VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202509-0309 CVE-2025-40796 Siemens'  SIMATIC PCS neo  and  User Management Component (UMC)  Out-of-bounds read vulnerability in CVSS V2: -
CVSS V3: 7.5
Severity: High
A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions), SIMATIC PCS neo V5.0 (All versions), SIMATIC PCS neo V6.0 (All versions), User Management Component (UMC) (All versions < V2.15.1.3). Affected products contain a out-of-bounds read vulnerability in the integrated UMC component. This could allow an unauthenticated remote attacker to cause a denial of service condition. Siemens' SIMATIC PCS neo and User Management Component (UMC) Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202509-0307 CVE-2025-40795 Siemens'  SIMATIC PCS neo  and  User Management Component (UMC)  Stack-based buffer overflow vulnerability in CVSS V2: -
CVSS V3: 9.8
Severity: Critical
A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions), SIMATIC PCS neo V5.0 (All versions), SIMATIC PCS neo V6.0 (All versions), User Management Component (UMC) (All versions < V2.15.1.3). Affected products contain a stack-based buffer overflow vulnerability in the integrated UMC component. This could allow an unauthenticated remote attacker to execute arbitrary code or to cause a denial of service condition. Siemens' SIMATIC PCS neo and User Management Component (UMC) Exists in a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202509-0363 CVE-2025-40594 CVSS V2: -
CVSS V3: 6.3
Severity: Medium
A vulnerability has been identified in SINAMICS G220 V6.4 (All versions < V6.4 HF2), SINAMICS S200 V6.4 (All versions), SINAMICS S210 V6.4 (All versions < V6.4 HF2). The affected devices allow a factory reset to be executed without the required privileges due to improper privilege management as well as manipulation of configuration data because of leaked privileges of previous sessions. This could allow an unauthorized attacker to escalate their privileges.
VAR-202509-0246 CVE-2025-10123 D-Link Corporation  of  DIR-823X  Injection Vulnerability in Firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability was determined in D-Link DIR-823X up to 250416. Affected by this vulnerability is the function sub_415028 of the file /goform/set_static_leases. Executing manipulation of the argument Hostname can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. D-Link Corporation of DIR-823X The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-823X is a wireless router manufactured by D-Link, a Chinese company. This vulnerability could allow an attacker to execute arbitrary commands on the system
VAR-202509-0625 CVE-2025-42920 CVSS V2: -
CVSS V3: 6.1
Severity: MEDIUM
Due to a Cross-Site Scripting (XSS) vulnerability in the SAP Supplier Relationship Management, an unauthenticated attacker could generate a malicious link and make it publicly accessible. If an authenticated victim clicks on the link, the injected input is processed during the page generation, resulting in the execution of malicious content. This execution allows the attacker to access and modify information within the victim's browser scope, impacting confidentiality and integrity, while availability remains unaffected.
VAR-202509-0311 CVE-2025-10120 Shenzhen Tenda Technology Co.,Ltd.  of  AC20  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was detected in Tenda AC20 up to 16.03.08.12. The impacted element is the function strcpy of the file /goform/GetParentControlInfo. The manipulation of the argument mac results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. Shenzhen Tenda Technology Co.,Ltd. of AC20 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker could exploit this vulnerability by remotely sending specially crafted data to trigger the buffer overflow, thereby executing arbitrary code or causing the system to crash
VAR-202509-0249 CVE-2025-10093 D-Link Corporation  of  DIR-852  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability was identified in D-Link DIR-852 up to 1.00CN B09. Affected by this vulnerability is the function phpcgi_main of the file /getcfg.php of the component Device Configuration Handler. Such manipulation leads to information disclosure. The attack may be performed from remote. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-852 There are unspecified vulnerabilities in the firmware.Information may be obtained
VAR-202509-4025 No CVE D-Link DI-8300 has a denial of service vulnerability CVSS V2: 3.8
CVSS V3: -
Severity: LOW
The DI-8300 is a broadband router designed for business users, featuring Internet behavior management features. The D-Link DI-8300 has a denial of service vulnerability that could be exploited by an attacker to cause a denial of service.
VAR-202509-4204 No CVE D-Link DI-8200 has a denial of service vulnerability CVSS V2: 3.8
CVSS V3: -
Severity: LOW
The DI-8200 is an enterprise-class router. The D-Link DI-8200 has a denial of service vulnerability that could be exploited by an attacker to cause a denial of service.
VAR-202509-4248 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. AC23 has an ICMP Redirect hijacking vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The AC23 is a gigabit router. The AC23 of Shenzhen Jixiang Tengda Technology Co., Ltd. suffers from an ICMP Redirect hijacking vulnerability, which could be exploited to cause a denial of service.
