VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202510-0527 No CVE Netis Systems Co., Ltd. Netis E3 has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
The Netis E3 is a Gigabit dual-band wireless router that supports MU-MIMO and Beamforming, providing high-speed Wi-Fi coverage for homes and small, medium-sized offices (SOHOs). The Netis E3, manufactured by Netis Systems Co., Ltd., contains a command execution vulnerability that could allow an attacker to gain server privileges.
VAR-202510-0526 No CVE HP Development Company, L.P. HP 2530-48G Switch (J9775A) has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The HP 2530-48G Switch (J9775A) is a 48-port Gigabit Layer 3 switch that supports PoE+, ACLs, and IPv6, providing highly reliable networks for enterprise access layers. HP Development Company, L.P. The HP 2530-48G Switch (J9775A) has an unauthorized access vulnerability that could allow an attacker to obtain sensitive information.
VAR-202510-4302 No CVE Canon (China) Co., Ltd.'s Canon MF745C/746C has a weak password vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Canon MF745C/746C is a color laser multifunction printer that supports printing, copying, scanning, and faxing. Canon (China) Co., Ltd.'s Canon MF745C/746C printers contain a weak password vulnerability that attackers could exploit to obtain sensitive information.
VAR-202510-2816 No CVE Beijing Star-Net Ruijie Networks Technology Co., Ltd.'s RG-MA3063 has a logical flaw vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The RG-MA3063 is a home router. The RG-MA3063 router, manufactured by Beijing Star-Net Ruijie Networks Technology Co., Ltd., contains a logical flaw vulnerability that attackers could exploit to obtain sensitive information.
VAR-202510-3742 No CVE Brother (China) Commercial Co., Ltd.'s DCP-T536DW has an unauthorized access vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Brother DCP-T536DW is a full-featured color inkjet multifunction printer. The Brother (China) Commercial Co., Ltd.'s Brother DCP-T536DW contains an unauthorized access vulnerability that could be exploited by attackers to obtain sensitive information.
VAR-202510-3540 No CVE Brother (China) Commercial Co., Ltd.'s DCP-T730DW has an unauthorized access vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Brother (China) Commercial Co., Ltd. DCP-T730DW is a color inkjet multifunction printer that integrates printing, copying, and scanning functions. The Brother (China) Commercial Co., Ltd. DCP-T730DW contains an unauthorized access vulnerability that could be exploited by attackers to obtain sensitive information.
VAR-202510-3243 No CVE Brother (China) Commercial Co., Ltd.'s MFC-T930DW has an unauthorized access vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The MFC-T930DW is a color inkjet multifunction printer. Brother (China) Commercial Co., Ltd.'s MFC-T930DW printer contains an unauthorized access vulnerability that could be exploited by attackers to obtain sensitive information.
VAR-202510-3024 No CVE A command execution vulnerability exists in the DCME-720 processor developed by Beijing Digital China Cloud Technology Co., Ltd. CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
The DCME-720 is a next-generation high-performance internet egress gateway. The DCME-720 developed by Beijing Digital China Cloud Technology Co., Ltd. contains a command execution vulnerability, which attackers could exploit to execute arbitrary commands.
VAR-202510-0326 CVE-2025-59300 Delta Electronics, INC.  of  DIAScreen  Out-of-bounds write vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process. Delta Electronics, INC. of DIAScreen Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DIAScreen. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of DPA files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure
VAR-202510-1429 CVE-2025-59299 Delta Electronics DIAScreen DPA File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DIAScreen. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DPA files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. Delta Electronics DIAScreen is a smart machine building software developed by Delta Electronics, a Chinese company
VAR-202510-0324 CVE-2025-59298 Delta Electronics, INC.  of  DIAScreen  Out-of-bounds write vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process. Delta Electronics, INC. of DIAScreen Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DIAScreen. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DPA files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure
VAR-202510-0325 CVE-2025-59297 Delta Electronics, INC.  of  DIAScreen  Out-of-bounds write vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process. Delta Electronics, INC. of DIAScreen Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DIAScreen. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DPA files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure
VAR-202510-1250 CVE-2025-60663 Tenda AC18 wanMTU parameter stack buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the wanMTU parameter in the fromAdvSetMacMtuWan function. The Tenda AC18 is a dual-band wireless router launched by Shenzhen Jixiang Tengda Technology Co., Ltd. in July 2016, primarily for villa and large-sized home users. This vulnerability stems from the failure of the fromAdvSetMacMtuWan function to properly validate the length of the input data in the wanMTU parameter. An attacker could exploit this vulnerability to cause a denial of service
VAR-202510-0903 CVE-2025-60661 Tenda AC18 cloneType parameter stack buffer overflow vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the cloneType parameter in the fromAdvSetMacMtuWan function. The Tenda AC18 is a dual-band wireless router launched by Shenzhen Jixiang Tengda Technology Co., Ltd. in July 2016, primarily for villas and large homes. This vulnerability stems from the failure of the cloneType parameter in the fromAdvSetMacMtuWan function to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
VAR-202510-0265 CVE-2025-60662 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Out-of-bounds write vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the wanSpeed parameter in the fromAdvSetMacMtuWan function. Shenzhen Tenda Technology Co.,Ltd. of AC18 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. in July 2016, primarily for villa and large-sized home users. This vulnerability stems from the failure to properly validate the length of the input data for the wanSpeed parameter in the fromAdvSetMacMtuWan function. An attacker could exploit this vulnerability to cause a denial of service
VAR-202510-0732 CVE-2025-60660 Tenda AC18 mac parameter stack buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the mac parameter in the fromAdvSetMacMtuWan function. The Tenda AC18 is a dual-band wireless router launched by Shenzhen Jixiang Tengda Technology Co., Ltd. in July 2016, primarily for villa and large-sized home users. This vulnerability stems from the failure to properly validate the length of the input data in the mac parameter in the fromAdvSetMacMtuWan function. An attacker could exploit this vulnerability to cause a denial of service
VAR-202510-0221 CVE-2025-61045 TOTOLINK  of  x18  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK X18 V9.1.0cu.2053_B20230309 was discovered to contain a command injection vulnerability via the mac parameter in the setEasyMeshAgentCfg function. TOTOLINK of x18 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK X18 is a mesh WiFi 6 router system launched by Taiwan's TOTOLINK. It supports WiFi 6 technology and optimizes home network coverage through its mesh functionality. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202510-0511 CVE-2025-61044 TOTOLINK X18 setEasyMeshAgentCfg function command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK X18 V9.1.0cu.2053_B20230309 was discovered to contain a command injection vulnerability via the agentName parameter in the setEasyMeshAgentCfg function. The TOTOLINK X18 is a mesh WiFi 6 router system launched by Taiwan's TOTOLINK. It supports WiFi 6 technology and optimizes home network coverage through its mesh functionality. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-3818 CVE-2025-11123 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A flaw has been found in Tenda AC18 15.03.05.19. This impacts an unknown function of the file /goform/saveAutoQos. This manipulation of the argument enable causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used. Shenzhen Tenda Technology Co.,Ltd. of AC18 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202509-3768 CVE-2025-11122 Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was detected in Tenda AC18 15.03.05.19. This affects an unknown function of the file /goform/WizardHandle. The manipulation of the argument WANT/mtuvalue results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. Shenzhen Tenda Technology Co.,Ltd. of AC18 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. in July 2016, primarily for villas and large homes. The Tenda AC18 suffers from a buffer overflow vulnerability caused by a failure to perform a valid bounds check on the WANT/mtuvalue parameter in the /goform/WizardHandle file. This vulnerability could allow an attacker to execute arbitrary code or cause the system to crash