VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202503-0137 CVE-2025-1876 D-Link DAP-1562 Stack Buffer Overflow Vulnerability CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability, which was classified as critical, has been found in D-Link DAP-1562 1.10. Affected by this issue is the function http_request_parse of the component HTTP Header Handler. The manipulation of the argument Authorization leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link DAP-1562 is a wireless bridge produced by D-Link of China. The vulnerability is caused by a stack buffer overflow in the HTTP Header Handler, which may lead to remote attacks. Attackers can use this vulnerability to execute arbitrary code on the device, resulting in damage to the confidentiality, integrity and availability of the device
VAR-202503-0357 CVE-2024-53030 Input validation vulnerability in multiple Qualcomm products CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Memory corruption while processing input message passed from FE driver. MSM8996AU firmware, qam8255p firmware, QAM8295P Multiple Qualcomm products, including firmware, contain vulnerabilities related to input validation and out-of-bounds writing.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202503-0423 CVE-2024-53027 Classic buffer overflow vulnerability in multiple Qualcomm products CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Transient DOS may occur while processing the country IE. QCA9367 firmware, QCA9377 firmware, qcc2073 Multiple Qualcomm products such as firmware have a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202503-0307 CVE-2024-38426 Authentication vulnerabilities in multiple Qualcomm products CVSS V2: -
CVSS V3: 5.4
Severity: MEDIUM
While processing the authentication message in UE, improper authentication may lead to information disclosure. 315 5g iot firmware, 9205 lte firmware, AR8035 Multiple Qualcomm products, such as firmware, contain vulnerabilities related to authentication.Information may be obtained
VAR-202503-0091 CVE-2025-1853 Shenzhen Tenda Technology Co.,Ltd.  of  AC8  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in Tenda AC8 16.03.34.06 and classified as critical. This issue affects the function sub_49E098 of the file /goform/SetIpMacBind of the component Parameter Handler. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of AC8 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202503-0215 CVE-2025-1851 Tenda AC7 Stack Overflow Vulnerability (CNVD-2025-05237) CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability, which was classified as critical, was found in Tenda AC7 up to 15.03.06.44. This affects the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Tenda AC7 is a wireless router produced by Tenda. In Tenda AC7 15.03.06.44 and earlier versions, the formSetFirewallCfg function of the /goform/SetFirewallCfg file has a stack overflow vulnerability when processing the firewallEn parameter. The vulnerability is caused by the program's failure to check the parameter length. Attackers can use this vulnerability to launch attacks remotely and achieve code execution
VAR-202503-0044 No CVE (0Day) Delta Electronics ISPSoft CBDGL File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics ISPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CBDGL files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
VAR-202503-0052 No CVE (0Day) Delta Electronics ISPSoft DVP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics ISPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DVP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
VAR-202503-0220 No CVE (0Day) Delta Electronics ISPSoft DVP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics ISPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DVP files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process.
VAR-202503-0050 CVE-2025-1819 Tenda AC7 Command Injection Vulnerability (CNVD-2025-05230) CVSS V2: 6.5
CVSS V3: 6.3
Severity: Medium
A vulnerability, which was classified as critical, was found in Tenda AC7 1200M 15.03.06.44. Affected is the function TendaTelnet of the file /goform/telnet. The manipulation of the argument lan_ip leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Tenda AC7 is a wireless router from China's Tenda company. The vulnerability is caused by the TendaTelnet function in the /goform/telnet file failing to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202502-2734 CVE-2025-25635 TOTOlink A3002R pppoe_dns1 parameter buffer overflow vulnerability CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the pppoe_dns1 parameter in the formIpv6Setup interface of /bin/boa. TOTOLINK A3002R is a wireless router from China's TOTOLINK Electronics. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202502-2112 CVE-2025-25610 TOTOlink A3002R static_gw parameter buffer overflow vulnerability CVSS V2: 8.3
CVSS V3: 8.0
Severity: HIGH
TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_gw parameter in the formIpv6Setup interface of /bin/boa. TOTOLINK A3002R is a wireless router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202502-2113 CVE-2025-25609 TOTOlink A3002R static_ipv6 parameter buffer overflow vulnerability CVSS V2: 8.3
CVSS V3: 8.0
Severity: HIGH
TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_ipv6 parameter in the formIpv6Setup interface of /bin/boa. TOTOLINK A3002R is a wireless router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202502-2738 CVE-2025-25429 TRENDnet TEW-929DRU /addschedule.htm page cross-site scripting vulnerability CVSS V2: 4.1
CVSS V3: 4.8
Severity: MEDIUM
Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the r_name variable inside the have_same_name function on the /addschedule.htm page. TRENDnet TEW-929DRU is a wireless router from TRENDnet, an American company. Attackers can exploit this vulnerability to execute arbitrary web scripts or HTML by injecting carefully designed payloads
VAR-202502-3463 CVE-2025-25431 TRENDnet TEW-929DRU /captive_portal.htm page cross-site scripting vulnerability CVSS V2: 4.8
CVSS V3: 4.8
Severity: MEDIUM
Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the The ssid key of wifi_data parameter on the /captive_portal.htm page. TRENDnet TEW-929DRU is a wireless router from TRENDnet, an American company. TRENDnet TEW-929DRU has a cross-site scripting vulnerability. Attackers can exploit this vulnerability to execute arbitrary web scripts or HTML by injecting carefully designed payloads
VAR-202502-3806 No CVE HP LaserJet M211dw of HP Trading (Shanghai) Co., Ltd. has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
HP LaserJet M211dw is a printer product. HP LaserJet M211dw of HP Trading (Shanghai) Co., Ltd. has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202502-3844 No CVE Beijing Huali Chuangtong Technology Co., Ltd. 6100 satellite mobile terminal has a command execution vulnerability CVSS V2: 8.3
CVSS V3: -
Severity: HIGH
Beijing Huali Chuangtong Technology Co., Ltd. (hereinafter referred to as Huali Chuangtong) is a leader in information technology and innovative applications for domestic defense, government and industry. Beijing Huali Chuangtong Technology Co., Ltd.'s 6100 satellite mobile terminal has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202502-3792 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. RG-UAC-6000-E20 has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Beijing Xingwang Ruijie Network Technology Co., Ltd. is a provider of ICT infrastructure and industry solutions. Its main business is the research, design and sales of network equipment, network security products and cloud desktop solutions. Beijing Xingwang Ruijie Network Technology Co., Ltd. RG-UAC-6000-E20 has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202502-3808 No CVE Sony Group Corporation SNC-RZ50N has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
SNC-RZ50N is a network camera with day and night switching function. Sony Group Corporation SNC-RZ50N has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202502-3781 No CVE SAMSUNG X6250 has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
SAMSUNG X6250 is an all-in-one computer. SAMSUNG X6250 has an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.