VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202508-2142 No CVE Multiple vulnerabilities in Siemens SINEC OS third-party components CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
The RUGGEDCOM RST2428P is a Layer 2 Ethernet switch based on the SINEC operating system with up to 28 non-blocking interfaces. SCALANCE X switches are used to connect industrial components such as programmable logic controllers (PLCs) or human-machine interfaces (HMIs). Multiple vulnerabilities in third-party components of Siemens' SINEC OS could allow attackers to gain control of the server.
VAR-202508-0342 CVE-2025-40752 Siemens POWER METER SICAM Q100/Q200 Information Disclosure Vulnerability CVSS V2: 4.9
CVSS V3: 6.2
Severity: Medium
A vulnerability has been identified in POWER METER SICAM Q100 (7KG9501-0AA01-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q200 family (All versions >= V2.70 < V2.80). Affected devices store the password for the SMTP account as plain text. This could allow an authenticated local attacker to extract it and use the configured SMTP service for arbitrary purposes
VAR-202508-1859 No CVE MOXA ioLogik E1213 has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The MOXA ioLogik E1213 is an industrial-grade remote Ethernet I/O module. The MOXA ioLogik E1213 has an unauthorized access vulnerability that could allow attackers to obtain sensitive information.
VAR-202508-1860 No CVE H3C BR3000W has an information disclosure vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The H3C BR3000W is a WiFi 6 dual-band Gigabit wireless router designed for home and enterprise scenarios. The H3C BR3000W has an information leakage vulnerability that could allow an attacker to obtain sensitive information.
VAR-202508-1861 No CVE Mosa Technology (Shanghai) Co., Ltd.'s ioLogik E1210-T has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The ioLogik E1210-T is an industrial Ethernet module. The ioLogik E1210-T from Mosa Technology (Shanghai) Co., Ltd. has an unauthorized access vulnerability that could allow attackers to obtain sensitive information.
VAR-202508-1608 CVE-2024-58255 Huawei EnzoH-W5611T OS Command Injection Vulnerability CVSS V2: 3.5
CVSS V3: 5.0
Severity: MEDIUM
EnzoH has an OS command injection vulnerability. Successful exploitation of this vulnerability may lead to arbitrary command execution. Huawei is a leading global provider of ICT (information and communications technology) infrastructure and intelligent devices. Founded in 1987 and headquartered in Shenzhen, Guangdong Province, China, Huawei's business covers over 170 countries and regions, serving over 3 billion people worldwide. This vulnerability is caused by setting certain variables directly after getting them without validating them. Detailed vulnerability details are not available at this time
VAR-202508-0132 CVE-2013-10069 D-Link DIR-600 Command Injection Vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: Critical
The web interface of multiple D-Link routers, including DIR-600 rev B (≤2.14b01) and DIR-300 rev B (≤2.13), contains an unauthenticated OS command injection vulnerability in command.php, which improperly handles the cmd POST parameter. A remote attacker can exploit this flaw without authentication to spawn a Telnet service on a specified port, enabling persistent interactive shell access as root. The D-Link DIR-600 is a wireless router from D-Link, a Chinese company. An attacker could exploit this vulnerability to cause command injection
VAR-202508-0405 CVE-2025-53417 Delta Electronics DIAView Directory Traversal Remote Code Execution Vulnerability CVSS V2: -
CVSS V3: 9.8
Severity: Critical
DIAView (v4.2.0 and prior) - Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Delta Electronics DIAView. Authentication is not required to exploit this vulnerability.The specific flaw exists within the web service, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the service account
VAR-202508-1788 CVE-2025-51390 TOTOLINK  of  n600r  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a command injection vulnerability via the pin parameter in the setWiFiWpsConfig function. TOTOLINK of n600r The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK N600R is a dual-band wireless router released by the Korean brand TOTOLINK in 2013. It supports concurrent operation in the 2.4GHz and 5GHz bands, with a maximum wireless transmission rate of 300Mbps. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202508-0094 CVE-2013-10061 Netgear DGN1000B Code Execution Vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: High
An authenticated OS command injection vulnerability exists in Netgear routers (tested on the DGN1000B model firmware versions 1.1.00.24 and 1.1.00.45) via the TimeToLive parameter in the setup.cgi endpoint. The vulnerability arises from improper input neutralization, enabling command injection through crafted POST requests. This flaw enables remote attackers to deploy payloads or manipulate system state post-authentication. The Netgear DGN1000B is a wireless router from Netgear. Netgear DGN1000B versions 1.1.00.24 and 1.1.00.45 contain a code execution vulnerability due to insufficient input sanitization in the setup.cgi endpoint. An attacker could exploit this vulnerability to cause remote code execution
VAR-202508-0068 CVE-2013-10060 Netgear DGN2200B Code Execution Vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: Critical
