VARIoT IoT vulnerabilities database
| VAR-202506-0623 | CVE-2025-5823 | plural autel Vulnerabilities in products exposing dangerous methods or functions |
CVSS V2: 6.8 CVSS V3: 4.9 Severity: MEDIUM |
Autel MaxiCharger AC Wallbox Commercial Serial Number Exposed Dangerous Method Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is required to exploit this vulnerability.
The specific flaw exists within the implementation of the Autel Technician API. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to disclose credentials, leading to further compromise. Was ZDI-CAN-26351. maxicharger ac elite business c50 firmware, MaxiCharger AC Pro firmware, MaxiCharger AC Ultra firmware etc. autel The product contains a vulnerability related to exposing dangerous methods or functions.Information may be obtained. Autel MaxiCharger AC Wallbox Commercial is a smart AI electric vehicle charger from Autel, a US company
| VAR-202506-0598 | CVE-2025-5477 | Sony Corporation's XAV-AX8500 Heap-based buffer overflow vulnerability in firmware |
CVSS V2: 6.8 CVSS V3: 7.5 Severity: HIGH |
Sony XAV-AX8500 Bluetooth L2CAP Protocol Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sony XAV-AX8500 devices. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability.
The specific flaw exists within the implementation of the Bluetooth L2CAP protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the elysian-bt-service process. Was ZDI-CAN-26286. (DoS) It may be in a state. SONY XAV-AX8500 is a car AV receiver with enhanced functions
| VAR-202506-0608 | CVE-2025-5478 | Sony Corporation's XAV-AX8500 Integer overflow vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
Sony XAV-AX8500 Bluetooth SDP Protocol Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sony XAV-AX8500 devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the implementation of the Bluetooth SDP protocol. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26288. Sony Corporation's XAV-AX8500 An integer overflow vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SONY XAV-AX8500 is a car AV receiver with enhanced functions.
SONY XAV-AX8500 has an input validation error vulnerability
| VAR-202506-0617 | CVE-2025-5828 | plural autel Classic buffer overflow vulnerability in the product |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
Autel MaxiCharger AC Wallbox Commercial wLength Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of USB frame packets. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26328. maxicharger ac elite business c50 firmware, MaxiCharger AC Pro firmware, MaxiCharger AC Ultra firmware etc. autel The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Autel MaxiCharger AC Wallbox Commercial is a smart AI electric vehicle charger from Autel, a US company. The vulnerability is caused by the USB frame packet failing to correctly verify the length of the input data
| VAR-202506-0597 | CVE-2025-5820 | Sony Corporation's XAV-AX8500 Firmware vulnerability regarding authentication bypass using alternative paths or channels |
CVSS V2: 5.8 CVSS V3: 6.3 Severity: MEDIUM |
Sony XAV-AX8500 Bluetooth ERTM Channel Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected Sony XAV-AX8500 devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the implementation of Bluetooth ERTM channel communication. The issue results from improper channel data initialization. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26285. Sony Corporation's XAV-AX8500 The firmware contains an authentication bypass vulnerability using alternate paths or channels.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SONY XAV-AX8500 is a car AV receiver with enhanced functions
| VAR-202506-0580 | CVE-2025-5822 | plural autel Fraudulent Authentication Vulnerability in Products |
CVSS V2: 7.5 CVSS V3: 7.1 Severity: HIGH |
Autel MaxiCharger AC Wallbox Commercial Technician API Incorrect Authorization Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of Autel MaxiCharger AC Wallbox Commercial charging stations. An attacker must first obtain a low-privileged authorization token in order to exploit this vulnerability.
The specific flaw exists within the implementation of the Autel Technician API. The issue results from incorrect authorization. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-26325. maxicharger ac elite business c50 firmware, MaxiCharger AC Pro firmware, MaxiCharger AC Ultra firmware etc. autel The product contains an incorrect authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Autel MaxiCharger AC Wallbox Commercial is a smart AI electric vehicle charger from Autel, a US company
| VAR-202506-0665 | CVE-2025-5476 | Sony Corporation's XAV-AX8500 Isolation or classification vulnerabilities in firmware |
CVSS V2: 5.8 CVSS V3: 6.3 Severity: MEDIUM |
Sony XAV-AX8500 Bluetooth Improper Isolation Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected Sony XAV-AX8500 devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the implementation of ACL-U links. The issue results from the lack of L2CAP channel isolation. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26284. Sony Corporation's XAV-AX8500 The firmware contains a containment or classification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SONY XAV-AX8500 is a car AV receiver with enhanced functions
| VAR-202506-0589 | CVE-2025-5827 | plural autel Stack-based buffer overflow vulnerability in products |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
Autel MaxiCharger AC Wallbox Commercial ble_process_esp32_msg Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the ble_process_esp32_msg function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26369. maxicharger ac elite business c50 firmware, MaxiCharger AC Pro firmware, MaxiCharger AC Ultra firmware etc. autel The product contains a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Autel MaxiCharger AC Wallbox Commercial is a smart AI electric vehicle charger from Autel, a US company. The vulnerability is caused by the ble_process_esp32_msg function failing to properly verify the length of the input data
| VAR-202506-0628 | CVE-2025-5824 | plural autel Same Origin Policy Violation Vulnerability in Products |
CVSS V2: 4.3 CVSS V3: 5.0 Severity: MEDIUM |
Autel MaxiCharger AC Wallbox Commercial Origin Validation Error Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Autel MaxiCharger AC Wallbox Commercial. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability.
