VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202505-3817 CVE-2025-3945 Tridium  of  Niagara  and  Niagara Enterprise Security  Vulnerability in inserting or changing arguments in CVSS V2: -
CVSS V3: 7.2
Severity: HIGH
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Tridium Niagara Framework on QNX, Tridium Niagara Enterprise Security on QNX allows Command Delimiters. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.  Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11. (DoS) It may be in a state
VAR-202505-3461 CVE-2025-3944 Tridium  of  Niagara  and  Niagara Enterprise Security  Vulnerability in improper permission assignment for critical resources in CVSS V2: -
CVSS V3: 7.2
Severity: HIGH
Incorrect Permission Assignment for Critical Resource vulnerability in Tridium Niagara Framework on QNX, Tridium Niagara Enterprise Security on QNX allows File Manipulation. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.  Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11. (DoS) It may be in a state
VAR-202505-3074 CVE-2025-3943 Tridium  of  Niagara  and  Niagara Enterprise Security  Vulnerability in CVSS V2: -
CVSS V3: 4.1
Severity: MEDIUM
Use of GET Request Method With Sensitive Query Strings vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Parameter Injection. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.  Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11
VAR-202505-2874 CVE-2025-3942 Tridium  of  Niagara  and  Niagara Enterprise Security  Encoding and escaping vulnerabilities in CVSS V2: -
CVSS V3: 4.3
Severity: MEDIUM
Improper Output Neutralization for Logs vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Input Data Manipulation. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.  Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11
VAR-202505-3274 CVE-2025-3941 Tridium  of  Niagara  and  Niagara Enterprise Security  Incorrectly resolved name and reference usage vulnerabilities in CVSS V2: -
CVSS V3: 5.4
Severity: MEDIUM
Improper Handling of Windows ::DATA Alternate Data Stream vulnerability in Tridium Niagara Framework on Windows, Tridium Niagara Enterprise Security on Windows allows Input Data Manipulation. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11. Tridium of Niagara and Niagara Enterprise Security There is a vulnerability in the use of incorrectly resolved names and references.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202505-3992 CVE-2025-3940 Tridium  of  Niagara  and  Niagara Enterprise Security  Vulnerability in CVSS V2: -
CVSS V3: 5.3
Severity: MEDIUM
Improper Use of Validation Framework vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Input Data Manipulation. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.  Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11. (DoS) It may be in a state
VAR-202505-3275 CVE-2025-3939 Tridium  of  Niagara  and  Niagara Enterprise Security  Vulnerability regarding observable inconsistencies in CVSS V2: -
CVSS V3: 5.3
Severity: MEDIUM
Observable Response Discrepancy vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Cryptanalysis. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11
VAR-202505-2532 CVE-2025-3938 Tridium  of  Niagara  and  Niagara Enterprise Security  Vulnerability in using cryptographic algorithms in CVSS V2: -
CVSS V3: 6.8
Severity: MEDIUM
Missing Cryptographic Step vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Cryptanalysis. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.  Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11. (DoS) It may be in a state
VAR-202505-2694 CVE-2025-3937 Tridium  of  Niagara  and  Niagara Enterprise Security  Vulnerability related to the use of insufficiently strong password hashes in CVSS V2: -
CVSS V3: 7.7
Severity: HIGH
Use of Password Hash With Insufficient Computational Effort vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Cryptanalysis. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.  Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11. (DoS) It may be in a state
VAR-202505-3468 CVE-2025-3936 Tridium  of  Niagara  and  Niagara Enterprise Security  Vulnerability in improper permission assignment for critical resources in CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
Incorrect Permission Assignment for Critical Resource vulnerability in Tridium Niagara Framework on Windows, Tridium Niagara Enterprise Security on Windows allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.  Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11. (DoS) It may be in a state
VAR-202505-3920 No CVE H3C Magic R3010 Gigabit Dual-Band Wi-Fi 6 Router from H3C Technologies Co., Ltd. Has a Logic Defect Vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
H3C Technologies Co., Ltd. is a global leader in digital solutions. H3C Magic R3010 Gigabit Dual-Band Wi-Fi 6 Router of H3C Technologies Co., Ltd. has a logic flaw vulnerability that can be exploited by attackers to gain control of the server.
