VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202510-2324 CVE-2025-12234 Tenda CH22 fromSafeMacFilter function buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been found in Tenda CH22 1.0.0.1. This affects the function fromSafeMacFilter of the file /goform/SafeMacFilter. The manipulation of the argument page leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. This vulnerability stems from the fact that the `page` parameter of the `fromSafeMacFilter` function in the `/goform/SafeMacFilter` file fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2191 CVE-2025-12233 Tenda CH22 fromSafeUrlFilter function buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A flaw has been found in Tenda CH22 1.0.0.1. Affected by this issue is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. Executing manipulation of the argument page can lead to buffer overflow. The attack can be launched remotely. The exploit has been published and may be used. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. Version 1.0.0.1 of the Tenda CH22 contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `page` parameter of the function `fromSafeUrlFilter` in the file `/goform/SafeUrlFilter` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2187 CVE-2025-12232 Tenda CH22 buffer overflow vulnerability in the fromSafeClientFilter function CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was detected in Tenda CH22 1.0.0.1. Affected by this vulnerability is the function fromSafeClientFilter of the file /goform/SafeClientFilter. Performing manipulation of the argument page results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. This vulnerability stems from the fact that the `page` parameter of the function `fromSafeClientFilter` in the file `/goform/SafeClientFilter` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2306 CVE-2025-12225 Tenda AC6 buffer overflow vulnerability (CNVD-2025-26160) CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been found in Tenda AC6 15.03.06.50. This issue affects some unknown processing of the file /goform/WifiGuestSet of the component HTTP Request Handler. Such manipulation of the argument shareSpeed leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The Tenda AC6 is a wireless router manufactured by Tenda, a Chinese company. This vulnerability stems from the fact that the parameter `shareSpeed` in the file `/goform/WifiGuestSet` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2151 CVE-2025-12214 Tenda O3 buffer overflow vulnerability (CNVD-2025-26876) CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was detected in Tenda O3 1.0.0.10(2478). This issue affects the function SetValue/GetValue of the file /goform/sysAutoReboot. Performing manipulation of the argument enable results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used. The Tenda O3 is an outdoor wireless bridge manufactured by Tenda, a Chinese company. This vulnerability stems from the fact that the `enable` parameter in the functions `SetValue` and `GetValue` in the file `/goform/sysAutoReboot` fails to properly validate the length of the input data. An attacker could exploit this vulnerability to cause a stack overflow
VAR-202510-2244 CVE-2025-12213 Tenda O3 buffer overflow vulnerability (CNVD-2025-26877) CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security vulnerability has been detected in Tenda O3 1.0.0.10(2478). This vulnerability affects the function SetValue/GetValue of the file /goform/setVlanConfig. Such manipulation of the argument lan leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. The Tenda O3 is an outdoor wireless bridge manufactured by Tenda, a Chinese company. This vulnerability stems from the fact that the `lan` parameter in the file `/goform/setVlanConfig` fails to properly validate the length of the input data. An attacker could exploit this vulnerability to cause a stack overflow
VAR-202510-2178 CVE-2025-12212 Tenda O3 formsetNetworkService function buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A weakness has been identified in Tenda O3 1.0.0.10(2478). This affects the function SetValue/GetValue of the file /goform/setNetworkService. This manipulation of the argument upnpEn causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The Tenda O3 is an outdoor wireless bridge from Tenda, a Chinese company. Tenda O3 version 1.0.0.10 contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `upnpEn` parameter in the `SetValue`/`GetValue` function of the file `/goform/setNetworkService` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2210 CVE-2025-12211 Tenda O3 formsetDmzInfo function buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security flaw has been discovered in Tenda O3 1.0.0.10(2478). Affected by this issue is the function SetValue/GetValue of the file /goform/setDmzInfo. The manipulation of the argument dmzIP results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited. The Tenda O3 is an outdoor wireless bridge from Tenda, a Chinese company. Tenda O3 version 1.0.0.10 contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `dmzIP` parameter in the `SetValue/GetValue` function of the file `/goform/setDmzInfo` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2216 CVE-2025-12210 Tenda O3 formAdvSetLanip function buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was identified in Tenda O3 1.0.0.10(2478). Affected by this vulnerability is the function SetValue/GetValue of the file /goform/AdvSetLanip. The