VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202504-2758 CVE-2025-28137 TOTOLINK  of  A810R  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
The TOTOLINK A810R V4.1.2cu.5182_B20201026 were found to contain a pre-auth remote command execution vulnerability in the setNoticeCfg function through the NoticeUrl parameter. TOTOLINK of A810R The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A810R is a wireless dual-band router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202504-2960 CVE-2025-28136 TOTOLINK  of  a800r  Stack-based buffer overflow vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
TOTOLINK A800R V4.1.2cu.5137_B20200730 was found to contain a buffer overflow vulnerability in the downloadFile.cgi. TOTOLINK A800R is a wireless router produced by China's TOTOLINK Electronics. No detailed vulnerability details are currently provided
VAR-202504-4092 No CVE HP Ink Tank Wireless 410 series has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
HP Ink Tank Wireless 410 series is a color inkjet multifunction printer that integrates printing, copying, scanning and wireless functions. HP Ink Tank Wireless 410 series has an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202504-1191 CVE-2025-3538 D-Link DI-8100 Router Stack Buffer Overflow Vulnerability CVSS V2: 8.3
CVSS V3: 8.8
Severity: High
A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been rated as critical. This issue affects the function auth_asp of the file /auth.asp of the component jhttpd. The manipulation of the argument callback leads to stack-based buffer overflow. The attack needs to be approached within the local network. The exploit has been disclosed to the public and may be used. D-Link DI-8100 is a broadband router designed by D-Link for small and medium-sized network environments. D-Link DI-8100 has a stack buffer overflow vulnerability. No detailed vulnerability details are currently available
VAR-202504-1837 CVE-2024-48887 Fortinet FortiSwitch Authorization Issue Vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request. Fortinet FortiSwitch is a network switch management tool from Fortinet, an American company. Fortinet FortiSwitch has an authorization issue vulnerability, which stems from unauthenticated password changes. Attackers can exploit this vulnerability to cause the administrator password to be tampered with
VAR-202504-0715 CVE-2025-29999 Siemens License Server Improper Permission Management Vulnerability CVSS V2: 6.0
CVSS V3: 6.7
Severity: Medium
A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). The affected application searches for executable files in the application folder without proper validation. This could allow an attacker to execute arbitrary code with administrative privileges by placing a malicious executable in the same directory
VAR-202504-0719 CVE-2024-41796 Siemens SENTRON 7KT PAC1260 Data Manager has an unspecified vulnerability (CNVD-2025-07815) CVSS V2: 7.8
CVSS V3: 6.5
Severity: Medium
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices allows to change the login password without knowing the current password. In combination with a prepared CSRF attack (CVE-2024-41795) an unauthenticated attacker could be able to set the password to an attacker-controlled value. Siemens SENTRON 7KT PAC1260 Data Manager is a device for power monitoring and energy consumption management from Siemens, Germany
VAR-202504-0725 CVE-2024-41795 Siemens SENTRON 7KT PAC1260 Data Manager has an unspecified vulnerability CVSS V2: 7.8
CVSS V3: 6.5
Severity: Medium
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices is vulnerable to Cross-Site Request Forgery (CSRF) attacks. This could allow an unauthenticated attacker to change arbitrary device settings by tricking a legitimate device administrator to click on a malicious link. Siemens SENTRON 7KT PAC1260 Data Manager is a device for power monitoring and energy consumption management from Siemens, Germany. Siemens SENTRON 7KT PAC1260 Data Manager has a security vulnerability that stems from the web interface of the affected device allowing the login password to be changed without knowing the current password. Combined with a prepared CSRF attack (CVE-2024-441795), an unauthenticated attacker can exploit this vulnerability to set the password to a value controlled by the attacker
VAR-202504-0723 CVE-2024-41794 Siemens SENTRON 7KT PAC1260 Data Manager Trust Management Issue Vulnerability CVSS V2: 10.0
CVSS V3: 10.0
Severity: Critical
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating system with root privileges. This could allow unauthenticated remote attackers to gain full access to a device, if they are in possession of these credentials and if the ssh service is enabled (e.g., by exploitation of CVE-2024-41793). Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany. The vulnerability is caused by the existence of hard-coded credentials
