VARIoT IoT vulnerabilities database
| VAR-202509-4516 | No CVE | WAGO 750-890, manufactured by WAGO Electronics (Tianjin) Co., Ltd., contains an unauthorized access vulnerability. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The WAGO 750-890 is a Modbus TCP controller suitable for industrial automation systems and supports the Modbus communication protocol.
WAGO Electronics (Tianjin) Co., Ltd.'s WAGO 750-890 contains an unauthorized access vulnerability, which attackers could exploit to obtain sensitive information.
| VAR-202509-4395 | No CVE | Siemens Mobility Trainguard End-of-Train and Head-of-Train Weak Authentication Vulnerabilities |
CVSS V2: 8.3 CVSS V3: - Severity: HIGH |
The Trainguard End-of-Train (EOT) is a next-generation train-end device used to connect onboard telemetry. The Trainguard Head-of-Train (HOT) is a head-of-train device. These devices communicate using the S-9152 standard.
Siemens Mobility Trainguard End-of-Train and Head-of-Train devices have weak authentication vulnerabilities. This vulnerability stems from a lack of authentication in the device's communication protocol. An attacker could exploit this vulnerability to inject malicious commands, causing operational disruptions or brake failures.
| VAR-202509-4499 | No CVE | TOTOLINK LR350 has a stack overflow vulnerability. |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The LR350 is a wireless router.
The TOTOLINK LR350 contains a stack overflow vulnerability that attackers could exploit to cause a denial-of-service attack.
| VAR-202509-4515 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd.'s AC10 has a binary vulnerability. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The AC10 is a high-performance router with gigabit ports on both the WAN and LAN sides.
Shenzhen Jixiang Tengda Technology Co., Ltd.'s AC10 router contains a binary vulnerability that attackers could exploit to cause a denial-of-service attack.
| VAR-202509-2702 | CVE-2025-52053 | TOTOLINK of x6000r Command injection vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK X6000R V9.4.0cu.1360_B20241207 was found to contain a command injection vulnerability in the sub_417D74 function via the file_name parameter. This vulnerability allows unauthenticated attackers to execute arbitrary commands via a crafted request. TOTOLINK of x6000r Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK X6000R is a wireless router launched by TOTOLINK (a Chinese electronics company) that supports Wi-Fi 6 technology, emphasizing high-concurrency connections and dual-band transmission. This vulnerability stems from a failure in the sub_417D74 function to properly filter special characters and commands in the filename field
| VAR-202509-1516 | CVE-2025-10443 |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was identified in Tenda AC9 and AC15 15.03.05.14/15.03.05.18. This vulnerability affects the function formexeCommand of the file /goform/exeCommand. Such manipulation of the argument cmdinput leads to buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.
| VAR-202509-1490 | CVE-2025-10442 | Shenzhen Tenda Technology Co.,Ltd. of AC9 firmware and AC15 Command injection vulnerability in firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability was determined in Tenda AC9 and AC15 15.03.05.14. This affects the function formexeCommand of the file /goform/exeCommand. This manipulation of the argument cmdinput causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. Shenzhen Tenda Technology Co.,Ltd. of AC9 firmware and AC15 The firmware contains a command injection vulnerability. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202509-1480 | CVE-2025-10432 | Shenzhen Tenda Technology Co.,Ltd. of ac1206 Buffer error vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: High |
A vulnerability was found in Tenda AC1206 15.03.06.23. This vulnerability affects the function check_param_changed of the file /goform/AdvSetMacMtuWa of the component HTTP Request Handler. Performing manipulation of the argument wanMTU results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used. of ac1206 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202509-1494 | CVE-2025-10401 | D-Link Corporation of DIR-823X Injection Vulnerability in Firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability was detected in D-Link DIR-823x up to 250416. The affected element is an unknown function of the file /goform/diag_ping. Performing manipulation of the argument target_addr results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. D-Link Corporation of DIR-823X The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-823X is a wireless router manufactured by D-Link in China. This vulnerability stems from the failure of the target_addr parameter in the /goform/diag_ping file to properly sanitize special characters and commands in constructed commands. An attacker could exploit this vulnerability to execute arbitrary commands
| VAR-202509-4460 | No CVE | Wuxi Xinjie Electric Co., Ltd.'s XLH-24A16 has a binary vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
The XLH-24A16 is a slim programmable controller.
The XLH-24A16 from Wuxi Xinjie Electric Co., Ltd. contains a binary vulnerability that could be exploited to cause a denial of service.
| VAR-202509-4151 | No CVE | TOTOLINK A950RG has a denial of service vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The TOTOLINK A950RG is a super-generation Giga wireless router manufactured by the Chinese company TOTOLINK.