The specific flaw exists within the handling of bluetooth pairing requests. The issue results from insufficient validation of the origin of commands. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26353. maxicharger ac elite business c50 firmware, MaxiCharger AC Pro firmware, MaxiCharger AC Ultra firmware etc. autel The product contains a same-origin policy violation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Autel MaxiCharger AC Wallbox Commercial is a smart AI electric vehicle charger from Autel, a US company
| VAR-202506-0614 | CVE-2025-5475 | Sony Corporation's XAV-AX8500 Integer overflow vulnerability in firmware |
CVSS V2: 6.8 CVSS V3: 7.5 Severity: HIGH |
Sony XAV-AX8500 Bluetooth Packet Handling Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sony XAV-AX8500 devices. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability.
The specific flaw exists within the handling of Bluetooth packets. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the elysian-bt-service process. Was ZDI-CAN-26283. (DoS) It may be in a state. SONY XAV-AX8500 is a car AV receiver with enhanced functions
| VAR-202506-0599 | CVE-2025-5830 | plural autel Heap-based buffer overflow vulnerabilities in products |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
Autel MaxiCharger AC Wallbox Commercial DLB_SlaveRegister Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of DLB_SlaveRegister messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26327. maxicharger ac elite business c50 firmware, MaxiCharger AC Pro firmware, MaxiCharger AC Ultra firmware etc. autel The product contains a heap-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Autel MaxiCharger AC Wallbox Commercial is a smart AI electric vehicle charger from Autel, USA. The vulnerability is caused by the DLB_SlaveRegister message failing to properly verify the length of the input data
| VAR-202506-3002 | No CVE | H3C Magic NX15000 of H3C Technologies Co., Ltd. has an unauthorized access vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
H3C Magic NX15000 is a 10G Wi-Fi 6 router.
H3C Magic NX15000 of H3C Technologies Co., Ltd. has an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.
| VAR-202506-0586 | CVE-2025-6678 | plural autel Vulnerability related to lack of authentication for critical functions in the product |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Autel MaxiCharger AC Wallbox Commercial PIN Missing Authentication Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Autel MaxiCharger AC Wallbox Commercial charging stations. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the Pile API. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose credentials, leading to further compromise. Was ZDI-CAN-26352. maxicharger ac elite business c50 firmware, MaxiCharger AC Pro firmware, MaxiCharger AC Ultra firmware etc. Autel MaxiCharger AC Wallbox Commercial is a smart AI electric vehicle charger from Autel, a US company
| VAR-202506-0573 | CVE-2025-5978 | Shenzhen Tenda Technology Co.,Ltd. of FH1202 Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in Tenda FH1202 1.2.0.14. It has been classified as critical. Affected is the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. of FH1202 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Attackers can exploit this vulnerability to remotely execute arbitrary code
| VAR-202506-0630 | CVE-2025-5969 | D-Link Systems, Inc. of DIR-632 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been found in D-Link DIR-632 FW103B08 and classified as critical. Affected by this vulnerability is the function FUN_00425fd8 of the file /biurl_grou of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Systems, Inc. of DIR-632 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-632 is a router of D-Link, a Chinese company. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202506-0483 | CVE-2025-5743 | Schneider Electric EVLink WallBox OS Command Injection Vulnerability |
CVSS V2: 6.8 CVSS V3: 5.5 Severity: High |
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
vulnerability exists that could cause remote control over the charging station when an authenticated user
modifies configuration parameters on the web server. Schneider Electric EVLink WallBox is a home charging station from Schneider Electric of France.
Schneider Electric EVLink WallBox has an operating system command injection vulnerability. Attackers can exploit this vulnerability to remotely control the charging station
| VAR-202506-0482 | CVE-2025-5742 | Schneider Electric EVLink WallBox Cross-Site Scripting Vulnerability |
CVSS V2: 5.5 CVSS V3: 5.4 Severity: Medium |
CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
vulnerability exists when an authenticated user modifies configuration parameters on the web server. Schneider Electric EVLink WallBox is a home charging station from Schneider Electric of France. No detailed vulnerability details are currently provided
| VAR-202506-0484 | CVE-2025-5741 | Schneider Electric EVLink WallBox Path Traversal Vulnerability (CNVD-2025-15345) |
CVSS V2: 6.1 CVSS V3: 4.9 Severity: Medium |
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that
could cause arbitrary file reads from the charging station. The exploitation of this vulnerability does require an
authenticated session of the web server. Schneider Electric EVLink WallBox is a home charging station from Schneider Electric of France. Attackers can exploit this vulnerability to cause arbitrary file reading
| VAR-202506-0485 | CVE-2025-5740 | Schneider Electric EVLink WallBox Path Traversal Vulnerability |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause arbitrary file writes when an authenticated user on the web server manipulates file path. Schneider Electric EVLink WallBox is a home charging station from Schneider Electric of France.
Schneider Electric EVLink WallBox has a path traversal vulnerability, which is caused by improper path name restriction
| VAR-202506-0444 | CVE-2025-3905 | Schneider Electric Modicon Controllers Cross-Site Scripting Vulnerability (CNVD-2025-15353) |
CVSS V2: 5.5 CVSS V3: 5.4 Severity: Medium |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability
exists impacting PLC system variables that could cause an unvalidated data injected by authenticated
malicious user leading to modify or read data in a victim’s browser. Schneider Electric Modicon Controllers is a series of Modicon series programmable logic controllers from Schneider Electric of France