VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202504-1073 CVE-2025-32849 Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08602) CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockSmtpSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany. Siemens TeleControl Server Basic versions prior to v3.1.2.2 have multiple SQL injection vulnerabilities that can be exploited by attackers to read and write the application's database, causing a denial of service and executing code in the operating system shell with limited "NT AUTHORITYNetworkService" permissions
VAR-202504-1085 CVE-2025-31351 Siemens TeleControl Server Basic CreateProject SQL Injection Information Disclosure Vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'CreateProject' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25917). This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens TeleControl Server Basic. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the implementation of the CreateProject method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker could leverage this vulnerability to disclose stored credentials, leading to further compromise. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany. Siemens TeleControl Server Basic versions prior to v3.1.2.2 have multiple SQL injection vulnerabilities that can be exploited by attackers to read and write the application's database, causing a denial of service and executing code in the operating system shell with limited "NT AUTHORITYNetworkService" permissions
VAR-202504-1100 CVE-2025-31350 Siemens TeleControl Server Basic UpdateBufferingSettings SQL Injection Information Disclosure Vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateBufferingSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25918). This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens TeleControl Server Basic. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the implementation of the UpdateBufferingSettings method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker could leverage this vulnerability to disclose stored credentials, leading to further compromise. Siemens TeleControl Server Basic is an industrial remote controller of Siemens, Germany. Siemens TeleControl Server Basic versions prior to v3.1.2.2 have multiple SQL injection vulnerabilities that can be exploited by attackers to read and write the application's database, causing a denial of service and executing code in the operating system shell with limited "NT AUTHORITYNetworkService" permissions
VAR-202504-1080 CVE-2025-32845 Siemens TeleControl Server Basic SQL Injection Vulnerability (CNVD-2025-08606) CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateGeneralSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. TeleControl Server Basic allows remote monitoring and control of devices over WAN/LAN. Siemens TeleControl Server Basic versions prior to v3.1.2.2 have multiple SQL injection vulnerabilities that can be exploited by attackers to read and write the application's database, causing a denial of service and executing code in the operating system shell with limited "NT AUTHORITYNetworkService" permissions
VAR-202504-3244 No CVE Siemens RUGGEDCOM APE1808 Fortigate NGFW has multiple vulnerabilities CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
RUGGEDCOM APE1808 is a powerful utility-grade application hosting platform that allows you to deploy a range of commercial applications for edge computing and network security in harsh industrial environments. Siemens RUGGEDCOM APE1808 Fortigate NGFW has multiple vulnerabilities that can be exploited by attackers to affect the confidentiality, availability, and integrity of the system.
VAR-202504-2407 CVE-2025-25458 Shenzhen Tenda Technology Co.,Ltd.  of  AC10  Classic buffer overflow vulnerability in firmware CVSS V2: 4.6
CVSS V3: 4.6
Severity: MEDIUM
Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via serverName2. Shenzhen Tenda Technology Co.,Ltd. of AC10 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the serverName2 parameter in AdvSetMacMtuWan failing to properly verify the length of the input data. Attackers can exploit this vulnerability to cause a denial of service
VAR-202504-1576 CVE-2025-25453 Shenzhen Tenda Technology Co.,Ltd.  of  AC10  Classic buffer overflow vulnerability in firmware CVSS V2: 4.6
CVSS V3: 4.6
Severity: MEDIUM
Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via serviceName2. Shenzhen Tenda Technology Co.,Ltd. of AC10 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10 is a high-performance router with Gigabit ports for both WAN and LAN ports. There is a buffer overflow vulnerability in Tenda AC10 AdvSetMacMtuWan, which can be exploited by attackers to submit special requests and cause a denial of service attack
VAR-202504-0969 CVE-2025-31950 Growatt Cloud Applications Information Disclosure Vulnerability (CNVD-2025-14965) CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
An unauthenticated attacker can obtain EV charger energy consumption information of other users. Growatt Cloud Applications is a monitoring platform of China's Growatt
