VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202509-4516 No CVE WAGO 750-890, manufactured by WAGO Electronics (Tianjin) Co., Ltd., contains an unauthorized access vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The WAGO 750-890 is a Modbus TCP controller suitable for industrial automation systems and supports the Modbus communication protocol. WAGO Electronics (Tianjin) Co., Ltd.'s WAGO 750-890 contains an unauthorized access vulnerability, which attackers could exploit to obtain sensitive information.
VAR-202509-4395 No CVE Siemens Mobility Trainguard End-of-Train and Head-of-Train Weak Authentication Vulnerabilities CVSS V2: 8.3
CVSS V3: -
Severity: HIGH
The Trainguard End-of-Train (EOT) is a next-generation train-end device used to connect onboard telemetry. The Trainguard Head-of-Train (HOT) is a head-of-train device. These devices communicate using the S-9152 standard. Siemens Mobility Trainguard End-of-Train and Head-of-Train devices have weak authentication vulnerabilities. This vulnerability stems from a lack of authentication in the device's communication protocol. An attacker could exploit this vulnerability to inject malicious commands, causing operational disruptions or brake failures.
VAR-202509-4499 No CVE TOTOLINK LR350 has a stack overflow vulnerability. CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The LR350 is a wireless router. The TOTOLINK LR350 contains a stack overflow vulnerability that attackers could exploit to cause a denial-of-service attack.
VAR-202509-4515 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd.'s AC10 has a binary vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The AC10 is a high-performance router with gigabit ports on both the WAN and LAN sides. Shenzhen Jixiang Tengda Technology Co., Ltd.'s AC10 router contains a binary vulnerability that attackers could exploit to cause a denial-of-service attack.
VAR-202509-2702 CVE-2025-52053 TOTOLINK  of  x6000r  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK X6000R V9.4.0cu.1360_B20241207 was found to contain a command injection vulnerability in the sub_417D74 function via the file_name parameter. This vulnerability allows unauthenticated attackers to execute arbitrary commands via a crafted request. TOTOLINK of x6000r Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK X6000R is a wireless router launched by TOTOLINK (a Chinese electronics company) that supports Wi-Fi 6 technology, emphasizing high-concurrency connections and dual-band transmission. This vulnerability stems from a failure in the sub_417D74 function to properly filter special characters and commands in the filename field
VAR-202509-1516 CVE-2025-10443 CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was identified in Tenda AC9 and AC15 15.03.05.14/15.03.05.18. This vulnerability affects the function formexeCommand of the file /goform/exeCommand. Such manipulation of the argument cmdinput leads to buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.
VAR-202509-1490 CVE-2025-10442 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  firmware and  AC15  Command injection vulnerability in firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was determined in Tenda AC9 and AC15 15.03.05.14. This affects the function formexeCommand of the file /goform/exeCommand. This manipulation of the argument cmdinput causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. Shenzhen Tenda Technology Co.,Ltd. of AC9 firmware and AC15 The firmware contains a command injection vulnerability. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202509-1480 CVE-2025-10432 Shenzhen Tenda Technology Co.,Ltd.  of  ac1206  Buffer error vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: High
A vulnerability was found in Tenda AC1206 15.03.06.23. This vulnerability affects the function check_param_changed of the file /goform/AdvSetMacMtuWa of the component HTTP Request Handler. Performing manipulation of the argument wanMTU results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used. of ac1206 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202509-1494 CVE-2025-10401 D-Link Corporation  of  DIR-823X  Injection Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was detected in D-Link DIR-823x up to 250416. The affected element is an unknown function of the file /goform/diag_ping. Performing manipulation of the argument target_addr results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. D-Link Corporation of DIR-823X The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-823X is a wireless router manufactured by D-Link in China. This vulnerability stems from the failure of the target_addr parameter in the /goform/diag_ping file to properly sanitize special characters and commands in constructed commands. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-4460 No CVE Wuxi Xinjie Electric Co., Ltd.'s XLH-24A16 has a binary vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
The XLH-24A16 is a slim programmable controller. The XLH-24A16 from Wuxi Xinjie Electric Co., Ltd. contains a binary vulnerability that could be exploited to cause a denial of service.
