VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202512-1246 CVE-2025-20756 CVSS V2: -
CVSS V3: 5.3
Severity: MEDIUM
In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673749; Issue ID: MSV-4643.
VAR-202512-1793 CVE-2025-20755 CVSS V2: -
CVSS V3: 5.3
Severity: MEDIUM
In Modem, there is a possible application crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00628396; Issue ID: MSV-4775.
VAR-202512-2043 CVE-2025-20753 CVSS V2: -
CVSS V3: 5.3
Severity: MEDIUM
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689252; Issue ID: MSV-4841.
VAR-202512-1520 CVE-2025-20752 CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01270690; Issue ID: MSV-4301.
VAR-202512-0943 CVE-2025-58483 CVSS V2: -
CVSS V3: 5.9
Severity: MEDIUM
Improper export of android application components in Galaxy Store for Galaxy Watch prior to version 1.0.06.29 allows local attacker to install arbitrary application on Galaxy Store.
VAR-202512-0181 CVE-2025-55222 Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability CVSS V2: 7.8
CVSS V3: 8.6
Severity: HIGH
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP USB Function functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to a denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.This vulnerability is specific to the malicious message sent via Modbus RTU over TCP on port 503. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power and communication functions into a single unit. The Socomec DIRIS Digiware M-70 contains a denial-of-service vulnerability stemming from the Modbus RTU over TCP USB function's failure to properly restrict resource access packets from unauthorized roles. An attacker could exploit this vulnerability to cause a denial-of-service attack
VAR-202512-0182 CVE-2025-55221 Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30454) CVSS V2: 7.8
CVSS V3: 8.6
Severity: HIGH
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP USB Function functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to a denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.This vulnerability is specific to the malicious message sent via Modbus TCP over port 502. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit. An attacker could exploit this vulnerability to cause a denial-of-service attack
VAR-202512-0008 CVE-2025-54851 Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30459) CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a single Modbus TCP message to port 503 using the Write Single Register function code (6) to write the value 1 to register 4352. This action changes the Modbus address to 15. After this message is sent, the device will be in a denial-of-service state. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit. An attacker could exploit this vulnerability to cause a denial-of-service attack
VAR-202512-0005 CVE-2025-54850 Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30453) CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus RTU over TCP messages to port 503 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change. After this configuration change, the device will be in a denial-of-service state. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit. An attacker could exploit this vulnerability to cause a denial-of-service attack
VAR-202512-0006 CVE-2025-54849 Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30455) CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a single Modbus TCP message to port 502 using the Write Single Register function code (6) to write the value 1 to register 4352. This action changes the Modbus address to 15. After this message is sent, the device will be in a denial-of-service state. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power and communication functions into a single unit. The Socomec DIRIS Digiware M-70 contains a denial-of-service vulnerability stemming from the Modbus TCP function's failure to properly restrict resource access from unauthorized roles. An attacker could exploit this vulnerability to cause a denial-of-service attack
VAR-202512-0007 CVE-2025-54848 Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30458) CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus TCP messages to port 502 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change. After this configuration change, the device will be in a denial-of-service state. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit. An attacker could exploit this vulnerability to cause a denial-of-service attack
VAR-202512-0340 CVE-2025-26858 Socomec DIRIS Digiware M-70 buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 8.6
Severity: HIGH
A buffer overflow vulnerability exists in the Modbus TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted set of network packets can lead to denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit
VAR-202512-0230 CVE-2025-23417 Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30456) CVSS V2: 7.8
CVSS V3: 8.6
Severity: HIGH
A denial of service vulnerability exists in the Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit
VAR-202512-0388 CVE-2024-53684 Socomec DIRIS Digiware M-70 Cross-Site Request Forgery Vulnerability CVSS V2: 10.0
CVSS V3: 7.5
Severity: HIGH
A cross-site request forgery (csrf) vulnerability exists in the WEBVIEW-M functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted HTTP request can lead to unauthorized access. An attacker can stage a malicious webpage to trigger this vulnerability. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit. This vulnerability stems from the WEBVIEW-M function's inadequate verification of whether requests originate from trusted users. Detailed vulnerability information is currently unavailable
VAR-202512-0003 CVE-2024-48894 Socomec DIRIS Digiware M-70 plaintext transmission vulnerability CVSS V2: 7.8
CVSS V3: 5.9
Severity: MEDIUM
A cleartext transmission vulnerability exists in the WEBVIEW-M functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can sniff network traffic to trigger this vulnerability. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit. Attackers could exploit this vulnerability to leak sensitive information
VAR-202512-0004 CVE-2024-48882 Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30457) CVSS V2: 7.8
CVSS V3: 8.6
Severity: HIGH
A denial of service vulnerability exists in the Modbus TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit
VAR-202511-2406 CVE-2025-64656 Microsoft Application Gateway privilege escalation vulnerability CVSS V2: 9.7
CVSS V3: 9.4
Severity: CRITICAL
Out-of-bounds read in Application Gateway allows an unauthorized attacker to elevate privileges over a network. Microsoft Application Gateway is an application gateway developed by Microsoft Corporation
VAR-202511-2413 CVE-2025-59372 ASUS Router path traversal vulnerability (CNVD-2025-29937) CVSS V2: 6.1
CVSS V3: -
Severity: Medium
A path traversal vulnerability has been identified in certain router models. A remote, authenticated attacker could exploit this vulnerability to write files outside the intended directory, potentially affecting device integrity. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information. ASUS Router is a router product and accompanying management application launched by ASUS, primarily used for wireless connectivity and management in home and enterprise networks
VAR-202511-2374 CVE-2025-59371 ASUS Router authentication bypass vulnerability CVSS V2: 8.3
CVSS V3: -
Severity: High
An authentication bypass vulnerability has been identified in the IFTTT integration feature. A remote, authenticated attacker could leverage this vulnerability to potentially gain unauthorized access to the device. This vulnerability does not affect Wi-Fi 7 series models. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information. ASUS Router is a router product and accompanying management application launched by ASUS, primarily used for wireless connectivity and management in home and enterprise networks
VAR-202511-2421 CVE-2025-59370 ASUS Router command injection vulnerability CVSS V2: 8.3
CVSS V3: -
Severity: High
A command injection vulnerability has been identified in bwdpi. A remote, authenticated attacker could leverage this vulnerability to potentially execute arbitrary commands, leading to the device executing unintended instructions. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information. ASUS Router is a router product and accompanying management application launched by ASUS, primarily used for wireless connectivity and management in home and enterprise networks