An authenticated OS command injection vulnerability exists in Netgear routers (tested on the DGN2200B model) firmware versions 1.0.0.36 and prior via the pppoe.cgi endpoint. A remote attacker with valid credentials can execute arbitrary commands via crafted input to the pppoe_username parameter. This flaw allows full compromise of the device and may persist across reboots unless configuration is restored. The Netgear DGN2200B is a wireless router from Netgear. Netgear DGN2200B versions 1.0.0.36 and earlier contain a code execution vulnerability due to insufficient input sanitization at the pppoe.cgi endpoint. An attacker could exploit this vulnerability to cause remote code execution
VAR-202508-0048 CVE-2013-10059 D-Link DIR-615H1 Command Injection Vulnerability CVSS V2: 8.3
CVSS V3: -
Severity: High
An authenticated OS command injection vulnerability exists in various D-Link routers (tested on DIR-615H1 running firmware version 8.04) via the tools_vct.htm endpoint. The web interface fails to sanitize input passed from the ping_ipaddr parameter to the tools_vct.htm diagnostic interface, allowing attackers to inject arbitrary shell commands using backtick encapsulation. With default credentials, an attacker can exploit this blind injection vector to execute arbitrary commands. The D-Link DIR-615H1 is a wireless router from D-Link, a Chinese company. The D-Link DIR-615H1 suffers from a command injection vulnerability caused by insufficient input sanitization in the tools_vct.htm endpoint. This vulnerability could allow an attacker to cause remote code execution
VAR-202507-3073 CVE-2025-51385 D-Link Systems, Inc.  of  di-8200  Stack-based buffer overflow vulnerability in firmware CVSS V2: 2.7
CVSS V3: 3.5
Severity: LOW
D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the yyxz_dlink_asp function via the id parameter. D-Link Systems, Inc. of di-8200 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The D-Link DI_8200 is a D-Link router designed for small and medium-sized network environments. It supports multi-line bandwidth aggregation, PPPoE authentication and billing, and intelligent flow control. This vulnerability stems from the yyxz_dlink_asp function failing to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
VAR-202507-2896 CVE-2025-51384 D-Link Systems, Inc.  of  di-8200  Stack-based buffer overflow vulnerability in firmware CVSS V2: 2.7
CVSS V3: 3.5
Severity: LOW
D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_net_asp function via the remot_ip parameter. D-Link Systems, Inc. of di-8200 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The D-Link DI_8200 is a D-Link router designed for small and medium-sized network environments. It supports multi-line bandwidth aggregation, PPPoE authentication and billing, and intelligent flow control. This vulnerability stems from the ipsec_net_asp function failing to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
VAR-202507-2957 CVE-2025-51383 D-Link Systems, Inc.  of  di-8200  Stack-based buffer overflow vulnerability in firmware CVSS V2: 2.7
CVSS V3: 3.5
Severity: LOW
D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_road_asp function via the host_ip parameter. D-Link Systems, Inc. of di-8200 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The D-Link DI_8200 is a D-Link router designed for small and medium-sized network environments. It supports multi-channel bandwidth aggregation, PPPoE authentication and billing, and intelligent flow control. This vulnerability stems from the ipsec_road_asp function failing to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
VAR-202507-2948 CVE-2012-10021 D-Link Technology DIR-605L Buffer Overflow Vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: Critical
A stack-based buffer overflow vulnerability exists in D-Link DIR-605L Wireless N300 Cloud Router firmware versions 1.12 and 1.13 via the getAuthCode() function. The flaw arises from unsafe usage of sprintf() when processing user-supplied CAPTCHA data via the FILECODE parameter in /goform/formLogin. A remote unauthenticated attacker can exploit this to execute arbitrary code with root privileges on the device. The D-Link DIR-605L is D-Link's first cloud router, designed for home and small office networks
VAR-202507-3674 No CVE Shenzhen Bilian Electronics Co., Ltd. BL-AC2100 has a binary vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
The BL-AC2100 is a Wi-Fi 6 wireless router. Shenzhen Bilian Electronics Co., Ltd.'s BL-AC2100 has a binary vulnerability that could allow an attacker to gain server privileges.
VAR-202507-3351 No CVE D-Link DI-500WF from D-Link Electronics (Shanghai) Co., Ltd. has a binary vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
The D-Link DI-500WF is a panel-mounted wireless access point. The D-Link DI-500WF, manufactured by D-Link Electronics (Shanghai) Co., Ltd., contains a binary vulnerability that could allow an attacker to execute arbitrary commands.
VAR-202507-3675 No CVE Honeywell (China) Co., Ltd. Honeywell PD43 has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Honeywell PD43 is an industrial-grade label printer. The Honeywell PD43, manufactured by Honeywell (China) Co., Ltd., has a weak password vulnerability that could allow attackers to obtain sensitive information.
VAR-202507-3352 No CVE Dell (China) Co., Ltd. Dell 2350dn has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Dell 2350dn is a monochrome laser printer. A vulnerability exists in the Dell 2350dn printer from Dell (China) Co., Ltd. that could allow an attacker to obtain sensitive information.