VARIoT IoT vulnerabilities database

VAR-202506-0273 | CVE-2025-5606 | Shenzhen Tenda Technology Co.,Ltd. of AC18 Command injection vulnerability in firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Medium |
A vulnerability was found in Tenda AC18 15.03.05.05. It has been declared as critical. This vulnerability affects the function formSetIptv of the file /goform/SetIPTVCfg. The manipulation of the argument list leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. of AC18 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202506-0294 | CVE-2025-5600 | TOTOLINK of ex1200t Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: Critical |
A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This issue affects the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument LangType leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of ex1200t An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202506-0230 | CVE-2025-5573 | D-Link Systems, Inc. of DCS-932L in the firmware OS Command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Medium |
A vulnerability was found in D-Link DCS-932L 2.18.01. It has been rated as critical. Affected by this issue is the function setSystemWizard/setSystemControl of the file /setSystemWizard. The manipulation of the argument AdminID leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Systems, Inc. of DCS-932L The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202506-0348 | CVE-2025-5572 | D-Link Systems, Inc. of DCS-932L Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in D-Link DCS-932L 2.18.01. It has been declared as critical. Affected by this vulnerability is the function setSystemEmail of the file /setSystemEmail. The manipulation of the argument EmailSMTPPortNumber leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Systems, Inc. of DCS-932L An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state
VAR-202506-0042 | CVE-2025-5508 | TOTOLINK of A3002RU Cross-site scripting vulnerability in firmware |
CVSS V2: 3.3 CVSS V3: 2.4 Severity: Medium |
A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011. It has been rated as problematic. Affected by this issue is some unknown functionality of the component IP Port Filtering Page. The manipulation of the argument Comment leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK of A3002RU Firmware has a cross-site scripting vulnerability.Information may be tampered with
VAR-202506-0009 | CVE-2025-5445 | Linksys of RE9000 Firmware and other products from multiple vendors OS Command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Medium |
A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this issue is the function RP_checkFWByBBS of the file /goform/RP_checkFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Linksys of RE9000 For products such as firmware from multiple vendors, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202506-0026 | CVE-2025-5444 |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Medium |
A vulnerability has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this vulnerability is the function RP_UpgradeFWByBBS of the file /goform/RP_UpgradeFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
VAR-202506-0002 | CVE-2025-5443 |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Medium |
A vulnerability, which was classified as critical, was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function wirelessAdvancedHidden of the file /goform/wirelessAdvancedHidden. The manipulation of the argument ExtChSelector/24GSelector/5GSelector leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
VAR-202505-3617 | CVE-2025-45343 | Shenzhen Tenda Technology Co.,Ltd. of w18e Access control vulnerabilities in firmware |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
An issue in Tenda W18E v.2.0 v.16.01.0.11 allows an attacker to execute arbitrary code via the editing functionality of the account module in the goform/setmodules route. Shenzhen Tenda Technology Co.,Ltd. of w18e Firmware contains an access control vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202505-2802 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. AC10 has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
AC10 is a high-performance router with Gigabit ports for both WAN and LAN ports.
Shenzhen Jixiang Tengda Technology Co., Ltd. AC10 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202505-3180 | No CVE | TP-Link VN020-F3v has a binary vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
TP-Link Technologies Co., Ltd. is a leading ICT equipment and solution provider.
TP-Link VN020-F3v has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202505-2626 | No CVE | H3C GR-1200W has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
H3C GR-1200W is a high-performance enterprise-class Gigabit wireless router launched by H3C Technologies Co., Ltd. (H3C for short).
H3C GR-1200W of H3C Technologies Co., Ltd. has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202505-4104 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. A15 has a binary vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
A15 is a dual-band 3G wireless router suitable for fiber-optic homes within 1000M.
Shenzhen Jixiang Tengda Technology Co., Ltd. A15 has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202505-2801 | No CVE | TRENDnet TEW-751DR has an information leakage vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
TEW-751DR is a wireless Gigabit router.
TRENDnet TEW-751DR has an information leakage vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202505-2448 | CVE-2025-27701 | Google Pixel Information Leak Vulnerability |
CVSS V2: 4.6 CVSS V3: 5.5 Severity: MEDIUM |
In the function process_crypto_cmd, the values of ptrs[i] can be potentially equal to NULL which is valid value after calling slice_map_array(). Later this values will be derefenced without prior NULL check, which can lead to local Temporary DoS or OOB Read, leading to information disclosure. Google Pixel is a smartphone produced by Google Inc. in the United States.
Google Pixel has an information leakage vulnerability that can be exploited by attackers to cause out-of-bounds reading
VAR-202505-2437 | CVE-2025-27700 | Google Pixel Privilege Escalation Vulnerability |
CVSS V2: 7.2 CVSS V3: 8.4 Severity: HIGH |
There is a possible bypass of carrier restrictions due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google Pixel is a smartphone produced by Google in the United States
VAR-202505-2436 | CVE-2024-56193 | Google Pixel Information Leakage Vulnerability (CNVD-2025-11247) |
CVSS V2: 3.6 CVSS V3: 5.1 Severity: MEDIUM |
There is a possible disclosure of Bluetooth adapter details due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Google Pixel is a smartphone produced by Google in the United States.
Google Pixel has an information disclosure vulnerability that can be exploited by attackers to leak detailed information about the Bluetooth adapter
VAR-202505-2173 | CVE-2025-5228 | D-Link DI-8100 Buffer Overflow Vulnerability |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: High |
A vulnerability was found in D-Link DI-8100 up to 20250523. It has been classified as critical. Affected is the function httpd_get_parm of the file /login.cgi of the component jhttpd. The manipulation of the argument notify leads to stack-based buffer overflow. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. D-Link DI-8100 is a wireless broadband router designed for small and medium-sized network environments by D-Link, a Chinese company. The vulnerability is caused by the parameter notify in the file /login.cgi failing to properly verify the length of the input data. Attackers can use this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202505-2067 | CVE-2025-5215 | D-Link Systems, Inc. of DCS-5020L Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability classified as critical has been found in D-Link DCS-5020L 1.01_B2. This affects the function websReadEvent of the file /rame/ptdc.cgi. The manipulation of the argument Authorization leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Systems, Inc. of DCS-5020L An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DCS-5020L is a DCS series IP camera from D-Link of China.
D-Link DCS-5020L has a buffer overflow vulnerability. The vulnerability is caused by the failure of the parameter Authorization in the file /rame/ptdc.cgi to correctly verify the length of the input data. Attackers can use this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202505-3381 | No CVE | EDIMAX N300 Wi-Fi Router has a command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
N300 Wi-Fi Router is a high-performance wireless router.
EDIMAX N300 Wi-Fi Router has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.