The TOTOLINK A950RG contains a denial of service vulnerability that could be exploited to cause a denial of service.
| VAR-202509-4250 | No CVE | Wuxi Xinjie Electric Co., Ltd.'s XLH-24A16 has a binary vulnerability |
CVSS V2: 3.3 CVSS V3: - Severity: LOW |
The XLH-24A16 is a slim programmable controller.
The XLH-24A16 from Wuxi Xinjie Electric Co., Ltd. contains a binary vulnerability that could allow attackers to bypass authentication and log into the system.
| VAR-202509-1467 | CVE-2025-10359 | WAVLINK of WL-WN578W2 Command injection vulnerability in firmware |
CVSS V2: 7.5 CVSS V3: 7.3 Severity: Medium |
A vulnerability was detected in Wavlink WL-WN578W2 221110. This impacts the function sub_404DBC of the file /cgi-bin/wireless.cgi. The manipulation of the argument macAddr results in os command injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the macAddr parameter in the sub_404DBC function in the /cgi-bin/wireless.cgi file to properly sanitize special characters and commands in constructed commands. An attacker could exploit this vulnerability to execute arbitrary commands
| VAR-202509-1429 | CVE-2025-10358 | WAVLINK of WL-WN578W2 in the firmware OS Command injection vulnerability |
CVSS V2: 7.5 CVSS V3: 7.3 Severity: Medium |
A security vulnerability has been detected in Wavlink WL-WN578W2 221110. This affects the function sub_404850 of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the delete_list parameter of the sub_404850 function in the /cgi-bin/wireless.cgi file to properly sanitize special characters and commands when constructing commands. An attacker could exploit this vulnerability to execute arbitrary commands
| VAR-202509-1437 | CVE-2025-10325 | WAVLINK of WL-WN578W2 Injection Vulnerability in Firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the ipaddr parameter in the sub_401340 function of the /cgi-bin/login.cgi file to properly sanitize special characters and commands during command construction. An attacker could exploit this vulnerability to execute arbitrary commands
| VAR-202509-1421 | CVE-2025-10324 | WAVLINK of WL-WN578W2 Injection Vulnerability in Firmware |
CVSS V2: 7.5 CVSS V3: 7.3 Severity: Medium |
A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects the function sub_401C5C of the file firewall.cgi. This manipulation of the argument pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled parameter in the firewall.cgi function to properly filter special characters and commands in constructed commands. This vulnerability could allow an attacker to execute arbitrary commands
| VAR-202509-1446 | CVE-2025-10323 | WAVLINK of WL-WN578W2 Injection Vulnerability in Firmware |
CVSS V2: 7.5 CVSS V3: 7.3 Severity: Medium |
A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is the function sub_409184 of the file /wizard_rep.shtml. The manipulation of the argument sel_EncrypTyp results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the sel_Encryp parameter of the sub_409184 function in the file /wizard_rep.shtml to properly sanitize special characters and commands during command construction. An attacker could exploit this vulnerability to execute arbitrary commands
| VAR-202509-1455 | CVE-2025-10322 | WAVLINK of WL-WN578W2 Vulnerability related to password management function in firmware |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: Medium |
A vulnerability has been found in Wavlink WL-WN578W2 221110. The affected element is an unknown function of the file /sysinit.html. The manipulation of the argument newpass/confpass leads to weak password recovery. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 There is a vulnerability in the firmware related to the password management function.Information may be tampered with. The Wavlink WL-WN578W2 is a wireless repeater from the Chinese company Wavlink.
The Wavlink WL-WN578W2 version 221110 contains an authorization vulnerability. This vulnerability stems from improper permission management for the newpass/confpass parameters in the /sysinit.html file
| VAR-202509-1538 | CVE-2025-10321 | WAVLINK of WL-WN578W2 Firmware vulnerabilities |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: Medium |
A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is an unknown function of the file /live_online.shtml. Executing manipulation can lead to information disclosure. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 There are unspecified vulnerabilities in the firmware.Information may be obtained. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company.
The Wavlink WL-WN578W2 version 221110 contains an access control vulnerability. This vulnerability stems from incorrect access control in the file /live_online.shtml. An attacker could exploit this vulnerability to leak information
| VAR-202509-4203 | No CVE | D-Link Electronic Equipment (Shanghai) Co., Ltd. DI-7003G has a command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The DI-7003G is an enterprise-class router.
The DI-7003G router from D-Link Electronics (Shanghai) Co., Ltd. has a command execution vulnerability that could allow an attacker to execute arbitrary commands.