VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202504-3422 CVE-2025-28038 TOTOLINK  of  ex1200t  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK EX1200T V4.1.2cu.5232_B20210713 was found to contain a pre-auth remote command execution vulnerability in the setWebWlanIdx function through the webWlanIdx parameter. TOTOLINK of ex1200t The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK EX1200T is a wireless router from TOTOLINK that provides convenient network connection and management functions. Attackers can use this vulnerability to execute arbitrary commands
VAR-202504-3346 CVE-2025-28036 plural  TOTOLINK  In the product  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A950RG V4.1.2cu.5161_B20200903 was found to contain a pre-auth remote command execution vulnerability in the setNoticeCfg function through the NoticeUrl parameter. a950rg firmware, A810R firmware, a800r firmware etc. TOTOLINK The product has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A950RG is a gaming router and smart router that supports 2.4GHz and 5GHz dual-band. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202504-3404 CVE-2025-28035 plural  TOTOLINK  In the product  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A830R V4.1.2cu.5182_B20201102 was found to contain a pre-auth remote command execution vulnerability in the setNoticeCfg function through the NoticeUrl parameter. A830R firmware, A3100R firmware, A810R firmware etc. TOTOLINK The product has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A830R is a wireless dual-band router from China's TOTOLINK Electronics
VAR-202504-3481 CVE-2025-28029 plural  TOTOLINK  Stack-based buffer overflow vulnerability in products CVSS V2: -
CVSS V3: 7.3
Severity: HIGH
TOTOLINK A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a buffer overflow vulnerability in cstecgi.cgi. A830R firmware, a950rg firmware, A3000RU firmware etc. TOTOLINK The product contains a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-3453 CVE-2025-28027 plural  TOTOLINK  Stack-based buffer overflow vulnerability in products CVSS V2: -
CVSS V3: 7.3
Severity: HIGH
TOTOLINK A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 was found to contain a buffer overflow vulnerability in downloadFile.cgi. A830R firmware, a950rg firmware, A3000RU firmware etc. TOTOLINK The product contains a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-3475 CVE-2025-28026 plural  TOTOLINK  Stack-based buffer overflow vulnerability in products CVSS V2: -
CVSS V3: 7.3
Severity: HIGH
TOTOLINK A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a buffer overflow vulnerability in downloadFile.cgi. A830R firmware, a950rg firmware, A3000RU firmware etc. TOTOLINK The product contains a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-3411 CVE-2025-28037 TOTOLINK  of  A810R  firmware and  a950rg  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A810R V4.1.2cu.5182_B20201026 and A950RG V4.1.2cu.5161_B20200903 were found to contain a pre-auth remote command execution vulnerability in the setDiagnosisCfg function through the ipDomain parameter. TOTOLINK of A810R firmware and a950rg The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A950RG and TOTOLINK A810R are both products of China's TOTOLINK Electronics. TOTOLINK A950RG is a super-generation Giga wireless router. TOTOLINK A810R is a wireless dual-band router. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202504-3390 CVE-2025-28031 TOTOLINK  of  A810R  Hardcoded password usage vulnerability in firmware CVSS V2: 6.1
CVSS V3: 6.5
Severity: MEDIUM
TOTOLINK A810R V4.1.2cu.5182_B20201026 was discovered to contain a hardcoded password for the telnet service in product.ini. TOTOLINK of A810R A vulnerability exists in the firmware related to the use of hardcoded passwords.Information may be obtained and information may be tampered with. TOTOLINK A810R is a wireless dual-band router from China's TOTOLINK Electronics. TOTOLINK A810R V4.1.2cu.5182_B20201026 has a trust management vulnerability, which is caused by a hard-coded password in product.ini. Attackers can exploit this vulnerability to cause authentication errors
