VARIoT IoT vulnerabilities database
| VAR-202512-0794 | CVE-2025-11781 |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Use of hardcoded cryptographic keys in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. The affected firmware contains a hardcoded static authentication key. An attacker with local access to the device can extract this key (e.g., by analysing the firmware image or memory dump) and create valid firmware update packages. This bypasses all intended access controls and grants full administrative privileges.
| VAR-202512-5314 | CVE-2025-11780 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. In the 'showMeterReport()' function, there is an unlimited user input that is copied to a fixed-size buffer via 'sprintf()'. The 'GetParameter(meter)' function retrieves the user input, which is directly incorporated into a buffer without size validation. An attacker can provide an excessively large input for the “meter” parameter.
| VAR-202512-1580 | CVE-2025-11779 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Stack-based buffer overflow vulnerability in CircutorSGE-PLC1000/SGE-PLC50 v9.0.2. The 'SetLan' function is invoked when a new configuration is applied. This new configuration function is activated by a management web request, which can be invoked by a user when making changes to the 'index.cgi' web application. The parameters are not being sanitised, which could lead to command injection.
| VAR-202512-4327 | CVE-2025-11778 |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Stack-based buffer overflow in Circutor SGE-PLC1000/SGE-PLC50 v0.9.2. This vulnerability allows an attacker to remotely exploit memory corruption through the 'read_packet()' function of the TACACSPLUS implementation.
| VAR-202512-2040 | CVE-2025-20792 |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01717526; Issue ID: MSV-5591.
| VAR-202512-1517 | CVE-2025-20791 |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01661189; Issue ID: MSV-4298.
| VAR-202512-2961 | CVE-2025-20790 |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01677581; Issue ID: MSV-4701.
| VAR-202512-0999 | CVE-2025-20759 |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673760; Issue ID: MSV-4650.
| VAR-202512-0754 | CVE-2025-20758 |
CVSS V2: - CVSS V3: 4.9 Severity: MEDIUM |
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673755; Issue ID: MSV-4647.
| VAR-202512-5347 | CVE-2025-20757 |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673751; Issue ID: MSV-4644.
| VAR-202512-1246 | CVE-2025-20756 |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673749; Issue ID: MSV-4643.
| VAR-202512-1793 | CVE-2025-20755 |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
In Modem, there is a possible application crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00628396; Issue ID: MSV-4775.
| VAR-202512-2964 | CVE-2025-20754 |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
In Modem, there is a possible system crash due to an incorrect bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689251; Issue ID: MSV-4840.
| VAR-202512-2043 | CVE-2025-20753 |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689252; Issue ID: MSV-4841.
| VAR-202512-1520 | CVE-2025-20752 |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01270690; Issue ID: MSV-4301.
| VAR-202512-3498 | CVE-2025-20751 |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01661195; Issue ID: MSV-4297.
| VAR-202512-3741 | CVE-2025-20750 |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01661199; Issue ID: MSV-4296.
| VAR-202512-0943 | CVE-2025-58483 |
CVSS V2: - CVSS V3: 5.9 Severity: MEDIUM |
Improper export of android application components in Galaxy Store for Galaxy Watch prior to version 1.0.06.29 allows local attacker to install arbitrary application on Galaxy Store.
| VAR-202512-0181 | CVE-2025-55222 | Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: HIGH |
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP USB Function functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to a denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.This vulnerability is specific to the malicious message sent via Modbus RTU over TCP on port 503. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power and communication functions into a single unit.
The Socomec DIRIS Digiware M-70 contains a denial-of-service vulnerability stemming from the Modbus RTU over TCP USB function's failure to properly restrict resource access packets from unauthorized roles. An attacker could exploit this vulnerability to cause a denial-of-service attack
| VAR-202512-0182 | CVE-2025-55221 | Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30454) |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: HIGH |
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP USB Function functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to a denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.This vulnerability is specific to the malicious message sent via Modbus TCP over port 502. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit. An attacker could exploit this vulnerability to cause a denial-of-service attack