VARIoT IoT vulnerabilities database

VAR-202505-2973 | No CVE | Shenzhen Sihai Zhonglian Network Technology Co., Ltd. Comfast CF-616AC V2 has a logic defect vulnerability |
CVSS V2: 3.3 CVSS V3: - Severity: LOW |
Comfast CF-616AC V2 is a wireless router.
Shenzhen Sihai Zhonglian Network Technology Co., Ltd. Comfast CF-616AC V2 has a logic defect vulnerability, which can be exploited by attackers to cause denial of service.
VAR-202505-3560 | No CVE | HP Color LaserJet Pro M452dn has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
HP Color LaserJet Pro M452dn is a color laser printer designed for commercial use.
HP Color LaserJet Pro M452dn has an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202505-3752 | No CVE | H3C NX54 of H3C Technologies Co., Ltd. has a command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
H3C NX54 is a Gigabit dual-band router that supports Wi-Fi 6 (802.11ax) protocol.
H3C NX54 of H3C Technologies Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202505-2625 | No CVE | EDIMAX N300 Wi-Fi Router has a command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
N300 Wi-Fi Router is a high-performance wireless router.
EDIMAX N300 Wi-Fi Router has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202505-3181 | No CVE | D-Link DI-7003GV2 has a logic flaw vulnerability |
CVSS V2: 3.3 CVSS V3: - Severity: LOW |
D-Link DI-7003GV2 is a router from D-Link, a Chinese company.
D-Link DI-7003GV2 has a logic flaw that can be exploited by attackers to cause a denial of service.
VAR-202505-2465 | No CVE | Ruiyin Technology (Shenzhen) Co., Ltd. QUANTUM D2G has a logical defect vulnerability |
CVSS V2: 3.3 CVSS V3: - Severity: LOW |
QUANTUM D2G is a dual-gigabit home router.
Ruiyin Technology (Shenzhen) Co., Ltd. QUANTUM D2G has a logic defect vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202505-2806 | No CVE | H3C M60 of H3C Technologies Co., Ltd. has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
H3C M60 is a new generation of enterprise-class high-performance wireless AP manager launched by H3C.
H3C M60 of H3C Technologies Co., Ltd. has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202505-2044 | CVE-2025-5127 | FLIR Systems, Inc. of flir ax8 Cross-site scripting vulnerability in firmware |
CVSS V2: 4.0 CVSS V3: 3.5 Severity: Medium |
A vulnerability, which was classified as problematic, has been found in FLIR AX8 up to 1.46.16. This issue affects some unknown processing of the file /prod.php. The manipulation of the argument cmd leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. FLIR Systems, Inc. of flir ax8 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
VAR-202505-2061 | CVE-2025-5126 | FLIR Systems, Inc. of flir ax8 Command injection vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability classified as critical was found in FLIR AX8 up to 1.46.16. This vulnerability affects the function setDataTime of the file \usr\www\application\models\settingsregional.php. The manipulation of the argument year/month/day/hour/minute leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. FLIR Systems, Inc. of flir ax8 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202505-3046 | CVE-2025-46176 | D-Link Systems, Inc. of DIR-605L firmware and DIR-816L Command injection vulnerability in firmware |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
Hardcoded credentials in the Telnet service in D-Link DIR-605L v2.13B01 and DIR-816L v2.06B01 allow attackers to remotely execute arbitrary commands via firmware analysis. D-Link Systems, Inc. of DIR-605L firmware and DIR-816L Firmware contains a command injection vulnerability.Information may be obtained and information may be tampered with. The D-Link DIR-605L is the company's first cloud router, designed primarily for home and small office network environments. The D-Link DIR-816L is a dual-band wireless router supporting both the 2.4GHz and 5GHz bands. It complies with IEEE 802.11ac and IEEE 802.11n network standards, offering a maximum transfer rate of 450Mbps.