VAR-202509-4151 No CVE TOTOLINK A950RG has a denial of service vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The TOTOLINK A950RG is a super-generation Giga wireless router manufactured by the Chinese company TOTOLINK. The TOTOLINK A950RG contains a denial of service vulnerability that could be exploited to cause a denial of service.
VAR-202509-4250 No CVE Wuxi Xinjie Electric Co., Ltd.'s XLH-24A16 has a binary vulnerability CVSS V2: 3.3
CVSS V3: -
Severity: LOW
The XLH-24A16 is a slim programmable controller. The XLH-24A16 from Wuxi Xinjie Electric Co., Ltd. contains a binary vulnerability that could allow attackers to bypass authentication and log into the system.
VAR-202509-1467 CVE-2025-10359 WAVLINK  of  WL-WN578W2  Command injection vulnerability in firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability was detected in Wavlink WL-WN578W2 221110. This impacts the function sub_404DBC of the file /cgi-bin/wireless.cgi. The manipulation of the argument macAddr results in os command injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the macAddr parameter in the sub_404DBC function in the /cgi-bin/wireless.cgi file to properly sanitize special characters and commands in constructed commands. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-1429 CVE-2025-10358 WAVLINK  of  WL-WN578W2  in the firmware  OS  Command injection vulnerability CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A security vulnerability has been detected in Wavlink WL-WN578W2 221110. This affects the function sub_404850 of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the delete_list parameter of the sub_404850 function in the /cgi-bin/wireless.cgi file to properly sanitize special characters and commands when constructing commands. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-1437 CVE-2025-10325 WAVLINK  of  WL-WN578W2  Injection Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the ipaddr parameter in the sub_401340 function of the /cgi-bin/login.cgi file to properly sanitize special characters and commands during command construction. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-1421 CVE-2025-10324 WAVLINK  of  WL-WN578W2  Injection Vulnerability in Firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects the function sub_401C5C of the file firewall.cgi. This manipulation of the argument pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled parameter in the firewall.cgi function to properly filter special characters and commands in constructed commands. This vulnerability could allow an attacker to execute arbitrary commands
VAR-202509-1446 CVE-2025-10323 WAVLINK  of  WL-WN578W2  Injection Vulnerability in Firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is the function sub_409184 of the file /wizard_rep.shtml. The manipulation of the argument sel_EncrypTyp results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the sel_Encryp parameter of the sub_409184 function in the file /wizard_rep.shtml to properly sanitize special characters and commands during command construction. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-1455 CVE-2025-10322 WAVLINK  of  WL-WN578W2  Vulnerability related to password management function in firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability has been found in Wavlink WL-WN578W2 221110. The affected element is an unknown function of the file /sysinit.html. The manipulation of the argument newpass/confpass leads to weak password recovery. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 There is a vulnerability in the firmware related to the password management function.Information may be tampered with. The Wavlink WL-WN578W2 is a wireless repeater from the Chinese company Wavlink. The Wavlink WL-WN578W2 version 221110 contains an authorization vulnerability. This vulnerability stems from improper permission management for the newpass/confpass parameters in the /sysinit.html file
VAR-202509-1538 CVE-2025-10321 WAVLINK  of  WL-WN578W2  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is an unknown function of the file /live_online.shtml. Executing manipulation can lead to information disclosure. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 There are unspecified vulnerabilities in the firmware.Information may be obtained. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. The Wavlink WL-WN578W2 version 221110 contains an access control vulnerability. This vulnerability stems from incorrect access control in the file /live_online.shtml. An attacker could exploit this vulnerability to leak information
VAR-202509-4203 No CVE D-Link Electronic Equipment (Shanghai) Co., Ltd. DI-7003G has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
The DI-7003G is an enterprise-class router. The DI-7003G router from D-Link Electronics (Shanghai) Co., Ltd. has a command execution vulnerability that could allow an attacker to execute arbitrary commands.