VARIoT IoT vulnerabilities database
| VAR-202509-0309 | CVE-2025-40796 | Siemens' SIMATIC PCS neo and User Management Component (UMC) Out-of-bounds read vulnerability in |
CVSS V2: - CVSS V3: 7.5 Severity: High |
A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions), SIMATIC PCS neo V5.0 (All versions), SIMATIC PCS neo V6.0 (All versions), User Management Component (UMC) (All versions < V2.15.1.3). Affected products contain a out-of-bounds read vulnerability in the integrated UMC component. This could allow an unauthenticated remote attacker to cause a denial of service condition. Siemens' SIMATIC PCS neo and User Management Component (UMC) Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202509-0307 | CVE-2025-40795 | Siemens' SIMATIC PCS neo and User Management Component (UMC) Stack-based buffer overflow vulnerability in |
CVSS V2: - CVSS V3: 9.8 Severity: Critical |
A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions), SIMATIC PCS neo V5.0 (All versions), SIMATIC PCS neo V6.0 (All versions), User Management Component (UMC) (All versions < V2.15.1.3). Affected products contain a stack-based buffer overflow vulnerability in the integrated UMC component. This could allow an unauthenticated remote attacker to execute arbitrary code or to cause a denial of service condition. Siemens' SIMATIC PCS neo and User Management Component (UMC) Exists in a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202509-0363 | CVE-2025-40594 |
CVSS V2: - CVSS V3: 6.3 Severity: Medium |
A vulnerability has been identified in SINAMICS G220 V6.4 (All versions < V6.4 HF2), SINAMICS S200 V6.4 (All versions), SINAMICS S210 V6.4 (All versions < V6.4 HF2). The affected devices allow a factory reset to be executed without the required privileges due to improper privilege management as well as manipulation of configuration data because of leaked privileges of previous sessions. This could allow an unauthorized attacker to escalate their privileges.
| VAR-202509-0246 | CVE-2025-10123 | D-Link Corporation of DIR-823X Injection Vulnerability in Firmware |
CVSS V2: 7.5 CVSS V3: 7.3 Severity: Medium |
A vulnerability was determined in D-Link DIR-823X up to 250416. Affected by this vulnerability is the function sub_415028 of the file /goform/set_static_leases. Executing manipulation of the argument Hostname can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. D-Link Corporation of DIR-823X The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-823X is a wireless router manufactured by D-Link, a Chinese company. This vulnerability could allow an attacker to execute arbitrary commands on the system
| VAR-202509-0625 | CVE-2025-42920 |
CVSS V2: - CVSS V3: 6.1 Severity: MEDIUM |
Due to a Cross-Site Scripting (XSS) vulnerability in the SAP Supplier Relationship Management, an unauthenticated attacker could generate a malicious link and make it publicly accessible. If an authenticated victim clicks on the link, the injected input is processed during the page generation, resulting in the execution of malicious content. This execution allows the attacker to access and modify information within the victim's browser scope, impacting confidentiality and integrity, while availability remains unaffected.
| VAR-202509-0311 | CVE-2025-10120 | Shenzhen Tenda Technology Co.,Ltd. of AC20 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was detected in Tenda AC20 up to 16.03.08.12. The impacted element is the function strcpy of the file /goform/GetParentControlInfo. The manipulation of the argument mac results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. Shenzhen Tenda Technology Co.,Ltd. of AC20 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker could exploit this vulnerability by remotely sending specially crafted data to trigger the buffer overflow, thereby executing arbitrary code or causing the system to crash
| VAR-202509-0249 | CVE-2025-10093 | D-Link Corporation of DIR-852 Firmware vulnerabilities |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: Medium |
A vulnerability was identified in D-Link DIR-852 up to 1.00CN B09. Affected by this vulnerability is the function phpcgi_main of the file /getcfg.php of the component Device Configuration Handler. Such manipulation leads to information disclosure. The attack may be performed from remote. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-852 There are unspecified vulnerabilities in the firmware.Information may be obtained
| VAR-202509-4025 | No CVE | D-Link DI-8300 has a denial of service vulnerability |
CVSS V2: 3.8 CVSS V3: - Severity: LOW |
The DI-8300 is a broadband router designed for business users, featuring Internet behavior management features.
The D-Link DI-8300 has a denial of service vulnerability that could be exploited by an attacker to cause a denial of service.
| VAR-202509-4204 | No CVE | D-Link DI-8200 has a denial of service vulnerability |
CVSS V2: 3.8 CVSS V3: - Severity: LOW |
The DI-8200 is an enterprise-class router.
The D-Link DI-8200 has a denial of service vulnerability that could be exploited by an attacker to cause a denial of service.
| VAR-202509-4248 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. AC23 has an ICMP Redirect hijacking vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The AC23 is a gigabit router.
The AC23 of Shenzhen Jixiang Tengda Technology Co., Ltd. suffers from an ICMP Redirect hijacking vulnerability, which could be exploited to cause a denial of service.
| VAR-202509-0186 | CVE-2025-10034 | D-Link Corporation of DIR-825 Classic buffer overflow vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-825 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-825 is a dual-band wireless router designed for small and medium-sized enterprises (SMEs) and SOHO environments. It supports simultaneous operation of the 2.4GHz and 5GHz bands, meeting the needs of multi-device HD video transmission.