VAR-202504-0721 CVE-2024-41793 Siemens SENTRON 7KT PAC1260 Data Manager Access Control Error Vulnerability CVSS V2: 7.8
CVSS V3: 8.6
Severity: High
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices provides an endpoint that allows to enable the ssh service without authentication. This could allow an unauthenticated remote attacker to enable remote access to the device via ssh. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany
VAR-202504-0722 CVE-2024-41792 Siemens SENTRON 7KT PAC1260 Data Manager Path Traversal Vulnerability CVSS V2: 7.8
CVSS V3: 8.6
Severity: Critical
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices contains a path traversal vulnerability. This could allow an unauthenticated attacker it to access arbitrary files on the device with root privileges. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany. Siemens SENTRON 7KT PAC1260 Data Manager has a path traversal vulnerability, which is caused by the program failing to properly filter special elements in resource or file paths
VAR-202504-0720 CVE-2024-41791 Siemens SENTRON 7KT PAC1260 Data Manager Access Control Error Vulnerability (CNVD-2025-07812) CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not authenticate report creation requests. This could allow an unauthenticated remote attacker to read or clear the log files on the device, reset the device or set the date and time. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany
VAR-202504-0717 CVE-2024-41790 Siemens SENTRON 7KT PAC1260 Data Manager OS Command Injection Vulnerability (CNVD-2025-07810) CVSS V2: 8.3
CVSS V3: 9.1
Severity: Critical
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the region parameter in specific POST requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany
VAR-202504-0718 CVE-2024-41789 Siemens SENTRON 7KT PAC1260 Data Manager OS Command Injection Vulnerability (CNVD-2025-07809) CVSS V2: 8.3
CVSS V3: 9.1
Severity: Critical
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the language parameter in specific POST requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany
VAR-202504-0724 CVE-2024-41788 Siemens SENTRON 7KT PAC1260 Data Manager OS Command Injection Vulnerability CVSS V2: 8.3
CVSS V3: 9.1
Severity: Critical
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the input parameters in specific GET requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany
VAR-202504-2622 CVE-2025-20945 Samsung Galaxy Watch Improper Access Control Vulnerability CVSS V2: 2.1
CVSS V3: 4.0
Severity: MEDIUM
Improper access control in Galaxy Watch prior to SMR Apr-2025 Release 1 allows local attackers to access sensitive information of Galaxy watch. Samsung Galaxy Watch is a smartwatch that provides multiple features, including fitness tracking, notifications, and mobile payments. The vulnerability is due to improper access control. Attackers can exploit this vulnerability to obtain sensitive information
VAR-202504-0826 CVE-2025-3346 Shenzhen Tenda Technology Co.,Ltd.  of  AC7  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in Tenda AC7 15.03.06.44. It has been rated as critical. Affected by this issue is the function formSetPPTPServer of the file /goform/SetPptpServerCfg. The manipulation of the argument pptp_server_start_ip/pptp_server_end_ip leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. of AC7 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202504-0757 CVE-2025-3328 Shenzhen Tenda Technology Co.,Ltd.  of  ac1206  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in Tenda AC1206 15.03.06.23. It has been classified as critical. Affected is the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. The manipulation of the argument ssid/timeZone leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. of ac1206 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. AC1206 is a high-performance wireless router designed for broadband users of 200M and above. The vulnerability is caused by the form_fast_setting_wifi_set function of the /goform/fast_setting_wifi_set file not performing a valid boundary check on the input of the ssid or timeZone parameters, resulting in a buffer overflow. No detailed vulnerability details are currently provided
VAR-202504-2060 No CVE ZAVIOZAVIO F531E###ZAVIO F511W has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
ZAVIO F531 and ZAVIO F511W have an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202504-2061 No CVE HPE OfficeConnect Switch 1820 48G PoE+ (370W) J9984A of Hewlett Packard Enterprise (China) Co., Ltd. has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
HPE (China) Co., Ltd. is a company mainly engaged in the research and development, production and manufacturing of computer hardware, software and its peripherals, and operates related electronic products. HPE OfficeConnect Switch 1820 48G PoE+ (370W) J9984A of HPE (China) Co., Ltd. has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.