VAR-202504-3251 CVE-2025-28030 TOTOLINK  of  A810R  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK A810R V4.1.2cu.5182_B20201026 was discovered to contain a stack overflow via the startTime and endTime parameters in setParentalRules function. TOTOLINK of A810R A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A810R is a wireless dual-band router from China's TOTOLINK Electronics. TOTOLINK A810R V4.1.2cu.5182_B20201026 has a buffer overflow vulnerability. The vulnerability is caused by the startTime and endTime parameters in the setParentalRules function failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202504-3327 CVE-2025-28024 TOTOLINK  of  A810R  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerability in the cstecgi.cgi. TOTOLINK of A810R Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A810R is a wireless dual-band router from China's TOTOLINK Electronics. The vulnerability is caused by cstecgi.cgi failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202504-3389 CVE-2025-28034 plural  TOTOLINK  In the product  OS  Command injection vulnerability CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A800R V4.1.2cu.5137_B20200730, A810R V4.1.2cu.5182_B20201026, A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a pre-auth remote command execution vulnerability in the NTPSyncWithHost function through the hostTime parameter. a800r firmware, A810R firmware, A830R firmware etc. TOTOLINK The product has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-3329 CVE-2025-28033 plural  TOTOLINK  Stack-based buffer overflow vulnerability in products CVSS V2: -
CVSS V3: 7.3
Severity: HIGH
TOTOLINK A800R V4.1.2cu.5137_B20200730, A810R V4.1.2cu.5182_B20201026, A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a pre-auth buffer overflow vulnerability in the setNoticeCfg function through the IpTo parameter. a800r firmware, A810R firmware, A830R firmware etc. TOTOLINK The product contains a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-3345 CVE-2025-28032 plural  TOTOLINK  Stack-based buffer overflow vulnerability in products CVSS V2: -
CVSS V3: 7.3
Severity: HIGH
TOTOLINK A800R V4.1.2cu.5137_B20200730, A810R V4.1.2cu.5182_B20201026, A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 contain a pre-auth buffer overflow vulnerability in the setNoticeCfg function through the IpForm parameter. a800r firmware, A810R firmware, A830R firmware etc. TOTOLINK The product contains a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-4020 No CVE Netshi Technology Co., Ltd. W1 series routers have unauthorized access vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Founded in 2016, Netshi Technology Co., Ltd. is a high-tech enterprise focusing on the research, development, production and sales of data communication network equipment. Netshi Technology Co., Ltd.'s W1 series routers have an unauthorized access vulnerability that attackers can exploit to obtain sensitive information.
VAR-202504-3648 No CVE TOSHIBA e-STUDIO4508A has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
TOSHIBA e-STUDIO4508A is a high-performance black-and-white digital multifunction printer suitable for office environments, providing printing, copying and scanning functions. ‌ TOSHIBA e-STUDIO4508A has a weak password vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202504-3808 No CVE Beijing Zhixin Microelectronics Technology Co., Ltd.'s intelligent fusion terminal has industrial control equipment vulnerabilities CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Beijing Zhixin Microelectronics Technology Co., Ltd. is a high-tech enterprise focusing on the field of microelectronics. Beijing Zhixin Microelectronics Technology Co., Ltd.'s intelligent fusion terminal has an industrial control equipment vulnerability, which can be exploited by attackers to obtain server permissions.
VAR-202504-4091 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. AC8 has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
AC8 is a dual-band three-gigabit wireless router suitable for fiber-optic homes within 1000 megabits, supporting gigabit ports, intelligent frequency selection, parental control and other functions. AC8 of Shenzhen Jixiang Tengda Technology Co., Ltd. has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202504-3955 No CVE MOBOTIX M1 has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
MOBOTIX M1 is a camera. MOBOTIX M1 has an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202504-4090 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. A15 has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
A15 is a dual-band 3G wireless router suitable for fiber-optic homes within 1000M. Shenzhen Jixiang Tengda Technology Co., Ltd. A15 has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202504-3877 No CVE MOBOTIX D10 has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
MOBOTIX D10 is a high-performance smart network camera. MOBOTIX D10 has an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.