The D-Link DIR-605L and D-Link DIR-816L contain a hardcoded vulnerability. No detailed vulnerability details have been provided
VAR-202505-2079 | CVE-2022-31812 | Siemens' SiPass integrated Out-of-bounds read vulnerability in |
CVSS V2: - CVSS V3: 7.5 Severity: High |
A vulnerability has been identified in SiPass integrated (All versions < V2.95.3.18). Affected server applications contain an out of bounds read past the end of an allocated buffer while checking the integrity of incoming packets. This could allow an unauthenticated remote attacker to create a denial of service condition. Siemens' SiPass integrated Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202505-2761 | CVE-2024-13945 | ABB multiple products path traversal vulnerability (CNVD-2025-13774) |
CVSS V2: 7.3 CVSS V3: 6.0 Severity: High |
Stored Absolute Path Traversal vulnerabilities in ASPECT could expose sensitive data
if administrator credentials become compromised.
This issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications
VAR-202505-4248 | CVE-2024-51553 | ABB products predict file name vulnerability |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: High |
Predictable filename vulnerabilities in ASPECT may expose sensitive information to a potential attacker if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT and others are products of ABB of Switzerland. ABB ASPECT is a scalable building energy management and control solution. ABB MATRIX is an embedded building automation network controller. ABB NEXUS is a wireless and wired solution.
Many ABB products have a predictive file name vulnerability, which can be exploited by attackers to leak sensitive information
VAR-202505-3144 | CVE-2024-51552 | ABB products have weak password storage vulnerabilities |
CVSS V2: 7.3 CVSS V3: 6.0 Severity: High |
Weak password storage vulnerabilities exist in ASPECT if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT is a scalable building energy management and control solution. ABB MATRIX is an embedded building automation network controller. ABB NEXUS is a wireless and wired solution
VAR-202505-3345 | CVE-2024-48848 | Denial of Service Vulnerabilities in Multiple ABB Products |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: High |
Large content vulnerabilities are present in ASPECT exposing a device to disk overutilization on a system if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT and others are products of ABB of Switzerland. ABB ASPECT is a scalable building energy management and control solution. ABB MATRIX is an embedded building automation network controller. ABB NEXUS is a wireless and wired solution.
Many ABB products have a denial of service vulnerability, which is caused by disk overuse. Attackers can exploit this vulnerability to cause system resource exhaustion
VAR-202505-3887 | CVE-2024-13958 | ABB products have cross-site scripting vulnerabilities (CNVD-2025-13777) |
CVSS V2: 4.7 CVSS V3: 4.8 Severity: Medium |
Stored Cross Site Scripting vulnerabilities exist in ASPECT if administrator creden-tials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB NEXUS Series is a monitoring and management system. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications.
ABB has a cross-site scripting vulnerability in many products. No detailed vulnerability details are currently available
VAR-202505-4265 | CVE-2024-13956 | ABB products have trust management vulnerabilities |
CVSS V2: 8.0 CVSS V3: 6.7 Severity: High |
SSL Verification Bypass vulnerabilities exist in ASPECT if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB NEXUS Series is a monitoring and management system. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications.
ABB products have a trust management issue vulnerability, which is caused by credential leakage and may lead to SSL authentication bypass. No detailed vulnerability details are provided at this time
VAR-202505-4071 | CVE-2024-13955 | SQL injection vulnerabilities in multiple ABB products |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: Critical |
2nd Order SQL injection vulnerabilities in ASPECT allow unintended access and manipulation of database repositories if administrator credentials become compromised.This issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB NEXUS Series is a monitoring and management system. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications.
ABB products have a SQL injection vulnerability that can lead to a second-order SQL injection attack due to credential leakage. An attacker can use this vulnerability to view, add, modify or delete information in the backend database
VAR-202505-2760 | CVE-2024-13954 | ABB multiple product information leakage vulnerability (CNVD-2025-13421) |
CVSS V2: 5.8 CVSS V3: 6.5 Severity: Medium |
Serialized configuration information may be disclosed during device commissioning while using ASPECT's configuration toolsetThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB NEXUS Series is a monitoring and management system. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications.
ABB has an information disclosure vulnerability in many products, which is caused by the insecure storage of sensitive information. Attackers can exploit this vulnerability to obtain serialized configuration information
VAR-202505-2598 | CVE-2024-13953 | ABB products have information leakage vulnerabilities |
CVSS V2: 6.1 CVSS V3: 4.9 Severity: Medium |
Sensitive device logger information in ASPECT may be exposed if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB NEXUS Series is a monitoring and management system. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications.
ABB has information leakage vulnerabilities in many products