manipulation of the argument lanIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The Tenda O3 is an outdoor wireless bridge from Tenda, a Chinese company. This vulnerability stems from the fact that the `lanIp` parameter in the `SetValue`/`GetValue` function of the file `/goform/AdvSetLanip` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2084 CVE-2025-12209 Tenda O3 form/setDhcpConfig function buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was determined in Tenda O3 1.0.0.10(2478). Affected is the function SetValue/GetValue of the file /goform/setDhcpConfig. Executing manipulation of the argument dhcpEn can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The Tenda O3 is an outdoor wireless bridge from Tenda, a Chinese company. This vulnerability stems from the fact that the `dhcpEn` parameter in the `SetValue/GetValue` function of the file `/goform/setDhcpConfig` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-4376 CVE-2025-12285 An unidentified vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29093). CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Missing Initial Password Change.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. A security vulnerability exists in both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4, stemming from a lack of initial password change functionality. Detailed vulnerability information is not currently available
VAR-202510-2967 CVE-2025-12284 Cross-site scripting vulnerabilities in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 CVSS V2: 6.4
CVSS V3: 6.1
Severity: MEDIUM
Lack of Input Validation in the web UI might lead to potential exploitation.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a cross-site scripting (XSS) vulnerability caused by improper validation of user-supplied input. Detailed vulnerability information is not currently available
VAR-202510-3391 CVE-2025-12278 An unidentified vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29094). CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
Logout Functionality not Working.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. A security vulnerability exists in both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4, stemming from a malfunction in the logout function. Detailed vulnerability information is not currently available
VAR-202510-2968 CVE-2025-12275 Command execution vulnerabilities in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Mail Configuration File Manipulation + Command Execution.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. A command execution vulnerability exists in both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4, caused by improper input validation. An attacker could exploit this vulnerability to execute arbitrary commands and manipulate email configurations
VAR-202510-4373 CVE-2025-12221 Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 Cross-Site Request Forgery Vulnerabilities (CNVD-2025-29095) CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
Busybox 1.31.1 - Multiple Known Vulnerabilities.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a cross-site request forgery (XPS) vulnerability caused by improper validation of user-provided input. An attacker could exploit this vulnerability to perform unauthorized actions by sending malformed HTTP requests
VAR-202510-2969 CVE-2025-12220 An unidentified vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29091). CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Busybox 1.31.1 - Multiple Known Vulnerabilities.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. A security vulnerability exists in both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4, stemming from their reliance on the vulnerable third-party component Busybox. Detailed vulnerability information is not currently available
VAR-202510-2544 CVE-2025-12218 An undiscovered vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29090). CVSS V2: 9.4
CVSS V3: 9.1
Severity: CRITICAL
Weak Default Credentials.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. A security vulnerability exists in both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4, stemming from the use of weak default credentials. Detailed vulnerability information is not currently available
VAR-202510-3185 CVE-2025-12217 An unidentified vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29092). CVSS V2: 9.4
CVSS V3: 9.1
Severity: CRITICAL
SNMP Default Community String (public).This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a security vulnerability stemming from the use of a default SNMP community string. An attacker could exploit this vulnerability to gain unauthorized access
VAR-202510-2770 CVE-2025-12216 Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 Denial-of-Service Vulnerabilities (CNVD-2025-29089) CVSS V2: 4.9
CVSS V3: 5.5
Severity: MEDIUM
Malicious / Malformed App can be Installed but not Uninstalled/may lead to unavailability.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a denial-of-service vulnerability. This vulnerability stems from the fact that malicious or malformed applications can be installed but not uninstalled, allowing attackers to exploit this vulnerability to render the service unavailable
VAR-202510-2089 CVE-2025-60566 D-Link DIR600L formSetMACFilter function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetMACFilter. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formSetMACFilter` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack