VARIoT IoT vulnerabilities database
| VAR-202501-2770 | CVE-2024-57677 | D-Link Systems, Inc. of DIR-816 Fraudulent Authentication Vulnerability in Firmware |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
An access control issue in the component form2Wan.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the wan service of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 An incorrect authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. D-Link DIR-816A2 is a router from D-Link, a Chinese company.
D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the form2Wan.cgi component
| VAR-202501-2978 | CVE-2024-57676 | D-Link Systems, Inc. of DIR-816 Fraudulent Authentication Vulnerability in Firmware |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
An access control issue in the component form2WlanBasicSetup.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G wlan service of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 An incorrect authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. D-Link DIR-816A2 is a router from D-Link, a Chinese company.
D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the form2WlanBasicSetup.cgi component
| VAR-202501-1996 | CVE-2024-48885 | Path traversal vulnerability in multiple Fortinet products |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
A improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiRecorder 7.2.0 through 7.2.1, FortiRecorder 7.0.0 through 7.0.4, FortiVoice 7.0.0 through 7.0.4, FortiVoice 6.4.0 through 6.4.9, FortiVoice 6.0 all versions, FortiWeb 7.6.0, FortiWeb 7.4.0 through 7.4.4, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions, FortiWeb 6.4 all versions allows attacker to escalate privilege via specially crafted packets. FortiManager , FortiManager Cloud , FortiProxy There is a path traversal vulnerability in several Fortinet products, including:Information is tampered with and service operation is interrupted (DoS) It may be in a state
| VAR-202501-4394 | No CVE | Netgear EX6120 WiFi Range Extender has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Netgear EX6120 WiFi Range Extender is a dual-band 1200Mbps WiFi range extender.
Netgear EX6120 WiFi Range Extender has a weak password vulnerability that can be exploited by attackers to obtain sensitive information.
| VAR-202501-1431 | CVE-2025-0492 | D-Link Corporation of DIR-823X Improper Shutdown and Release of Resources in Firmware Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: High |
A vulnerability has been found in D-Link DIR-823X 240126/240802 and classified as critical. Affected by this vulnerability is the function FUN_00412244. The manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. D-Link Corporation of DIR-823X The firmware contains vulnerabilities related to improper shutdown and release of resources, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. D-Link DIR-823X is a wireless router from D-Link, a Chinese company. No detailed vulnerability details are currently available
| VAR-202501-1452 | CVE-2025-0481 | D-Link Systems, Inc. of DIR-878 Information disclosure vulnerability in firmware |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: Medium |
A vulnerability classified as problematic has been found in D-Link DIR-878 1.03. Affected is an unknown function of the file /dllog.cgi of the component HTTP POST Request Handler. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-878 The firmware contains vulnerabilities related to information leakage and access control.Information may be obtained. D-Link DIR-878 is a wireless router from D-Link, a Chinese company. Attackers can exploit this vulnerability to obtain sensitive information
| VAR-202501-2166 | CVE-2024-57025 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "desc" parameter in setWiFiScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
| VAR-202501-3190 | CVE-2024-57024 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "eMinute" parameter in setWiFiScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
| VAR-202501-1634 | CVE-2024-57023 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "week" parameter in setWiFiScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
| VAR-202501-1547 | CVE-2024-57022 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "sHour" parameter in setWiFiScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
| VAR-202501-1794 | CVE-2024-57021 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "eHour" parameter in setWiFiScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
| VAR-202501-1565 | CVE-2024-57020 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "sMinute" parameter in setWiFiScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
| VAR-202501-1654 | CVE-2024-57019 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "limit" parameter in setVpnAccountCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
| VAR-202501-2779 | CVE-2024-57018 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "desc" parameter in setVpnAccountCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
| VAR-202501-1508 | CVE-2024-57017 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "pass" parameter in setVpnAccountCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
| VAR-202501-2167 | CVE-2024-57016 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "user" parameter in setVpnAccountCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
| VAR-202501-1509 | CVE-2024-57015 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "hour" parameter in setScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
| VAR-202501-1520 | CVE-2024-57014 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "recHour" parameter in setScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
| VAR-202501-1639 | CVE-2024-57013 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "switch" parameter in setScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
| VAR-202501-1579 | CVE-2024-57012 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "week" parameter in setScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution