VARIoT IoT vulnerabilities database

VAR-202504-1138 | CVE-2025-30003 | Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08355) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateProjectConnections' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25910). Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany
VAR-202504-1086 | CVE-2025-30002 | Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08358) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateConnectionVariables' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25909). Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany
VAR-202504-1106 | CVE-2025-29905 | Siemens TeleControl Server Basic SQL Injection Vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'RestoreFromBackup' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25923). Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany
VAR-202504-2407 | CVE-2025-25458 | Shenzhen Tenda Technology Co.,Ltd. of AC10 Classic buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 4.6 Severity: MEDIUM |
Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via serverName2. Shenzhen Tenda Technology Co.,Ltd. of AC10 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-1576 | CVE-2025-25453 | Shenzhen Tenda Technology Co.,Ltd. of AC10 Classic buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 4.6 Severity: MEDIUM |
Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via serviceName2. Shenzhen Tenda Technology Co.,Ltd. of AC10 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-1784 | CVE-2025-25456 | Shenzhen Tenda Technology Co.,Ltd. of AC10 Classic buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via mac2. Shenzhen Tenda Technology Co.,Ltd. of AC10 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-3185 | CVE-2025-22903 | TOTOLINK of n600r Stack-based buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 4.6 Severity: MEDIUM |
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the pin parameter in the function setWiFiWpsConfig. TOTOLINK of n600r A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-1797 | CVE-2025-22900 | TOTOLINK of n600r Stack-based buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Totolink N600R v4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the macCloneMac parameter in the setWanConfig function. TOTOLINK of n600r A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-0715 | CVE-2025-29999 | Siemens License Server Improper Permission Management Vulnerability |
CVSS V2: 6.0 CVSS V3: 6.7 Severity: Medium |
A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). The affected application searches for executable files in the application folder without proper validation.
This could allow an attacker to execute arbitrary code with administrative privileges by placing a malicious executable in the same directory
VAR-202504-0719 | CVE-2024-41796 | Siemens SENTRON 7KT PAC1260 Data Manager has an unspecified vulnerability (CNVD-2025-07815) |
CVSS V2: 7.8 CVSS V3: 6.5 Severity: Medium |
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices allows to change the login password without knowing the current password. In combination with a prepared CSRF attack (CVE-2024-41795) an unauthenticated attacker could be able to set the password to an attacker-controlled value. Siemens SENTRON 7KT PAC1260 Data Manager is a device for power monitoring and energy consumption management from Siemens, Germany
VAR-202504-0725 | CVE-2024-41795 | Siemens SENTRON 7KT PAC1260 Data Manager has an unspecified vulnerability |
CVSS V2: 7.8 CVSS V3: 6.5 Severity: Medium |
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices is vulnerable to Cross-Site Request Forgery (CSRF) attacks. This could allow an unauthenticated attacker to change arbitrary device settings by tricking a legitimate device administrator to click on a malicious link. Siemens SENTRON 7KT PAC1260 Data Manager is a device for power monitoring and energy consumption management from Siemens, Germany.
Siemens SENTRON 7KT PAC1260 Data Manager has a security vulnerability that stems from the web interface of the affected device allowing the login password to be changed without knowing the current password. Combined with a prepared CSRF attack (CVE-2024-441795), an unauthenticated attacker can exploit this vulnerability to set the password to a value controlled by the attacker
VAR-202504-0723 | CVE-2024-41794 | Siemens SENTRON 7KT PAC1260 Data Manager Trust Management Issue Vulnerability |
CVSS V2: 10.0 CVSS V3: 10.0 Severity: Critical |
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating system with root privileges. This could allow unauthenticated remote attackers to gain full access to a device, if they are in possession of these credentials and if the ssh service is enabled (e.g., by exploitation of CVE-2024-41793). Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany. The vulnerability is caused by the existence of hard-coded credentials
VAR-202504-0721 | CVE-2024-41793 | Siemens SENTRON 7KT PAC1260 Data Manager Access Control Error Vulnerability |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: High |
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices provides an endpoint that allows to enable the ssh service without authentication. This could allow an unauthenticated remote attacker to enable remote access to the device via ssh. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany
VAR-202504-0722 | CVE-2024-41792 | Siemens SENTRON 7KT PAC1260 Data Manager Path Traversal Vulnerability |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: Critical |
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices contains a path traversal vulnerability. This could allow an unauthenticated attacker it to access arbitrary files on the device with root privileges. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany.
Siemens SENTRON 7KT PAC1260 Data Manager has a path traversal vulnerability, which is caused by the program failing to properly filter special elements in resource or file paths
VAR-202504-0720 | CVE-2024-41791 | Siemens SENTRON 7KT PAC1260 Data Manager Access Control Error Vulnerability (CNVD-2025-07812) |
CVSS V2: 7.5 CVSS V3: 7.3 Severity: Medium |
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not authenticate report creation requests. This could allow an unauthenticated remote attacker to read or clear the log files on the device, reset the device or set the date and time. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany
VAR-202504-0717 | CVE-2024-41790 | Siemens SENTRON 7KT PAC1260 Data Manager OS Command Injection Vulnerability (CNVD-2025-07810) |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: Critical |
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the region parameter in specific POST requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany
VAR-202504-0718 | CVE-2024-41789 | Siemens SENTRON 7KT PAC1260 Data Manager OS Command Injection Vulnerability (CNVD-2025-07809) |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: Critical |
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the language parameter in specific POST requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany
VAR-202504-0724 | CVE-2024-41788 | Siemens SENTRON 7KT PAC1260 Data Manager OS Command Injection Vulnerability |
CVSS V2: 8.3 CVSS V3: 9.1 Severity: Critical |
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the input parameters in specific GET requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany
VAR-202504-0757 | CVE-2025-3328 | Shenzhen Tenda Technology Co.,Ltd. of ac1206 Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in Tenda AC1206 15.03.06.23. It has been classified as critical. Affected is the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. The manipulation of the argument ssid/timeZone leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. of ac1206 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. AC1206 is a high-performance wireless router designed for broadband users of 200M and above. The vulnerability is caused by the form_fast_setting_wifi_set function of the /goform/fast_setting_wifi_set file not performing a valid boundary check on the input of the ssid or timeZone parameters, resulting in a buffer overflow. No detailed vulnerability details are currently provided
VAR-202504-2456 | No CVE | Shenzhen Yichen Technology Co., Ltd. JCG router has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Shenzhen Yichen Technology Co., Ltd. is an all-round company integrating R&D, production and sales, focusing on high-end equipment manufacturing and technology research and development in the network communication industry.
Shenzhen Yichen Technology Co., Ltd. JCG router has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.