VAR-202505-3051 CVE-2025-45753 Vtiger  of  Vtiger CRM  Code injection vulnerability in CVSS V2: -
CVSS V3: 7.2
Severity: HIGH
A vulnerability in Vtiger CRM Open Source Edition v8.3.0 allows an attacker with admin privileges to execute arbitrary PHP code by exploiting the ZIP import functionality in the Module Import feature. Vtiger of Vtiger CRM There is a code injection vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202505-3447 CVE-2025-45755 Vtiger  of  Vtiger CRM  Cross-site scripting vulnerability in CVSS V2: -
CVSS V3: 6.1
Severity: MEDIUM
A Stored Cross-Site Scripting (XSS) vulnerability exists in Vtiger CRM Open Source Edition v8.3.0, exploitable via the Services Import feature. An attacker can craft a malicious CSV file containing an XSS payload, mapped to the Service Name field. When the file is uploaded, the application improperly sanitizes user input, leading to persistent script execution
VAR-202505-3056 CVE-2025-44083 D-Link Systems, Inc.  of  di-8100  Authentication vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An issue in D-Link DI-8100 16.07.26A1 allows a remote attacker to bypass administrator login authentication. D-Link Systems, Inc. of di-8100 An authentication vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DI-8100 is a wireless broadband router designed for small and medium-sized network environments by China's D-Link. No detailed vulnerability details are currently available
VAR-202505-2355 CVE-2025-44882 WAVLINK  of  WL-WN579A3  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A command injection vulnerability in the component /cgi-bin/firewall.cgi of Wavlink WL-WN579A3 v1.0 allows attackers to execute arbitrary commands via a crafted input. WAVLINK of WL-WN579A3 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK WL-WN579A3 is a high-performance dual-band wireless network card from WAVLINK, a Chinese company
VAR-202505-2375 CVE-2025-44880 WAVLINK  of  WL-WN579A3  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A command injection vulnerability in the component /cgi-bin/adm.cgi of Wavlink WL-WN579A3 v1.0 allows attackers to execute arbitrary commands via a crafted input. WAVLINK of WL-WN579A3 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK WL-WN579A3 is a high-performance dual-band wireless network card from WAVLINK, a Chinese company
VAR-202505-2378 CVE-2025-44893 PLANET  of  WGS-804HPT  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the ruleNamekey parameter in the web_acl_mgmt_Rules_Apply_post function. PLANET of WGS-804HPT A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Planet FW-WGS-804HPT is a wall-mounted managed switch from China's PLANET company. Planet FW-WGS-804HPT has a buffer overflow vulnerability. The vulnerability is caused by the ruleNamekey parameter in the web_acl_mgmt_Rules_Apply_post function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202505-2333 CVE-2025-44890 PLANET  of  WGS-804HPT  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the host_ip parameter in the web_snmp_notifyv3_add_post function. PLANET of WGS-804HPT A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Planet FW-WGS-804HPT is a wall-mounted managed switch from China's PLANET company. Planet FW-WGS-804HPT has a buffer overflow vulnerability. The vulnerability is caused by the host_ip parameter in the web_snmp_notifyv3_add_post function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code or cause a denial of service
VAR-202505-2242 CVE-2025-44888 PLANET  of  WGS-804HPT  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the stp_conf_name parameter in the web_stp_globalSetting_post function. PLANET of WGS-804HPT A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Planet FW-WGS-804HPT is a wall-mounted managed switch from China's PLANET company. Planet FW-WGS-804HPT has a buffer overflow vulnerability. The vulnerability is caused by the failure of the stp_conf_name parameter in the web_stp_globalSetting_post function to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code or cause a denial of service
VAR-202505-2459 CVE-2025-44887 PLANET  of  WGS-804HPT  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the radIpkey parameter in the web_radiusSrv_post function. PLANET of WGS-804HPT A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Planet FW-WGS-804HPT is a wall-mounted managed switch from China's PLANET company. Planet FW-WGS-804HPT has a buffer overflow vulnerability. The vulnerability is caused by the radIpkey parameter in the web_radiusSrv_post function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service