VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202507-2422 CVE-2025-7747 Shenzhen Tenda Technology Co.,Ltd.  of  fh451  Classic buffer overflow vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. This affects the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. The manipulation of the argument PPW leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of fh451 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter PPW in the file /goform/WizardHandle failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202507-1298 No CVE HP LaserJet 600 M602 of HP Trading (Shanghai) Co., Ltd. has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
HP Trading (Shanghai) Co., Ltd. focuses on the research and development, production, sales and international trade of computer equipment, printing equipment and related parts. HP LaserJet 600 M602 of HP Trading (Shanghai) Co., Ltd. has a weak password vulnerability, and attackers can use the vulnerability to log in to the system and obtain sensitive information.
VAR-202507-1637 CVE-2025-53032 Oracle MySQL  of  MySQL Server  In  Server: Optimizer  Vulnerability CVSS V2: 6.1
CVSS V3: 4.9
Severity: MEDIUM
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). An attacker could exploit this vulnerability to cause a denial of service
VAR-202507-1502 CVE-2025-52082 of netgear  XR300  Stack-based buffer overflow vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
In Netgear XR300 V1.0.3.38_10.3.30, a stack-based buffer overflow exists in the HTTPD service through the usb_device.cgi endpoint. The vulnerability occurs when processing POST requests containing the read_access parameter. The NETGEAR XR300 is an entry-level Nighthawk Pro Gaming series wireless router from NETGEAR. Detailed vulnerability details are not available at this time
VAR-202507-0815 CVE-2025-52081 of netgear  XR300  Stack-based buffer overflow vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
In Netgear XR300 V1.0.3.38_10.3.30, a stack-based buffer overflow vulnerability exists in the HTTPD service through the usb_device.cgi endpoint. The vulnerability occurs when processing POST requests containing the usb_folder parameter. The NETGEAR XR300 is an entry-level Nighthawk Pro Gaming series wireless router from NETGEAR. Detailed vulnerability details are not available at this time
VAR-202507-1944 CVE-2025-52080 of netgear  XR300  Stack-based buffer overflow vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
In Netgear XR300 V1.0.3.38_10.3.30, a stack-based buffer overflow vulnerability exists in the HTTPD service through the usb_device.cgi endpoint. The vulnerability occurs when processing POST requests containing the share_name parameter. The NETGEAR XR300 is an entry-level Nighthawk Pro Gaming series wireless router from NETGEAR. Detailed vulnerability details are not available at this time
VAR-202507-1786 CVE-2025-52363 Shenzhen Tenda Technology Co.,Ltd.  of  CP3 Pro  Vulnerability related to use of hardcoded credentials in firmware CVSS V2: 5.6
CVSS V3: 6.8
Severity: MEDIUM
Tenda CP3 Pro Firmware V22.5.4.93 contains a hardcoded root password hash in the /etc/passwd file and /etc/passwd-. An attacker with access to the firmware image can extract and attempt to crack the root password hash, potentially obtaining administrative access. Shenzhen Tenda Technology Co.,Ltd. Tenda CP3 Pro is an intelligent wireless PTZ camera that integrates 360° panoramic monitoring, 3-megapixel high-definition video, and Wi-Fi 6 network technology. It supports functions such as human/pet detection, crying detection, and one-click calling. No detailed vulnerability details are currently provided
VAR-202507-0681 CVE-2025-7615 TOTOLINK  of  t6  Injection Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability classified as critical was found in TOTOLINK T6 4.1.5cu.748. Affected by this vulnerability is the function clearPairCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of t6 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK T6 is a wireless dual-band router released by China's TOTOLINK Electronics. It supports the MQTT protocol and Telnet service. No detailed vulnerability details are currently available
VAR-202507-0626 CVE-2025-7614 TOTOLINK  of  t6  Injection Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability classified as critical has been found in TOTOLINK T6 4.1.5cu.748. Affected is the function delDevice of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ipAddr leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of t6 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK T6 is a wireless dual-band router released by China's TOTOLINK Electronics. It supports the MQTT protocol and Telnet service. No detailed vulnerability details are currently available
VAR-202507-0534 CVE-2025-7613 TOTOLINK  of  t6  Injection Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was found in TOTOLINK T6 4.1.5cu.748. It has been rated as critical. This issue affects the function CloudSrvVersionCheck of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of t6 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK T6 is a wireless dual-band router released by China's TOTOLINK Electronics. It supports the MQTT protocol and Telnet service. No detailed vulnerability details are currently available
VAR-202507-0536 CVE-2025-7603 D-Link Systems, Inc.  of  di-8100  Buffer error vulnerability in firmware CVSS V2: 8.3
CVSS V3: 7.2
Severity: High
A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. Affected is an unknown function of the file /jingx.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of di-8100 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DI-8100 is a broadband router designed for small and medium-sized networks. It supports up to four Internet ports and four LAN ports, allowing up to 80 users to access the internet simultaneously. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202507-0602 CVE-2025-7602 D-Link Systems, Inc.  of  di-8100  Buffer error vulnerability in firmware CVSS V2: 8.3
