VARIoT IoT vulnerabilities database

VAR-202505-0872 | CVE-2025-45797 | TOTOLINK of a950rg Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOlink A950RG V4.1.2cu.5204_B20210112 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the NoticeUrl parameter in the setNoticeCfg interface of /lib/cste_modules/system.so. TOTOLINK of a950rg An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A950RG is a super-generation Giga wireless router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202505-1004 | CVE-2025-45790 | TOTOLINK of A3100R Out-of-bounds write vulnerability in firmware |
CVSS V2: 6.4 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3100R V5.9c.1527 is vulnerable to Buffer Overflow via the priority parameter in the setMacQos interface of /lib/cste_modules/firewall.so. TOTOLINK of A3100R An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3100R is a series of wireless routers produced by China's TOTOLINK Electronics. The vulnerability is caused by the failure of the priority parameter of the setMacQos interface in /lib/cste_modules/firewall.so to correctly verify the length of the input data. No detailed vulnerability details are currently provided
VAR-202505-0747 | CVE-2025-45789 | TOTOLINK of A3100R Out-of-bounds write vulnerability in firmware |
CVSS V2: 6.4 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3100R V5.9c.1527 is vulnerable to buffer overflow via the urlKeyword parameter in setParentalRules. TOTOLINK of A3100R An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3100R is a series of wireless routers from China's TOTOLINK Electronics. The vulnerability is caused by the failure of the urlKeyword parameter in setParentalRules to properly verify the length of the input data. No detailed vulnerability details are currently provided
VAR-202505-1253 | CVE-2025-45788 | TOTOLINK of A3100R Out-of-bounds write vulnerability in firmware |
CVSS V2: 6.4 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3100R V5.9c.1527 is vulnerable to Buffer Overflow via the comment parameter in setMacFilterRules. TOTOLINK of A3100R An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3100R is a series of wireless routers from China's TOTOLINK Electronics. The vulnerability is caused by the comment parameter in setMacFilterRules failing to properly verify the length of the input data. No detailed vulnerability details are currently provided
VAR-202505-1105 | CVE-2025-45787 | TOTOLINK of A3100R Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3100R V5.9c.1527 is vulnerable to Buffer Overflow viathe comment parameter in setIpPortFilterRules. TOTOLINK of A3100R An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3100R is a series of wireless routers from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to crash the application or execute arbitrary code in the context of the application
VAR-202505-1511 | CVE-2025-45845 | TOTOLINK of nr1800x Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK NR1800X V9.1.0u.6681_B20230703 was discovered to contain an authenticated stack overflow via the ssid5g parameter in the setWiFiEasyGuestCfg function. TOTOLINK of nr1800x An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK NR1800X is an excellent 5G NR indoor Wi-Fi and SIP CPE from China's TOTOLINK Electronics.
TOTOLINK NR1800X has a buffer overflow vulnerability. The vulnerability is caused by the ssid5g parameter in the setWiFiEasyGuestCfg function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202505-0868 | CVE-2025-45844 | TOTOLINK of nr1800x Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK NR1800X V9.1.0u.6681_B20230703 was discovered to contain an authenticated stack overflow via the ssid parameter in the setWiFiBasicCfg function. TOTOLINK of nr1800x An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK NR1800X is an excellent 5G NR indoor Wi-Fi and SIP CPE from China's TOTOLINK Electronics.
TOTOLINK NR1800X has a buffer overflow vulnerability. The vulnerability is caused by the ssid parameter in the setWiFiBasicCfg function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202505-0869 | CVE-2025-45843 | TOTOLINK of nr1800x Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK NR1800X V9.1.0u.6681_B20230703 was discovered to contain an authenticated stack overflow via the ssid parameter in the setWiFiGuestCfg function. TOTOLINK of nr1800x An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK NR1800X is an excellent 5G NR indoor Wi-Fi and SIP CPE from China's TOTOLINK Electronics.
TOTOLINK NR1800X has a buffer overflow vulnerability. The vulnerability is caused by the ssid parameter in the setWiFiGuestCfg function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202505-0635 | CVE-2025-45842 | TOTOLINK of nr1800x Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
TOTOLINK NR1800X V9.1.0u.6681_B20230703 was discovered to contain an authenticated stack overflow via the ssid5g parameter in the setWiFiEasyCfg function. TOTOLINK of nr1800x An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK NR1800X is an excellent 5G NR indoor Wi-Fi and SIP CPE from China's TOTOLINK Electronics.
TOTOLINK NR1800X has a buffer overflow vulnerability. The vulnerability is caused by the ssid5g parameter in the setWiFiEasyCfg function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202505-1252 | CVE-2025-45841 | TOTOLINK of nr1800x Out-of-bounds write vulnerability in firmware |
CVSS V2: 6.4 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK NR1800X V9.1.0u.6681_B20230703 was discovered to contain an authenticated stack overflow via the text parameter in the setSmsCfg function. TOTOLINK of nr1800x An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK NR1800X is an excellent 5G NR indoor Wi-Fi and SIP CPE from China's TOTOLINK Electronics.
