VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202509-1746 CVE-2025-10803 Shenzhen Tenda Technology Co.,Ltd.  of  ac23  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been found in Tenda AC23 up to 16.03.07.52. Affected by this vulnerability is the function sscanf of the file /goform/SetPptpServerCfg of the component HTTP POST Request Handler. Such manipulation of the argument startIp leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. of ac23 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202509-1748 CVE-2025-10792 D-Link Corporation  of  DIR-513  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security vulnerability has been detected in D-Link DIR-513 A1FW110. Affected is an unknown function of the file /goform/formWPS. Such manipulation of the argument webpage leads to buffer overflow. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-513 The firmware contains buffer error vulnerabilities, classic buffer overflow vulnerabilities, and out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-513 is a wireless router product from D-Link, a Chinese company. Detailed vulnerability details are currently unavailable
VAR-202509-1739 CVE-2025-10779 D-Link Corporation  of  DCS-935L  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in D-Link DCS-935L up to 1.13.01. The impacted element is the function sub_402280 of the file /HNAP1/. The manipulation of the argument HNAP_AUTH/SOAPAction results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DCS-935L An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DCS-935L is a router manufactured by D-Link, a Chinese company. This vulnerability stems from the failure of the HNAP_AUTH/SOAPAction parameter in the file /HNAP1/ to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service
VAR-202509-1655 CVE-2025-10689 D-Link Corporation  of  DIR-645  Injection Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was identified in D-Link DIR-645 105B01. This issue affects the function soapcgi_main of the file /soap.cgi. Such manipulation of the argument service leads to command injection. The attack can be launched remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer. (DoS) It may be in a state
VAR-202509-1560 CVE-2025-10666 D-Link Corporation  of  DIR-825  Classic buffer overflow vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security flaw has been discovered in D-Link DIR-825 up to 2.10. Affected by this vulnerability is the function sub_4106d4 of the file apply.cgi. The manipulation of the argument countdown_time results in buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be exploited. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-825 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202509-1835 CVE-2025-10634 D-Link Corporation  of  DIR-823X  Injection Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. D-Link Corporation of DIR-823X The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-823X is a wireless router from D-Link, a Chinese company. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-1573 CVE-2025-10629 D-Link Corporation  of  DIR-852  Command injection vulnerability in firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was determined in D-Link DIR-852 1.00CN B09. This issue affects the function ssdpcgi_main of the file htodcs/cgibin of the component Simple Service Discovery Protocol Service. Executing manipulation of the argument ST can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-852 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202509-1629 CVE-2025-10628 D-Link Corporation  of  DIR-852  Command injection vulnerability in firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was found in D-Link DIR-852 1.00CN B09. This vulnerability affects unknown code of the file /htdocs/cgibin/hedwig.cgi of the component Web Management Interface. Performing manipulation results in command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-852 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202509-4395 No CVE Siemens Mobility Trainguard End-of-Train and Head-of-Train Weak Authentication Vulnerabilities CVSS V2: 8.3
CVSS V3: -
Severity: HIGH
The Trainguard End-of-Train (EOT) is a next-generation train-end device used to connect onboard telemetry. The Trainguard Head-of-Train (HOT) is a head-of-train device. These devices communicate using the S-9152 standard. Siemens Mobility Trainguard End-of-Train and Head-of-Train devices have weak authentication vulnerabilities. This vulnerability stems from a lack of authentication in the device's communication protocol. An attacker could exploit this vulnerability to inject malicious commands, causing operational disruptions or brake failures.
VAR-202509-1516 CVE-2025-10443 CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was identified in Tenda AC9 and AC15 15.03.05.14/15.03.05.18. This vulnerability affects the function formexeCommand of the file /goform/exeCommand. Such manipulation of the argument cmdinput leads to buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.
VAR-202509-1490 CVE-2025-10442 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  firmware and  AC15  Command injection vulnerability in firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was determined in Tenda AC9 and AC15 15.03.05.14. This affects the function formexeCommand of the file /goform/exeCommand. This manipulation of the argument cmdinput causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. Shenzhen Tenda Technology Co.,Ltd. of AC9 firmware and AC15 The firmware contains a command injection vulnerability. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202509-1480 CVE-2025-10432 Shenzhen Tenda Technology Co.,Ltd.  of  ac1206  Buffer error vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: High
A vulnerability was found in Tenda AC1206 15.03.06.23. This vulnerability affects the function check_param_changed of the file /goform/AdvSetMacMtuWa of the component HTTP Request Handler. Performing manipulation of the argument wanMTU results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used. of ac1206 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202509-1494 CVE-2025-10401 D-Link Corporation  of  DIR-823X  Injection Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was detected in D-Link DIR-823x up to 250416. The affected element is an unknown function of the file /goform/diag_ping. Performing manipulation of the argument target_addr results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. D-Link Corporation of DIR-823X The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-823X is a wireless router manufactured by D-Link in China. This vulnerability stems from the failure of the target_addr parameter in the /goform/diag_ping file to properly sanitize special characters and commands in constructed commands. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-4250 No CVE Wuxi Xinjie Electric Co., Ltd.'s XLH-24A16 has a binary vulnerability CVSS V2: 3.3
CVSS V3: -
Severity: LOW
The XLH-24A16 is a slim programmable controller. The XLH-24A16 from Wuxi Xinjie Electric Co., Ltd. contains a binary vulnerability that could allow attackers to bypass authentication and log into the system.
VAR-202509-4151 No CVE TOTOLINK A950RG has a denial of service vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The TOTOLINK A950RG is a super-generation Giga wireless router manufactured by the Chinese company TOTOLINK. The TOTOLINK A950RG contains a denial of service vulnerability that could be exploited to cause a denial of service.
VAR-202509-1467 CVE-2025-10359 WAVLINK  of  WL-WN578W2  Command injection vulnerability in firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability was detected in Wavlink WL-WN578W2 221110. This impacts the function sub_404DBC of the file /cgi-bin/wireless.cgi. The manipulation of the argument macAddr results in os command injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the macAddr parameter in the sub_404DBC function in the /cgi-bin/wireless.cgi file to properly sanitize special characters and commands in constructed commands. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-1429 CVE-2025-10358 WAVLINK  of  WL-WN578W2  in the firmware  OS  Command injection vulnerability CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A security vulnerability has been detected in Wavlink WL-WN578W2 221110. This affects the function sub_404850 of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the delete_list parameter of the sub_404850 function in the /cgi-bin/wireless.cgi file to properly sanitize special characters and commands when constructing commands. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-1437 CVE-2025-10325 WAVLINK  of  WL-WN578W2  Injection Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the ipaddr parameter in the sub_401340 function of the /cgi-bin/login.cgi file to properly sanitize special characters and commands during command construction. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-1421 CVE-2025-10324 WAVLINK  of  WL-WN578W2  Injection Vulnerability in Firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects the function sub_401C5C of the file firewall.cgi. This manipulation of the argument pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled parameter in the firewall.cgi function to properly filter special characters and commands in constructed commands. This vulnerability could allow an attacker to execute arbitrary commands
VAR-202509-1446 CVE-2025-10323 WAVLINK  of  WL-WN578W2  Injection Vulnerability in Firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is the function sub_409184 of the file /wizard_rep.shtml. The manipulation of the argument sel_EncrypTyp results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. This vulnerability stems from the failure of the sel_Encryp parameter of the sub_409184 function in the file /wizard_rep.shtml to properly sanitize special characters and commands during command construction. An attacker could exploit this vulnerability to execute arbitrary commands