VARIoT IoT vulnerabilities database
| VAR-202602-0422 | CVE-2026-20406 | media tech's NR15 Multiple vulnerabilities in multiple products, including |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01726634; Issue ID: MSV-5728. Patch ID teeth MOLY01726634 So, the problem ID teeth MSV-5728 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202602-0302 | CVE-2026-20405 | media tech's NR15 Vulnerabilities related to reachable assertions in multiple products, including |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01688495; Issue ID: MSV-4818. ID teeth MOLY01688495 So, the problem ID teeth MSV-4818 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202602-0315 | CVE-2026-20404 | media tech's NR15 Out-of-bounds write vulnerabilities in multiple products, including |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689248; Issue ID: MSV-4837. Patch ID teeth MOLY01689248 ,problem ID teeth MSV-4837 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202602-0439 | CVE-2026-20403 | media tech's NR15 Out-of-bounds write vulnerabilities in multiple products, including |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689254 (Note: For N15 and NR16) / MOLY01689259 (Note: For NR17 and NR17R); Issue ID: MSV-4843. Patch ID teeth MOLY01689254 (( N15 and NR16 for) and MOLY01689259 (( NR17 and NR17R (used) and the problem ID teeth MSV-4843 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202602-0240 | CVE-2026-20402 | media tech's NR15 Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00693083; Issue ID: MSV-5928. UE ) connects, it could allow a remote denial of service ( DoS ) exploit. Patch ID teeth MOLY00693083 ,problem ID teeth MSV-5928 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202602-0269 | CVE-2026-20401 | media tech's NR15 Multiple vulnerabilities in |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738310; Issue ID: MSV-5933. Patch ID teeth MOLY01738310 ,problem ID teeth MSV-5933 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-4145 | CVE-2026-24714 | Support has ended NETGEAR "Not described in the product manual TelnetEnable "function |
CVSS V2: - CVSS V3: 7.5 Severity: High |
Some end of service NETGEAR products provide "TelnetEnable" functionality, which allows a magic packet to activate telnet service on the box. LAN By processing specific packets received from the side interface, Telnet The service may be enabled. LAN By processing specific packets received from the side interface, Telnet The service may be enabled
| VAR-202601-4247 | CVE-2026-1637 | Shenzhen Tenda Technology Co.,Ltd. of ac21 Multiple vulnerabilities in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The affected elements are files /goform/AdvSetMacMtuWan Functions in fromAdvSetMacMtuWan This action results in a stack-based buffer overflow that can be exploited remotely. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-4142 | CVE-2026-1506 | D-Link Corporation of DIR-615 Multiple vulnerabilities in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
A vulnerability was determined in D-Link DIR-615 4.10. Impacted is an unknown function of the file /adv_mac_filter.php of the component MAC Filter Configuration. This manipulation of the argument mac causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-3982 | CVE-2026-1505 | D-Link Corporation of DIR-615 Multiple vulnerabilities in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
A vulnerability was found in D-Link DIR-615 4.10. This issue affects some unknown processing of the file /set_temp_nodes.php of the component URL Filter. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. An exploit for this vulnerability has been published and is available in the wild. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-4019 | CVE-2026-1448 | D-Link Corporation of DIR-615 Multiple vulnerabilities in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
A vulnerability was detected in D-Link DIR-615 up to 4.10. This impacts an unknown function of the file /wiz_policy_3_machine.php of the component Web Management Interface. Performing a manipulation of the argument ipaddr results in os command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. It can be performed remotely. Exploits have been published and are available in the wild. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-4123 | CVE-2026-24440 | Shenzhen Tenda Technology Co.,Ltd. of w30e Unverified password change vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) allow account passwords to be changed through the maintenance interface without requiring verification of the existing password. This enables unauthorized password changes when access to the affected endpoint is obtained. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-4166 | CVE-2026-24439 | Shenzhen Tenda Technology Co.,Ltd. of w30e Encoding and escaping vulnerabilities in firmware |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) fail to include the X-Content-Type-Options: nosniff response header on web management interfaces. As a result, browsers that perform MIME sniffing may incorrectly interpret attacker-influenced responses as executable script. Also, some of the information handled by the software may be rewritten. Furthermore, the software will not stop. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-4127 | CVE-2026-24437 | Shenzhen Tenda Technology Co.,Ltd. of w30e Contains important information about the firmware Web Browser cache usage vulnerability |
CVSS V2: - CVSS V3: 5.5 Severity: MEDIUM |
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) serve sensitive administrative content without appropriate cache-control directives. As a result, browsers may store credential-bearing responses locally, exposing them to subsequent unauthorized access. In addition, information handled by the software will not be rewritten. Furthermore, the software will not stop. Furthermore, attacks exploiting this vulnerability will not affect other software
| VAR-202601-4122 | CVE-2026-24436 | Shenzhen Tenda Technology Co.,Ltd. of w30e Firmware Improperly Limiting Excessive Authentication Attempts Vulnerability |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) do not enforce rate limiting or account lockout mechanisms on authentication endpoints. This allows attackers to perform unrestricted brute-force attempts against administrative credentials. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
| VAR-202601-4993 | CVE-2026-24435 |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) implement an insecure Cross-Origin Resource Sharing (CORS) policy on authenticated administrative endpoints. The device sets Access-Control-Allow-Origin: * in combination with Access-Control-Allow-Credentials: true, allowing attacker-controlled origins to issue credentialed cross-origin requests.
| VAR-202601-4188 | CVE-2026-24433 | Shenzhen Tenda Technology Co.,Ltd. of w30e Cross-site scripting vulnerability in firmware |
CVSS V2: - CVSS V3: 5.4 Severity: MEDIUM |
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain a stored cross-site scripting vulnerability in the user creation functionality. Insufficient input validation allows attacker-controlled script content to be stored and later executed when administrative users access the affected management pages. Also, some of the information handled by the software may be rewritten. Furthermore, the software will not stop. Furthermore, attacks exploiting this vulnerability may affect other software
| VAR-202601-4126 | CVE-2026-24432 | Shenzhen Tenda Technology Co.,Ltd. of w30e Cross-site request forgery vulnerability in firmware |
CVSS V2: - CVSS V3: 4.3 Severity: MEDIUM |
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) lack cross-site request forgery (CSRF) protections on administrative endpoints, including those used to change administrator account credentials. As a result, an attacker can craft malicious requests that, when triggered by an authenticated user’s browser, modify administrative passwords and other configuration settings. However, some of the information handled by the software may be rewritten. Furthermore, the software will not stop running. Furthermore, attacks exploiting this vulnerability will not affect other software
| VAR-202601-4141 | CVE-2026-24431 | Shenzhen Tenda Technology Co.,Ltd. of w30e in the firmware GUI Vulnerability in storing sensitive information in plaintext |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) display stored user account passwords in plaintext within the administrative web interface. Any user with access to the affected management pages can directly view credentials. In addition, information handled by the software will not be rewritten. Furthermore, the software will not stop. Furthermore, attacks exploiting this vulnerability will not affect other software
| VAR-202601-4121 | CVE-2026-24430 | Shenzhen Tenda Technology Co.,Ltd. of w30e Firmware vulnerability related to the injection of sensitive information into transmitted data |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) disclose sensitive account credentials in cleartext within HTTP responses generated by the maintenance interface. Because the management interface is accessible over unencrypted HTTP by default, credentials may be exposed to network-based interception. HTTP This allows credentials to be intercepted over the network.All information handled by the software may be leaked to the outside. In addition, information handled by the software will not be rewritten. Furthermore, the software will not stop. Furthermore, attacks exploiting this vulnerability will not affect other software