VAR-202509-0186 CVE-2025-10034 D-Link Corporation  of  DIR-825  Classic buffer overflow vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-825 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-825 is a dual-band wireless router designed for small and medium-sized enterprises (SMEs) and SOHO environments. It supports simultaneous operation of the 2.4GHz and 5GHz bands, meeting the needs of multi-device HD video transmission. The D-Link DIR-825 suffers from a buffer overflow vulnerability caused by a failure to properly validate the length of input data in the ping6_ipaddr parameter. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202509-4024 No CVE Samsung SL-J1760W has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Samsung SL-J1760W is a laser printer. The Samsung SL-J1760W has an unauthorized access vulnerability that could allow an attacker to obtain sensitive information.
VAR-202509-0172 CVE-2025-9938 D-Link Corporation  of  di-8400  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. D-Link Corporation of di-8400 The firmware contains a buffer error vulnerability, a stack-based buffer overflow vulnerability, and an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DI-8400 is an enterprise-grade router for managing internet access in medium to large enterprise network environments, launched by D-Link. Attackers could exploit this vulnerability to cause arbitrary code execution, unauthorized device control, sensitive information theft, or denial-of-service attacks
VAR-202509-0043 CVE-2025-9935 TOTOLINK  of  n600r  Injection Vulnerability in Firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability was determined in TOTOLINK N600R 4.3.0cu.7866_B20220506. This vulnerability affects the function sub_4159F8 of the file /web_cste/cgi-bin/cstecgi.cgi. Executing manipulation can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. TOTOLINK of n600r The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK N600R is a dual-band wireless router released by the Korean brand TOTOLINK in 2013. It supports concurrent operation in the 2.4GHz and 5GHz bands, with a maximum wireless transmission rate of 300Mbps. No detailed vulnerability details are currently available
VAR-202509-0181 CVE-2025-9934 TOTOLINK  of  X5000R  Injection Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was found in TOTOLINK X5000R 9.1.0cu.2415_B20250515. This affects the function sub_410C34 of the file /cgi-bin/cstecgi.cgi. Performing manipulation of the argument pid results in command injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. TOTOLINK of X5000R The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK X5000R is a wireless router that supports Wi-Fi 6 technology, featuring a full-coverage mesh system and dual-band transmission capabilities, making it suitable for home and enterprise network environments. The TOTOLINK X5000R has a command injection vulnerability caused by the failure of the pid parameter in the /cgi-bin/cstecgi.cgi file to properly sanitize special characters and commands when constructing commands. Detailed vulnerability details are not available at this time
VAR-202509-1061 CVE-2025-36907 Google Pixel Privilege Escalation Vulnerability (CNVD-2025-25481) CVSS V2: 6.8
CVSS V3: 7.3
Severity: HIGH
In draw_surface_image() of abl/android/lib/draw/draw.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege via USB fastboot, after a bootloader unlock, with no additional execution privileges needed. User interaction is needed for exploitation. The Google Pixel is a smartphone from the American company Google. A security vulnerability exists in the Google Pixel that could be exploited by an attacker to cause out-of-bounds write and local privilege escalation
VAR-202509-0235 CVE-2025-36899 Google  of  Android  Active state debug code vulnerability in CVSS V2: 7.2
CVSS V3: 8.4
Severity: HIGH
There is a possible escalation of privilege due to test/debugging code left in a production build. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android contains a vulnerability in the active debug code.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Google Pixel is a smartphone from the American company Google. A security vulnerability exists in the Google Pixel that could allow an attacker to escalate physical privileges
VAR-202509-4536 No CVE Moxa Technology (Shanghai) Co., Ltd.'s Moxa ioLogik Remote I/O Server E1214 has a weak password vulnerability. CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
The Moxa ioLogik Remote I/O Server E1214 is a network device for industrial automation and data acquisition. It enables remote monitoring and control of various analog and digital input/output (I/O) signals via Ethernet connection. The Moxa ioLogik Remote I/O Server E1214 from Moxa Technology (Shanghai) Co., Ltd. contains a weak password vulnerability. Attackers could exploit this vulnerability to log into the system, obtain sensitive information, and perform unauthorized operations.
VAR-202509-0357 CVE-2025-55852 Shenzhen Tenda Technology Co.,Ltd.  of  AC8  Stack-based buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda AC8 v16.03.34.06 is vulnerable to Buffer Overflow in the formWifiBasicSet function via the parameter security or security_5g. Shenzhen Tenda Technology Co.,Ltd. of AC8 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda AC8 is a dual-gigabit wireless router designed for homes with fiber optic connections up to 1000 Mbps. It supports IPv6 and features intelligent network management. The Tenda AC8 suffers from a buffer overflow vulnerability caused by the formWifiBasicSet function's failure to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
VAR-202509-1283 CVE-2025-21035 Samsung's  calendar  Vulnerability in CVSS V2: -
CVSS V3: 4.6
Severity: MEDIUM
Improper access control in Samsung Calendar prior to version 12.5.06.5 in Android 14 and 12.6.01.12 in Android 15 allows physical attackers to access data across multiple user profiles. Samsung's calendar Exists in unspecified vulnerabilities.Information may be obtained