VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202602-0224 CVE-2026-2147 Shenzhen Tenda Technology Co.,Ltd. of ac21  Multiple vulnerabilities in firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A weakness has been identified in Tenda AC21 16.03.08.16. This impacts an unknown function of the file /cgi-bin/DownloadLog of the component Web Management Interface. Executing a manipulation can lead to information disclosure. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. This exploit has been made public and may be used in attacks.There is a possibility that some of the information handled by the software may be leaked to the outside. However, the information handled by the software will not be rewritten. Furthermore, the software will not stop
VAR-202602-0380 CVE-2026-2137 Shenzhen Tenda Technology Co.,Ltd. of tx3  Multiple vulnerabilities in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been found in Tenda TX3 up to 16.03.13.11_multi. This impacts an unknown function of the file /goform/SetIpMacBind. The manipulation of the argument list leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Exploits are publicly available and can be used in the wild.All information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202602-1571 CVE-2026-23741 CVSS V2: -
CVSS V3: -
Severity: NONE
Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the asterisk/contrib/scripts/ast_coredumper runs as root, as noted by the NOTES tag on line 689 of the ast_coredumper file. The script will source the contents of /etc/asterisk/ast_debug_tools.conf, which resides in a folder that is writeable by the asterisk user:group. Due to the /etc/asterisk/ast_debug_tools.conf file following bash semantics and it being loaded; an attacker with write permissions may add or modify the file such that when the root ast_coredumper is run; it would source and thereby execute arbitrary bash code found in the /etc/asterisk/ast_debug_tools.conf. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.
VAR-202602-0626 CVE-2026-23740 Sangoma of Asterisk Vulnerabilities related to uncontrolled search path elements in multiple products, including CVSS V2: -
CVSS V3: 7.8
Severity: NONE
Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, when ast_coredumper writes its gdb init and output files to a directory that is world-writable (for example /tmp), an attacker with write permission(which is all users on a linux system) to that directory can cause root to execute arbitrary commands or overwrite arbitrary files by controlling the gdb init file and output paths. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2. 20.7-cert9 , 20.18.2 , 21.12.1 , 22.8.2 ,and 23.2.2 Fixed inAll information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202602-1715 CVE-2026-23739 CVSS V2: -
CVSS V3: 2.0
Severity: LOW
Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the ast_xml_open() function in xml.c parses XML documents using libxml with unsafe parsing options that enable entity expansion and XInclude processing. Specifically, it invokes xmlReadFile() with the XML_PARSE_NOENT flag and later processes XIncludes via xmlXIncludeProcess().If any untrusted or user-supplied XML file is passed to this function, it can allow an attacker to trigger XML External Entity (XXE) or XInclude-based local file disclosure, potentially exposing sensitive files from the host system. This can also be triggered in other cases in which the user is able to supply input in xml format that triggers the asterisk process to parse it. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.
VAR-202602-1863 CVE-2026-23738 CVSS V2: -
CVSS V3: 3.5
Severity: LOW
Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, user supplied/control values for Cookies and any GET variable query Parameter are directly interpolated into the HTML of the page using ast_str_append. The endpoint at GET /httpstatus is the potential vulnerable endpoint relating to asterisk/main /http.c. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.
VAR-202602-1986 CVE-2025-15551 TP-LINK Technologies of archer c20  Firmware and other multiple products Eval  Injection vulnerabilities CVSS V2: -
CVSS V3: 5.6
Severity: MEDIUM
The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check.  Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge. JavaScript You can run the code.Some of the information handled by the software may be leaked to the outside. Also, some of the information handled by the software may be rewritten. Furthermore, some of the software may stop functioning. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202602-0097 CVE-2020-37150 CVSS V2: -
CVSS V3: 7.5
Severity: High
Edimax EW-7438RPn-v3 Mini 1.27 allows unauthenticated attackers to access the /wizard_reboot.asp page in unsetup mode, which discloses the Wi-Fi SSID and security key. Attackers can retrieve the wireless password by sending a GET request to this endpoint, exposing sensitive information without authentication.