CVSS V3: 7.2
Severity: High
A vulnerability was found in D-Link DI-8100 16.07.26A1 and classified as critical. This issue affects some unknown processing of the file /arp_sys.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of di-8100 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DI-8100 is a broadband router designed for small and medium-sized networks. It supports up to four Internet ports and four LAN ports, allowing up to 80 users to access the internet simultaneously. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202507-0658 CVE-2025-7598 Shenzhen Tenda Technology Co.,Ltd.  of  ax1803  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability classified as critical was found in Tenda AX1803 1.0.0.1. Affected by this vulnerability is the function formSetWifiMacFilterCfg of the file /goform/setWifiFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of ax1803 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. No detailed vulnerability details are currently provided
VAR-202507-0548 CVE-2025-7597 Shenzhen Tenda Technology Co.,Ltd.  of  ax1803  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability classified as critical has been found in Tenda AX1803 1.0.0.1. Affected is the function formSetMacFilterCfg of the file /goform/setMacFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of ax1803 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. It provides a series of functions for setting and managing network devices. Users can use Tenda Ax1803 Firmware to perform network configuration, manage routers, and other operations, which is convenient and practical. No detailed vulnerability details are currently provided
VAR-202507-0582 CVE-2025-7596 Shenzhen Tenda Technology Co.,Ltd.  of  fh1205  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in Tenda FH1205 2.0.0.7(775). It has been rated as critical. This issue affects the function formWifiExtraSet of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. of fh1205 The firmware contains a buffer error vulnerability, a stack-based buffer overflow vulnerability, and an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter wpapsk_crypto in the file /goform/WifiExtraSet failing to properly verify the length of the input data. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202507-0819 CVE-2025-7586 Shenzhen Tenda Technology Co.,Ltd.  of  ac500  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been declared as critical. Affected by this vulnerability is the function formSetAPCfg of the file /goform/setWtpData. The manipulation of the argument radio_2g_1 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. of ac500 The firmware contains a buffer error vulnerability, a stack-based buffer overflow vulnerability, and an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC500 is a wireless controller device launched by Tenda, designed for small and medium-sized enterprises, and supports cross-VLAN management of wireless networks. The vulnerability is caused by the failure of the parameter radio_2g_1 in the file /goform/setWtpData to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202507-0585 CVE-2025-7553 D-Link Systems, Inc.  of  DIR-818LW  Command injection vulnerability in firmware CVSS V2: 5.8
CVSS V3: 4.7
Severity: Low
A vulnerability classified as critical has been found in D-Link DIR-818LW up to 20191215. This affects an unknown part of the component System Time Page. The manipulation of the argument NTP Server leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Systems, Inc. of DIR-818LW The firmware contains a command injection vulnerability. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-818LW is a dual-band Gigabit cloud router that supports IEEE 802.11ac and IEEE 802.11n wireless standards, with wireless transmission speeds up to 433Mbps. It also provides one USB 2.0 port and four Gigabit wired ports. The D-Link DIR-818LW is vulnerable to a command injection vulnerability caused by the NTP Server parameter in the System Time Page component failing to properly sanitize special characters and commands in constructed commands. No detailed vulnerability details are currently available
VAR-202507-0727 CVE-2025-7551 Shenzhen Tenda Technology Co.,Ltd.  of  fh1201  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in Tenda FH1201 1.2.0.14(408). It has been declared as critical. Affected by this vulnerability is the function fromPptpUserAdd of the file /goform/PPTPDClient. The manipulation of the argument modino/username leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. of fh1201 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter modino/username in the file /goform/PPTPDClient failing to correctly verify the length of the input data. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202507-0614 CVE-2025-7550 Shenzhen Tenda Technology Co.,Ltd.  of  fh1201  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in Tenda FH1201 1.2.0.14(408). It has been classified as critical. Affected is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer. The manipulation of the argument dips leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. of fh1201 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter dips in the file /goform/GstDhcpSetSer failing to correctly verify the length of the input data. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202507-0543 CVE-2025-7549 Shenzhen Tenda Technology Co.,Ltd.  of  fh1201  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in Tenda FH1201 1.2.0.14(408) and classified as critical. This issue affects the function frmL7ProtForm of the file /goform/L7Prot. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of fh1201 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter page in the file /goform/L7Prot failing to correctly verify the length of the input data. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack