINK of WL-WN 533A8 Classic buffer overflow vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `sel_mode` POST parameter. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the sel_mode parameter of the qos.cgi qos_settings function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202501-1335 | CVE-2024-39802 | WAVLINK of WL-WN 533A8 Classic buffer overflow vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `qos_dat` POST parameter. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the qos_dat parameter of the qos.cgi qos_settings function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202501-1334 | CVE-2024-39801 | WAVLINK of WL-WN 533A8 Classic buffer overflow vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `qos_bandwidth` POST parameter. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the qos_bandwidth parameter of the qos.cgi qos_settings function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202501-1313 | CVE-2024-39800 | WAVLINK of WL-WN 533A8 Firmware vulnerabilities related to external control of system configuration or settings |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple external config control vulnerabilities exists in the openvpn.cgi openvpn_server_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `open_port` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company.
WAVLINK AC3000 has an external configuration control vulnerability, which stems from the fact that the open_port parameter of the openvpn.cgi openvpn_server_setup function fails to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to execute arbitrary commands
| VAR-202501-1312 | CVE-2024-39799 | WAVLINK of WL-WN 533A8 Firmware vulnerabilities related to external control of system configuration or settings |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple external config control vulnerabilities exists in the openvpn.cgi openvpn_server_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `sel_open_interface` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company.
WAVLINK AC3000 has an external configuration control vulnerability, which stems from the fact that the sel_open_interface parameter of the openvpn.cgi openvpn_server_setup function fails to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to execute arbitrary commands
| VAR-202501-1311 | CVE-2024-39798 | WAVLINK of WL-WN 533A8 Firmware vulnerabilities related to external control of system configuration or settings |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple external config control vulnerabilities exists in the openvpn.cgi openvpn_server_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `sel_open_protocol` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company.
WAVLINK AC3000 has an external configuration control vulnerability, which stems from the fact that the sel_open_protocol parameter of the openvpn.cgi openvpn_server_setup function fails to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to execute arbitrary commands
| VAR-202501-1296 | CVE-2024-39795 | WAVLINK of WL-WN 533A8 Firmware vulnerabilities related to external control of system configuration or settings |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple external config control vulnerabilities exist in the nas.cgi set_nas() proftpd functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `ftp_max_sessions` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
| VAR-202501-1294 | CVE-2024-39794 | WAVLINK of WL-WN 533A8 Firmware vulnerabilities related to external control of system configuration or settings |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple external config control vulnerabilities exist in the nas.cgi set_nas() proftpd functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `ftp_port` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
| VAR-202501-1295 | CVE-2024-39793 | WAVLINK of WL-WN 533A8 Firmware vulnerabilities related to external control of system configuration or settings |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple external config control vulnerabilities exist in the nas.cgi set_nas() proftpd functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `ftp_name` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
| VAR-202501-1316 | CVE-2024-39790 | WAVLINK of WL-WN 533A8 Firmware vulnerabilities related to external control of system configuration or settings |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple external config control vulnerabilities exist in the nas.cgi set_ftp_cfg() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists within the `ftp_max_sessions` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
| VAR-202501-1314 | CVE-2024-39789 | WAVLINK of WL-WN 533A8 Firmware vulnerabilities related to external control of system configuration or settings |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple external config control vulnerabilities exist in the nas.cgi set_ftp_cfg() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists within the `ftp_port` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
| VAR-202501-1315 | CVE-2024-39788 | WAVLINK of WL-WN 533A8 Firmware vulnerabilities related to external control of system configuration or settings |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple external config control vulnerabilities exist in the nas.cgi set_ftp_cfg() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists within the `ftp_name` POST parameter. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
| VAR-202501-1298 | CVE-2024-39787 | WAVLINK of WL-WN 533A8 Path traversal vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple directory traversal vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A directory traversal vulnerability exists within the `disk_part` POST parameter. WAVLINK of WL-WN 533A8 A path traversal vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company.
WAVLINK AC3000 M33A8.V5030.210505 version has a path traversal vulnerability, which is caused by the disk_part parameter of the nas.cgi add_dir function failing to properly filter special elements in the resource or file path. Attackers can exploit this vulnerability to cause arbitrary file reading
| VAR-202501-1297 | CVE-2024-39786 | WAVLINK of WL-WN 533A8 Path traversal vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple directory traversal vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A directory traversal vulnerability exists within the `adddir_name` POST parameter. WAVLINK of WL-WN 533A8 A path traversal vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company.
WAVLINK AC3000 has a path traversal vulnerability, which is caused by the fact that the adddir_name parameter of the nas.cgi add_dir function fails to properly filter special elements in the resource or file path. An attacker can exploit this vulnerability to read arbitrary files
| VAR-202501-1366 | CVE-2024-39785 | WAVLINK of WL-WN 533A8 Injection Vulnerability in Firmware |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple command execution vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the adddir_name POST parameter. WAVLINK of WL-WN 533A8 Firmware has an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company.
There is a command injection vulnerability in the WAVLINK AC3000 M33A8.V5030.210505 version. The vulnerability is caused by the adddir_name parameter of the nas.cgi add_dir function failing to properly filter special characters and commands in the constructed command
| VAR-202501-1365 | CVE-2024-39784 | WAVLINK of WL-WN 533A8 Injection Vulnerability in Firmware |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: CRITICAL |
Multiple command execution vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the disk_part POST parameter. WAVLINK of WL-WN 533A8 Firmware has an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company.
There is a command injection vulnerability in the WAVLINK AC3000 M33A8.V5030.210505 version. The vulnerability is caused by the disk_part parameter of the nas.cgi add_dir function failing to properly filter special characters and commands in the constructed command
| VAR-202501-1337 | CVE-2024-39783 | WAVLINK of WL-WN 533A8 Command injection vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 9.1 Severity: CRITICAL |
Multiple OS command injection vulnerabilities exist in the adm.cgi sch_reboot() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a arbitrary code execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `restart_week` POST parameter. WAVLINK of WL-WN 533A8 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the restart_week parameter of the adm.cgi sch_reboot function failing to properly filter special characters and commands in the constructed command. An attacker can exploit this vulnerability to cause arbitrary command execution