VARIoT IoT vulnerabilities database
| VAR-202512-1246 | CVE-2025-20756 |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673749; Issue ID: MSV-4643.
| VAR-202512-1793 | CVE-2025-20755 |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
In Modem, there is a possible application crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00628396; Issue ID: MSV-4775.
| VAR-202512-2043 | CVE-2025-20753 |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689252; Issue ID: MSV-4841.
| VAR-202512-1520 | CVE-2025-20752 |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01270690; Issue ID: MSV-4301.
| VAR-202512-0943 | CVE-2025-58483 |
CVSS V2: - CVSS V3: 5.9 Severity: MEDIUM |
Improper export of android application components in Galaxy Store for Galaxy Watch prior to version 1.0.06.29 allows local attacker to install arbitrary application on Galaxy Store.
| VAR-202512-0181 | CVE-2025-55222 | Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: HIGH |
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP USB Function functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to a denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.This vulnerability is specific to the malicious message sent via Modbus RTU over TCP on port 503. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power and communication functions into a single unit.
The Socomec DIRIS Digiware M-70 contains a denial-of-service vulnerability stemming from the Modbus RTU over TCP USB function's failure to properly restrict resource access packets from unauthorized roles. An attacker could exploit this vulnerability to cause a denial-of-service attack
| VAR-202512-0182 | CVE-2025-55221 | Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30454) |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: HIGH |
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP USB Function functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to a denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.This vulnerability is specific to the malicious message sent via Modbus TCP over port 502. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit. An attacker could exploit this vulnerability to cause a denial-of-service attack
| VAR-202512-0008 | CVE-2025-54851 | Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30459) |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a single Modbus TCP message to port 503 using the Write Single Register function code (6) to write the value 1 to register 4352. This action changes the Modbus address to 15. After this message is sent, the device will be in a denial-of-service state. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit. An attacker could exploit this vulnerability to cause a denial-of-service attack
| VAR-202512-0005 | CVE-2025-54850 | Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30453) |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus RTU over TCP messages to port 503 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change.
After this configuration change, the device will be in a denial-of-service state. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit. An attacker could exploit this vulnerability to cause a denial-of-service attack
| VAR-202512-0006 | CVE-2025-54849 | Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30455) |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a single Modbus TCP message to port 502 using the Write Single Register function code (6) to write the value 1 to register 4352. This action changes the Modbus address to 15. After this message is sent, the device will be in a denial-of-service state. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power and communication functions into a single unit.
The Socomec DIRIS Digiware M-70 contains a denial-of-service vulnerability stemming from the Modbus TCP function's failure to properly restrict resource access from unauthorized roles. An attacker could exploit this vulnerability to cause a denial-of-service attack
| VAR-202512-0007 | CVE-2025-54848 | Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30458) |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus TCP messages to port 502 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change. After this configuration change, the device will be in a denial-of-service state. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit. An attacker could exploit this vulnerability to cause a denial-of-service attack
| VAR-202512-0340 | CVE-2025-26858 | Socomec DIRIS Digiware M-70 buffer overflow vulnerability |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: HIGH |
A buffer overflow vulnerability exists in the Modbus TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted set of network packets can lead to denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit
| VAR-202512-0230 | CVE-2025-23417 | Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30456) |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: HIGH |
A denial of service vulnerability exists in the Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit
| VAR-202512-0388 | CVE-2024-53684 | Socomec DIRIS Digiware M-70 Cross-Site Request Forgery Vulnerability |
CVSS V2: 10.0 CVSS V3: 7.5 Severity: HIGH |
A cross-site request forgery (csrf) vulnerability exists in the WEBVIEW-M functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted HTTP request can lead to unauthorized access. An attacker can stage a malicious webpage to trigger this vulnerability. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit. This vulnerability stems from the WEBVIEW-M function's inadequate verification of whether requests originate from trusted users. Detailed vulnerability information is currently unavailable
| VAR-202512-0003 | CVE-2024-48894 | Socomec DIRIS Digiware M-70 plaintext transmission vulnerability |
CVSS V2: 7.8 CVSS V3: 5.9 Severity: MEDIUM |
A cleartext transmission vulnerability exists in the WEBVIEW-M functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can sniff network traffic to trigger this vulnerability. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit. Attackers could exploit this vulnerability to leak sensitive information
| VAR-202512-0004 | CVE-2024-48882 | Socomec DIRIS Digiware M-70 Denial-of-Service Vulnerability (CNVD-2025-30457) |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: HIGH |
A denial of service vulnerability exists in the Modbus TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability. The Socomec DIRIS Digiware M-70 is a communication gateway device that serves as the access point for the DIRIS Digiware system, integrating 24VDC power supply and communication functions into a single unit
| VAR-202511-2406 | CVE-2025-64656 | Microsoft Application Gateway privilege escalation vulnerability |
CVSS V2: 9.7 CVSS V3: 9.4 Severity: CRITICAL |
Out-of-bounds read in Application Gateway allows an unauthorized attacker to elevate privileges over a network. Microsoft Application Gateway is an application gateway developed by Microsoft Corporation
| VAR-202511-2413 | CVE-2025-59372 | ASUS Router path traversal vulnerability (CNVD-2025-29937) |
CVSS V2: 6.1 CVSS V3: - Severity: Medium |
A path traversal vulnerability has been identified in certain router models. A remote, authenticated attacker could exploit this vulnerability to write files outside the intended directory, potentially affecting device integrity.
Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information. ASUS Router is a router product and accompanying management application launched by ASUS, primarily used for wireless connectivity and management in home and enterprise networks
| VAR-202511-2374 | CVE-2025-59371 | ASUS Router authentication bypass vulnerability |
CVSS V2: 8.3 CVSS V3: - Severity: High |
An authentication bypass vulnerability has been identified in the IFTTT integration feature. A remote, authenticated attacker could leverage this vulnerability to potentially gain unauthorized access to the device. This vulnerability does not affect Wi-Fi 7 series models.
Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information. ASUS Router is a router product and accompanying management application launched by ASUS, primarily used for wireless connectivity and management in home and enterprise networks
| VAR-202511-2421 | CVE-2025-59370 | ASUS Router command injection vulnerability |
CVSS V2: 8.3 CVSS V3: - Severity: High |
A command injection vulnerability has been identified in bwdpi. A remote, authenticated attacker could leverage this vulnerability to potentially execute arbitrary commands, leading to the device executing unintended instructions.
Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information. ASUS Router is a router product and accompanying management application launched by ASUS, primarily used for wireless connectivity and management in home and enterprise networks