VAR-202602-0095 CVE-2020-37149 CVSS V2: -
CVSS V3: 8.1
Severity: Medium
Edimax EW-7438RPn-v3 Mini 1.27 is vulnerable to cross-site request forgery (CSRF) that can lead to command execution. An attacker can trick an authenticated user into submitting a crafted form to the /goform/mp endpoint, resulting in arbitrary command execution on the device with the user's privileges.
VAR-202602-0096 CVE-2020-37125 CVSS V2: -
CVSS V3: 9.8
Severity: Critical
Edimax EW-7438RPn-v3 Mini 1.27 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands through the /goform/mp endpoint. Attackers can exploit the vulnerability by sending crafted POST requests with command injection payloads to download and execute malicious scripts on the device.
VAR-202602-0303 CVE-2026-20422 media tech's NR15 Vulnerabilities related to reachable assertions in multiple products, including CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00827332; Issue ID: MSV-5919. ID teeth MOLY00827332 And the problem ID teeth MSV-5919 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202602-0342 CVE-2026-20421 media tech's NR15 Out-of-bounds read vulnerability in CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738293; Issue ID: MSV-5922. ID teeth MOLY01738293 ,problem ID teeth MSV-5922 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202602-0284 CVE-2026-20420 media tech's NR15 Vulnerabilities related to out-of-bounds reading in multiple products, including CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738313; Issue ID: MSV-5935. Improper error handling in modems can lead to system crashes, which can expose malicious base stations controlled by attackers. UE connects, it can allow a remote denial of service ( DoS ) may occur. Patch ID teeth MOLY01738313 ,problem ID teeth MSV-5935 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202602-0422 CVE-2026-20406 media tech's NR15 Multiple vulnerabilities in multiple products, including CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01726634; Issue ID: MSV-5728. Patch ID teeth MOLY01726634 So, the problem ID teeth MSV-5728 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202602-0302 CVE-2026-20405 media tech's NR15 Vulnerabilities related to reachable assertions in multiple products, including CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01688495; Issue ID: MSV-4818. ID teeth MOLY01688495 So, the problem ID teeth MSV-4818 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202602-0315 CVE-2026-20404 media tech's NR15 Out-of-bounds write vulnerabilities in multiple products, including CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689248; Issue ID: MSV-4837. Patch ID teeth MOLY01689248 ,problem ID teeth MSV-4837 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202602-0439 CVE-2026-20403 media tech's NR15 Out-of-bounds write vulnerabilities in multiple products, including CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689254 (Note: For N15 and NR16) / MOLY01689259 (Note: For NR17 and NR17R); Issue ID: MSV-4843. Patch ID teeth MOLY01689254 (( N15 and NR16 for) and MOLY01689259 (( NR17 and NR17R (used) and the problem ID teeth MSV-4843 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202602-0240 CVE-2026-20402 media tech's NR15 Out-of-bounds write vulnerability in CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00693083; Issue ID: MSV-5928. UE ) connects, it could allow a remote denial of service ( DoS ) exploit. Patch ID teeth MOLY00693083 ,problem ID teeth MSV-5928 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202602-0269 CVE-2026-20401 media tech's NR15 Multiple vulnerabilities in CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738310; Issue ID: MSV-5933. Patch ID teeth MOLY01738310 ,problem ID teeth MSV-5933 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software
VAR-202601-4145 CVE-2026-24714 Support has ended NETGEAR "Not described in the product manual TelnetEnable "function CVSS V2: -
CVSS V3: 7.5
Severity: High
Some end of service NETGEAR products provide "TelnetEnable" functionality, which allows a magic packet to activate telnet service on the box. LAN By processing specific packets received from the side interface, Telnet The service may be enabled. LAN By processing specific packets received from the side interface, Telnet The service may be enabled