TOTOLINK NR1800X has a buffer overflow vulnerability. The vulnerability is caused by the text parameter in the setSmsCfg function failing to correctly verify the length of the input data. No detailed vulnerability details are currently provided
VAR-202505-0749 | CVE-2025-45514 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
Tenda FH451 V1.0.0.9 has a stack overflow vulnerability in the function.frmL7ImForm. Shenzhen Tenda Technology Co.,Ltd. of fh451 A stack-based buffer overflow vulnerability exists in the firmware.Information may be obtained and information may be tampered with. No detailed vulnerability details are currently provided
VAR-202505-1034 | CVE-2025-32821 | plural SonicWALL In the product OS Command injection vulnerability |
CVSS V2: 6.8 CVSS V3: 7.2 Severity: HIGH |
A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN admin privileges can with admin privileges can inject shell command arguments to upload a file on the appliance. SMA100 firmware, SMA200 firmware, SMA210 firmware etc. SonicWALL The product has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SonicWall SMA100 is a secure access gateway device from SonicWall, USA
VAR-202505-1414 | CVE-2025-32820 | plural SonicWALL Past traversal vulnerabilities in products |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges can inject a path traversal sequence to make any directory on the SMA appliance writable. SMA100 firmware, SMA200 firmware, SMA210 firmware etc. SonicWALL The product contains a path traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SonicWall SMA100 is a secure access gateway device from SonicWall, USA.
SonicWall SMA100 has a path traversal vulnerability. Attackers can exploit this vulnerability to make any directory writable
VAR-202505-1415 | CVE-2025-32819 | plural SonicWALL Vulnerabilities related to externally accessible files or directories in the product |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings. SMA100 firmware, SMA200 firmware, SMA210 firmware etc. SonicWALL The product has a vulnerability related to externally accessible files or directories.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SonicWall SMA100 is a secure access gateway device from SonicWall, USA
VAR-202505-1551 | CVE-2025-32405 | RT-Labs of P-Net Out-of-bounds write vulnerability in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to induce a crash in IO devices that use the library by sending a malicious RPC packet. RT-Labs of P-Net Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. RT-Labs P-Net is an open source PROFINET protocol stack from RT-Labs that implements standard communication between industrial devices and PROFINET controllers
VAR-202505-0438 | CVE-2025-32404 | RT-Labs of P-Net Out-of-bounds write vulnerability in |
CVSS V2: 10.0 CVSS V3: 4.8 Severity: MEDIUM |
An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to corrupt the memory of IO devices that use the library by sending a malicious RPC packet. RT-Labs of P-Net Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. RT-Labs P-Net is an open source PROFINET protocol stack from RT-Labs that implements standard communication between industrial devices and PROFINET controllers
VAR-202505-0557 | CVE-2025-32403 | RT-Labs of P-Net Out-of-bounds write vulnerability in |
CVSS V2: 10.0 CVSS V3: 4.8 Severity: MEDIUM |
An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to corrupt the memory of IO devices that use the library by sending a malicious RPC packet. RT-Labs of P-Net Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. RT-Labs P-Net is an open source PROFINET protocol stack from RT-Labs that implements standard communication between industrial devices and PROFINET controllers
VAR-202505-1146 | CVE-2025-32402 | RT-Labs of P-Net Out-of-bounds write vulnerability in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to induce a crash in IO devices that use the library by sending a malicious RPC packet. RT-Labs of P-Net Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. RT-Labs P-Net is an open source PROFINET protocol stack from RT-Labs that implements standard communication between industrial devices and PROFINET controllers
VAR-202505-0670 | CVE-2025-32401 | RT-Labs of P-Net Heap-based buffer overflow vulnerability in |
CVSS V2: 7.6 CVSS V3: 4.8 Severity: MEDIUM |
An Heap-based Buffer Overflow in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to corrupt the memory of IO devices that use the library by sending a malicious RPC packet. RT-Labs of P-Net contains a heap-based buffer overflow vulnerability and an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. RT-Labs P-Net is an open source PROFINET protocol stack from RT-Labs that implements standard communication between industrial devices and PROFINET controllers
VAR-202505-0908 | CVE-2025-32400 | RT-Labs of P-Net Heap-based buffer overflow vulnerability in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
An Heap-based Buffer Overflow in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to induce a crash in IO devices that use the library by sending a malicious RPC packet. RT-Labs of P-Net contains a heap-based buffer overflow vulnerability and an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. RT-Labs P-Net is an open source PROFINET protocol stack from RT-Labs that implements standard communication between industrial devices and PROFINET controllers