VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202509-4501 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd.'s AC20 has a denial-of-service vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The AC20 is a wireless router. The AC20 router developed by Shenzhen Jixiang Tengda Technology Co., Ltd. contains a denial-of-service vulnerability, which attackers can exploit to cause a denial-of-service attack.
VAR-202509-4526 No CVE WAGO Electronics (Tianjin) Co., Ltd. has an unauthorized access vulnerability in port 750-880. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The 750-880 is a third-generation programmable fieldbus controller with Ethernet communication, SD card expansion, and industrial protocol support capabilities, primarily used in industrial automation control. WAGO Electronics (Tianjin) Co., Ltd.'s 750-880 model contains an unauthorized access vulnerability, which attackers could exploit to obtain sensitive information.
VAR-202509-4467 No CVE WAGO 750-841, manufactured by WAGO Electronics (Tianjin) Co., Ltd., contains an unauthorized access vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The WAGO 750-841 is a fieldbus adapter in the WAGO-I/O-SYSTEM series, primarily used for data transmission and equipment control in industrial automation. WAGO Electronics (Tianjin) Co., Ltd.'s WAGO 750-841 contains an unauthorized access vulnerability, which attackers could exploit to obtain sensitive information.
VAR-202509-4508 No CVE The Canon MF220 Series from Canon (China) Co., Ltd. has a weak password vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Canon MF220 Series is a 4-in-1 multifunction laser printer. Canon (China) Co., Ltd.'s Canon MF220 Series printer has a weak password vulnerability that attackers could exploit to obtain sensitive information.
VAR-202509-4454 No CVE A binary vulnerability exists in AC18 of Shenzhen Jixiang Tengda Technology Co., Ltd. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The AC18 is a dual-band wireless router. The AC18 router developed by Shenzhen Jixiang Tengda Technology Co., Ltd. contains a binary vulnerability that attackers could exploit to cause a denial-of-service attack.
VAR-202509-4515 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd.'s AC10 has a binary vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The AC10 is a high-performance router with gigabit ports on both the WAN and LAN sides. Shenzhen Jixiang Tengda Technology Co., Ltd.'s AC10 router contains a binary vulnerability that attackers could exploit to cause a denial-of-service attack.
VAR-202509-4499 No CVE TOTOLINK LR350 has a stack overflow vulnerability. CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The LR350 is a wireless router. The TOTOLINK LR350 contains a stack overflow vulnerability that attackers could exploit to cause a denial-of-service attack.
VAR-202509-4395 No CVE Siemens Mobility Trainguard End-of-Train and Head-of-Train Weak Authentication Vulnerabilities CVSS V2: 8.3
CVSS V3: -
Severity: HIGH
The Trainguard End-of-Train (EOT) is a next-generation train-end device used to connect onboard telemetry. The Trainguard Head-of-Train (HOT) is a head-of-train device. These devices communicate using the S-9152 standard. Siemens Mobility Trainguard End-of-Train and Head-of-Train devices have weak authentication vulnerabilities. This vulnerability stems from a lack of authentication in the device's communication protocol. An attacker could exploit this vulnerability to inject malicious commands, causing operational disruptions or brake failures.
VAR-202509-2702 CVE-2025-52053 TOTOLINK  of  x6000r  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK X6000R V9.4.0cu.1360_B20241207 was found to contain a command injection vulnerability in the sub_417D74 function via the file_name parameter. This vulnerability allows unauthenticated attackers to execute arbitrary commands via a crafted request. TOTOLINK of x6000r Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK X6000R is a wireless router launched by TOTOLINK (a Chinese electronics company) that supports Wi-Fi 6 technology, emphasizing high-concurrency connections and dual-band transmission. This vulnerability stems from a failure in the sub_417D74 function to properly filter special characters and commands in the filename field
VAR-202509-1516 CVE-2025-10443 CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was identified in Tenda AC9 and AC15 15.03.05.14/15.03.05.18. This vulnerability affects the function formexeCommand of the file /goform/exeCommand. Such manipulation of the argument cmdinput leads to buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.
VAR-202509-1490 CVE-2025-10442 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  firmware and  AC15  Command injection vulnerability in firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was determined in Tenda AC9 and AC15 15.03.05.14. This affects the function formexeCommand of the file /goform/exeCommand. This manipulation of the argument cmdinput causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. Shenzhen Tenda Technology Co.,Ltd. of AC9 firmware and AC15 The firmware contains a command injection vulnerability. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202509-1480 CVE-2025-10432 Shenzhen Tenda Technology Co.,Ltd.  of  ac1206  Buffer error vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: High
A vulnerability was found in Tenda AC1206 15.03.06.23. This vulnerability affects the function check_param_changed of the file /goform/AdvSetMacMtuWa of the component HTTP Request Handler. Performing manipulation of the argument wanMTU results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used. of ac1206 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202509-1494 CVE-2025-10401 D-Link Corporation  of  DIR-823X  Injection Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was detected in D-Link DIR-823x up to 250416. The affected element is an unknown function of the file /goform/diag_ping. Performing manipulation of the argument target_addr results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. D-Link Corporation of DIR-823X The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-823X is a wireless router manufactured by D-Link in China. This vulnerability stems from the failure of the target_addr parameter in the /goform/diag_ping file to properly sanitize special characters and commands in constructed commands. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-4460 No CVE Wuxi Xinjie Electric Co., Ltd.'s XLH-24A16 has a binary vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
The XLH-24A16 is a slim programmable controller. The XLH-24A16 from Wuxi Xinjie Electric Co., Ltd. contains a binary vulnerability that could be exploited to cause a denial of service.
VAR-202509-4151 No CVE TOTOLINK A950RG has a denial of service vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The TOTOLINK A950RG is a super-generation Giga wireless router manufactured by the Chinese company TOTOLINK. The TOTOLINK A950RG contains a denial of service vulnerability that could be exploited to cause a denial of service.
VAR-202509-4250 No CVE Wuxi Xinjie Electric Co., Ltd.'s XLH-24A16 has a binary vulnerability CVSS V2: 3.3
CVSS V3: -
Severity: LOW
The XLH-24A16 is a slim programmable controller. The XLH-24A16 from Wuxi Xinjie Electric Co., Ltd. contains a binary vulnerability that could allow attackers to bypass authentication and log into the system.
VAR-202509-1467 CVE-2025-10359 WAVLINK  of  WL-WN578W2  Command injection vulnerability in firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability was detected in Wavlink WL-WN578W2 221110. This impacts the function sub_404DBC of the file /cgi-bin/wireless.cgi. The manipulation of the argument macAddr results in os command injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the macAddr parameter in the sub_404DBC function in the /cgi-bin/wireless.cgi file to properly sanitize special characters and commands in constructed commands. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-1429 CVE-2025-10358 WAVLINK  of  WL-WN578W2  in the firmware  OS  Command injection vulnerability CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A security vulnerability has been detected in Wavlink WL-WN578W2 221110. This affects the function sub_404850 of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the delete_list parameter of the sub_404850 function in the /cgi-bin/wireless.cgi file to properly sanitize special characters and commands when constructing commands. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-1437 CVE-2025-10325 WAVLINK  of  WL-WN578W2  Injection Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the ipaddr parameter in the sub_401340 function of the /cgi-bin/login.cgi file to properly sanitize special characters and commands during command construction. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-1421 CVE-2025-10324 WAVLINK  of  WL-WN578W2  Injection Vulnerability in Firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects the function sub_401C5C of the file firewall.cgi. This manipulation of the argument pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled parameter in the firewall.cgi function to properly filter special characters and commands in constructed commands. This vulnerability could allow an attacker to execute arbitrary commands