The D-Link DIR-825 suffers from a buffer overflow vulnerability caused by a failure to properly validate the length of input data in the ping6_ipaddr parameter. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202509-4024 | No CVE | Samsung SL-J1760W has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Samsung SL-J1760W is a laser printer.
The Samsung SL-J1760W has an unauthorized access vulnerability that could allow an attacker to obtain sensitive information.
| VAR-202509-0172 | CVE-2025-9938 | D-Link Corporation of di-8400 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. D-Link Corporation of di-8400 The firmware contains a buffer error vulnerability, a stack-based buffer overflow vulnerability, and an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DI-8400 is an enterprise-grade router for managing internet access in medium to large enterprise network environments, launched by D-Link. Attackers could exploit this vulnerability to cause arbitrary code execution, unauthorized device control, sensitive information theft, or denial-of-service attacks
| VAR-202509-0043 | CVE-2025-9935 | TOTOLINK of n600r Injection Vulnerability in Firmware |
CVSS V2: 7.5 CVSS V3: 7.3 Severity: Medium |
A vulnerability was determined in TOTOLINK N600R 4.3.0cu.7866_B20220506. This vulnerability affects the function sub_4159F8 of the file /web_cste/cgi-bin/cstecgi.cgi. Executing manipulation can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. TOTOLINK of n600r The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK N600R is a dual-band wireless router released by the Korean brand TOTOLINK in 2013. It supports concurrent operation in the 2.4GHz and 5GHz bands, with a maximum wireless transmission rate of 300Mbps. No detailed vulnerability details are currently available
| VAR-202509-0181 | CVE-2025-9934 | TOTOLINK of X5000R Injection Vulnerability in Firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability was found in TOTOLINK X5000R 9.1.0cu.2415_B20250515. This affects the function sub_410C34 of the file /cgi-bin/cstecgi.cgi. Performing manipulation of the argument pid results in command injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. TOTOLINK of X5000R The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK X5000R is a wireless router that supports Wi-Fi 6 technology, featuring a full-coverage mesh system and dual-band transmission capabilities, making it suitable for home and enterprise network environments.
The TOTOLINK X5000R has a command injection vulnerability caused by the failure of the pid parameter in the /cgi-bin/cstecgi.cgi file to properly sanitize special characters and commands when constructing commands. Detailed vulnerability details are not available at this time
| VAR-202509-1061 | CVE-2025-36907 | Google Pixel Privilege Escalation Vulnerability (CNVD-2025-25481) |
CVSS V2: 6.8 CVSS V3: 7.3 Severity: HIGH |
In draw_surface_image() of abl/android/lib/draw/draw.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege via USB fastboot, after a bootloader unlock, with no additional execution privileges needed. User interaction is needed for exploitation. The Google Pixel is a smartphone from the American company Google.
A security vulnerability exists in the Google Pixel that could be exploited by an attacker to cause out-of-bounds write and local privilege escalation
| VAR-202509-0235 | CVE-2025-36899 | Google of Android Active state debug code vulnerability in |
CVSS V2: 7.2 CVSS V3: 8.4 Severity: HIGH |
There is a possible escalation of privilege due to test/debugging code left in a production build. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android contains a vulnerability in the active debug code.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Google Pixel is a smartphone from the American company Google.
A security vulnerability exists in the Google Pixel that could allow an attacker to escalate physical privileges
| VAR-202509-4536 | No CVE | Moxa Technology (Shanghai) Co., Ltd.'s Moxa ioLogik Remote I/O Server E1214 has a weak password vulnerability. |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
The Moxa ioLogik Remote I/O Server E1214 is a network device for industrial automation and data acquisition. It enables remote monitoring and control of various analog and digital input/output (I/O) signals via Ethernet connection.
The Moxa ioLogik Remote I/O Server E1214 from Moxa Technology (Shanghai) Co., Ltd. contains a weak password vulnerability. Attackers could exploit this vulnerability to log into the system, obtain sensitive information, and perform unauthorized operations.
| VAR-202509-0357 | CVE-2025-55852 | Shenzhen Tenda Technology Co.,Ltd. of AC8 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda AC8 v16.03.34.06 is vulnerable to Buffer Overflow in the formWifiBasicSet function via the parameter security or security_5g. Shenzhen Tenda Technology Co.,Ltd. of AC8 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda AC8 is a dual-gigabit wireless router designed for homes with fiber optic connections up to 1000 Mbps. It supports IPv6 and features intelligent network management.
The Tenda AC8 suffers from a buffer overflow vulnerability caused by the formWifiBasicSet function's failure to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202509-1283 | CVE-2025-21035 | Samsung's calendar Vulnerability in |
CVSS V2: - CVSS V3: 4.6 Severity: MEDIUM |
Improper access control in Samsung Calendar prior to version 12.5.06.5 in Android 14 and 12.6.01.12 in Android 15 allows physical attackers to access data across multiple user profiles. Samsung's calendar Exists in unspecified vulnerabilities.Information may be obtained