VAR-202504-0963 CVE-2025-31147 Growatt Cloud Applications Information Disclosure Vulnerability (CNVD-2025-14963) CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
Unauthenticated attackers can query information about total energy consumed by EV chargers of arbitrary users. Growatt Cloud Applications is a monitoring platform of China's Growatt
VAR-202504-0985 CVE-2025-30512 Growatt Cloud Applications Security Bypass Vulnerability CVSS V2: 6.4
CVSS V3: 6.5
Severity: Medium
Unauthenticated attackers can send configuration settings to device and possible perform physical actions remotely (e.g., on/off). Growatt Cloud Applications is a monitoring platform of China's Growatt
VAR-202504-0976 CVE-2025-27719 Growatt Cloud Applications Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
Unauthenticated attackers can query an API endpoint and get device details. Growatt Cloud Applications is a monitoring platform of China's Growatt
VAR-202504-0987 CVE-2025-24315 Growatt Cloud Applications Security Bypass Vulnerability (CNVD-2025-14962) CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
Unauthenticated attackers can add devices of other users to their scenes (or arbitrary scenes of other arbitrary users). Growatt Cloud Applications is a monitoring platform of China's Growatt
VAR-202504-0986 CVE-2025-31941 Growatt Cloud Applications Information Disclosure Vulnerability (CNVD-2025-14964) CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
An unauthenticated attacker can obtain a list of smart devices by knowing a valid username. Growatt Cloud Applications is a monitoring platform of China's Growatt
VAR-202504-0973 CVE-2025-31357 Growatt Cloud Applications Information Disclosure Vulnerability (CNVD-2025-14959) CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
An unauthenticated attacker can obtain a user's plant list by knowing the username. Growatt Cloud Applications is a monitoring platform of China's Growatt
VAR-202504-0990 CVE-2025-27938 Growatt Cloud Applications Authorization Bypass Vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
Unauthenticated attackers can obtain restricted information about a user's smart device collections (i.e., "rooms"). Growatt Cloud Applications is a monitoring platform of China's Growatt
VAR-202504-0965 CVE-2025-27568 Growatt Cloud Applications Authorization Bypass Vulnerability (CNVD-2025-14960) CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
An unauthenticated attacker can get users' emails by knowing usernames. A password reset email will be sent in response to this unsolicited request. Growatt Cloud Applications is a monitoring platform of China's Growatt. Growatt Cloud Applications 3.6.0 and earlier versions have an authorization bypass vulnerability that can be exploited by unauthenticated attackers to obtain user emails by knowing the username, resulting in the sending of password reset emails
VAR-202504-1784 CVE-2025-25456 Shenzhen Tenda Technology Co.,Ltd.  of  AC10  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via mac2. Shenzhen Tenda Technology Co.,Ltd. of AC10 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC10 has a buffer overflow vulnerability, which is caused by the mac2 parameter in AdvSetMacMtuWan failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202504-3185 CVE-2025-22903 TOTOLINK  of  n600r  Stack-based buffer overflow vulnerability in firmware CVSS V2: 4.6
CVSS V3: 4.6
Severity: MEDIUM
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the pin parameter in the function setWiFiWpsConfig. TOTOLINK of n600r A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK N600R is a wireless router produced by China's TOTOLINK Electronics. TOTOLINK N600R has a buffer overflow vulnerability. The vulnerability is caused by the pin parameter in the setWiFiWpsConfig function failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to cause a denial of service
VAR-202504-1797 CVE-2025-22900 TOTOLINK  of  n600r  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Totolink N600R v4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the macCloneMac parameter in the setWanConfig function. TOTOLINK of n600r A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK N600R is a wireless router produced by China's TOTOLINK Electronics. TOTOLINK N600R has a buffer overflow vulnerability. The vulnerability is caused by the macCloneMac parameter in the setWanConfig function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202504-1759 CVE-2025-28143 EDIMAX Technology  of  BR-6478AC V3  Command injection vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
Edimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3_1.0.15 was discovered to contain a command injection vulnerability via the groupname at the /boafrm/formDiskCreateGroup. EDIMAX Technology of BR-6478AC V3 Firmware contains a command injection vulnerability.Information may be obtained and information may be tampered with. Edimax BR-6478AC is a dual-band Gigabit router from China's Edimax. Edimax BR-6478AC has a command execution vulnerability, which is caused by the groupname parameter in /boafrm/formDiskCreateGroup failing to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to cause arbitrary command execution