VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202510-2088 CVE-2025-60547 D-Link DIR600L formSetWAN_Wizard7 function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWAN_Wizard7. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formSetWAN_Wizard7` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-3393 CVE-2025-12176 An unidentified vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29088). CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Undocumented administrative accounts were getting created to facilitate access for applications running on board.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Attackers could exploit this vulnerability to gain unauthorized access
VAR-202510-2193 CVE-2025-60572 D-Link DIR600L formAdvNetwork function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAdvNetwork. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formAdvNetwork` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2281 CVE-2025-60571 D-Link DIR600L formSetQoS function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600LAx FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetQoS. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. This vulnerability stems from the fact that the `curTime` parameter in the `formSetQoS` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2358 CVE-2025-60570 D-Link DIR600L formLogDnsquery function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formLogDnsquery. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formLogDnsquery` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2251 CVE-2025-60569 D-Link DIR600L formSetRoute function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetRoute. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formSetRoute` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2149 CVE-2025-60568 D-Link DIR600L formAdvFirewall function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAdvFirewall. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formAdvFirewall` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-4397 No CVE Huawei Technologies Co., Ltd.'s Huawei HG532n has a weak password vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Huawei HG532n is a SOHO-class wireless router designed for home users. The Huawei HG532n, manufactured by Huawei Technologies Co., Ltd., has a weak password vulnerability that attackers could exploit to obtain sensitive information.
VAR-202510-4378 No CVE Mosa Technology (Shanghai) Co., Ltd.'s ioLogik E1200 series has an unauthorized access vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The ioLogik E1200 series is an industrial Ethernet remote I/O device designed for flexible data acquisition and device communication, suitable for various scenarios such as factory automation, security monitoring, and energy management. Mosa Technologies (Shanghai) Co., Ltd.'s ioLogik E1200 series contains an unauthorized access vulnerability, which attackers could exploit to obtain sensitive information.
VAR-202510-4377 CVE-2025-12114 Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 information disclosure vulnerabilities (CNVD-2025-29086) CVSS V2: 4.6
CVSS V3: 5.5
Severity: MEDIUM
Enabled serial console could potentially leak information that might help attacker to find vulnerabilities.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain an information disclosure vulnerability caused by a flaw in the serial console. Attackers could exploit this vulnerability to obtain sensitive information
VAR-202510-2546 CVE-2025-12104 An unidentified vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29085). CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Outdated and Vulnerable UI Dependencies might potentially lead to exploitation.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. A security vulnerability exists in both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4. Detailed vulnerability information is not currently available
VAR-202510-2278 CVE-2025-60343 Tenda AC6 AdvSetMacMtuWan function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Multiple buffer overflows in the AdvSetMacMtuWan function of Tenda AC6 v.15.03.06.50 allows attackers to cause a Denial of Service (DoS) via injecting a crafted payload into the wanMTU, wanSpeed, cloneType, mac, serviceName, serverName, wanMTU2, wanSpeed2, cloneType2, mac2, serviceName2, and serverName2 parameters. The Tenda AC6 is a wireless router manufactured by Tenda, a Chinese company. Version 15.03.06.50 of the Tenda AC6 contains a buffer overflow vulnerability. This vulnerability stems from the AdvSetMacMtuWan function failing to properly validate the length of input data. Attackers could exploit this vulnerability to execute arbitrary code or cause a denial-of-service attack
VAR-202510-2248 CVE-2025-60342 Tenda AC6 addressNat function stack buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda AC6 V2.0 15.03.06.50 was discovered to contain a stack overflow in the page parameter in the addressNat function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. The Tenda AC6 is a dual-band wireless router from Tenda, designed specifically for home users with 100Mbps fiber optic connections. This vulnerability stems from the page parameter in the addressNat function failing to properly validate the length of the input data
VAR-202510-2215 CVE-2025-60341 Tenda AC6 fast_setting_wifi_set function stack buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda AC6 V2.0 15.03.06.50 was discovered to contain a stack overflow in the ssid parameter in the fast_setting_wifi_set function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. The Tenda AC6 is a dual-band wireless router from Tenda, designed specifically for home users with 100Mbps fiber optic connections. This vulnerability stems from the fact that the SSID parameter in the `fast_setting_wifi_set` function fails to properly validate the length of the input data
VAR-202510-2250 CVE-2025-60340 Tenda AC6 SetClientState function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Multiple buffer overflows in the SetClientState function of Tenda AC6 v.15.03.06.50 allows attackers to cause a Denial of Service (DoS) via injecting a crafted payload into the limitSpeed, deviceId, and limitSpeedUp parameters. The Tenda AC6 is a wireless router manufactured by Tenda, a Chinese company. Version 15.03.06.50 of the Tenda AC6 contains a buffer overflow vulnerability. This vulnerability stems from the SetClientState function's failure to properly validate the length of input data. Attackers could exploit this vulnerability to execute arbitrary code or cause a denial-of-service attack
VAR-202510-2335 CVE-2025-60339 Tenda AC6 openSchedWifi function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Multiple buffer overflow vulnerabilities in the openSchedWifi function of Tenda AC6 v.15.03.06.50 allows attackers to cause a Denial of Service (DoS) via injecting a crafted payload into the schedStartTime and schedEndTime parameters. The Tenda AC6 is a wireless router manufactured by Tenda, a Chinese company. Version 15.03.06.50 of the Tenda AC6 contains a buffer overflow vulnerability. This vulnerability stems from the openSchedWifi function failing to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code or cause a denial-of-service attack
VAR-202510-2086 CVE-2025-60337 Tenda AC6 SetSpeedWan function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda AC6 V2.0 15.03.06.50 was discovered to contain a buffer overflow in the speed_dir parameter in the SetSpeedWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. The Tenda AC6 is a wireless router manufactured by Tenda, a Chinese company. This vulnerability stems from the fact that the `speed_dir` parameter in the `SetSpeedWan` function fails to properly validate the length of the input data
VAR-202510-2385 CVE-2025-60336 TOTOLINK N600R sub_41773C function null pointer dereference vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A NULL pointer dereference in the sub_41773C function of TOTOLINK N600R v4.3.0cu.7866_B20220506 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The TOTOLINK N600R is a dual-band wireless router launched by the South Korean brand TOTOLINK in 2013. It supports concurrent operation on both 2.4GHz and 5GHz bands, with a maximum wireless transmission rate of 300Mbps. The TOTOLINK N600R contains a null pointer dereference vulnerability
VAR-202510-2145 CVE-2025-60338 Tenda AC6 DhcpListClient function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda AC6 V2.0 15.03.06.50 was discovered to contain a stack overflow in the page parameter in the DhcpListClient function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. The Tenda AC6 is a wireless router manufactured by Tenda, a Chinese company. Version 15.03.06.50 of the Tenda AC6 contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `page` parameter in the `DhcpListClient` function fails to properly validate the length of the input data
VAR-202510-2249 CVE-2025-60335 TOTOLINK N600R main function null pointer dereference vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A NULL pointer dereference in the main function of TOTOLINK N600R v4.3.0cu.7866_B20220506 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The TOTOLINK N600R is a dual-band wireless router launched by the South Korean brand TOTOLINK in 2013. It supports concurrent operation on both 2.4GHz and 5GHz bands, with a maximum wireless transmission rate of 300Mbps. The TOTOLINK N600R contains a null pointer dereference vulnerability