VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202505-2166 CVE-2025-45858 TOTOLINK  of  A3002R  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a command injection vulnerability via the FUN_00459fdc function. TOTOLINK of A3002R The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R is a wireless router produced by China's TOTOLINK Electronics. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202505-2212 CVE-2025-45867 TOTOLINK  of  A3002R  Stack-based buffer overflow vulnerability in firmware CVSS V2: 4.8
CVSS V3: 5.4
Severity: MEDIUM
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the static_dns1 parameter in the formIpv6Setup interface. TOTOLINK of A3002R A stack-based buffer overflow vulnerability exists in the firmware.Information may be obtained and information may be tampered with. TOTOLINK A3002R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the static_dns1 parameter in the formIpv6Setup interface failing to correctly verify the length of the input data. No detailed vulnerability details are currently available
VAR-202505-2329 CVE-2025-45866 TOTOLINK  of  A3002R  Classic buffer overflow vulnerability in firmware CVSS V2: 4.8
CVSS V3: 5.4
Severity: MEDIUM
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the addrPoolEnd parameter in the formDhcpv6s interface. TOTOLINK A3002R is a wireless router from China's TOTOLINK Electronics. The vulnerability is caused by the addrPoolEnd parameter in the formDhcpv6s interface failing to correctly verify the length of the input data. No detailed vulnerability details are currently available
VAR-202505-2316 CVE-2025-45864 TOTOLINK  of  A3002R  Classic buffer overflow vulnerability in firmware CVSS V2: 4.8
CVSS V3: 5.4
Severity: MEDIUM
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the addrPoolStart parameter in the formDhcpv6s interface. TOTOLINK A3002R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the addrPoolStart parameter in the formDhcpv6s interface failing to correctly verify the length of the input data. No detailed vulnerability details are currently available
VAR-202505-2211 CVE-2025-45859 TOTOLINK  of  A3002R  Classic buffer overflow vulnerability in firmware CVSS V2: 4.8
CVSS V3: 5.4
Severity: MEDIUM
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the bandstr parameter in the formMapDelDevice interface. TOTOLINK A3002R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the failure of the bandstr parameter in the formMapDelDevice interface to correctly verify the length of the input data. No detailed vulnerability details are currently provided
VAR-202505-1884 CVE-2025-32756 Stack-based buffer overflow vulnerability in multiple Fortinet products CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiVoice versions 7.2.0, 7.0.0 through 7.0.6, 6.4.0 through 6.4.10, FortiRecorder versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.5, 6.4.0 through 6.4.5, FortiMail versions 7.6.0 through 7.6.2, 7.4.0 through 7.4.4, 7.2.0 through 7.2.7, 7.0.0 through 7.0.8, FortiNDR versions 7.6.0, 7.4.0 through 7.4.7, 7.2.0 through 7.2.4, 7.0.0 through 7.0.6, FortiCamera versions 2.1.0 through 2.1.3, 2.0 all versions, 1.1 all versions, allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookie. FortiMail , FortiNDR , FortiRecorder Multiple Fortinet products, including firmware, contain stack-based buffer overflow vulnerabilities and out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202505-1599 CVE-2025-40583 Siemens'  SCALANCE LPE9403  Vulnerability in cleartext transmission of sensitive information in firmware CVSS V2: 4.6
CVSS V3: 4.4
Severity: Medium
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions with SINEMA Remote Connect Edge Client installed). Affected devices do transmit sensitive information in cleartext. This could allow a privileged local attacker to retrieve this sensitive information. Siemens' SCALANCE LPE9403 A vulnerability exists in the firmware regarding the transmission of sensitive information in plaintext.Information may be obtained. The Siemens SCALANCE LPE9403 is a local processing engine designed by Siemens for industrial field data processing. It is used to capture, collect, and pre-process industrial field data
VAR-202505-1600 CVE-2025-40582 Siemens'  SCALANCE LPE9403  in the firmware  OS  Command injection vulnerability CVSS V2: 6.8
CVSS V3: 7.8
Severity: High
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions with SINEMA Remote Connect Edge Client installed). Affected devices do not properly sanitize configuration parameters. This could allow a non-privileged local attacker to execute root commands on the device. Siemens' SCALANCE LPE9403 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Siemens SCALANCE LPE9403 is a local processing engine designed by Siemens for industrial field data processing. It is used to capture, collect, and pre-process industrial field data
VAR-202505-1597 CVE-2025-40581 Siemens'  SCALANCE LPE9403  Firmware vulnerabilities CVSS V2: 6.2
CVSS V3: 7.1
Severity: High
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions with SINEMA Remote Connect Edge Client installed). Affected devices are vulnerable to an authentication bypass. This could allow a non-privileged local attacker to bypass the authentication of the SINEMA Remote Connect Edge Client, and to read and modify the configuration parameters. Siemens' SCALANCE LPE9403 There are unspecified vulnerabilities in the firmware.Information may be obtained and information may be tampered with. The Siemens SCALANCE LPE9403 is a local processing engine designed by Siemens for industrial field data processing. It is used to capture, collect, and pre-process industrial field data
VAR-202505-1595 CVE-2025-40580 Siemens'  SCALANCE LPE9403  Stack-based buffer overflow vulnerability in firmware CVSS V2: 6.0
CVSS V3: 6.7
Severity: Medium
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices are vulnerable to a stack-based buffer overflow. This could allow a non-privileged local attacker to execute arbitrary code on the device or to cause a denial of service condition. Siemens' SCALANCE LPE9403 The firmware contains a stack-based buffer overflow vulnerability and an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Siemens SCALANCE LPE9403 is a local processing engine designed by Siemens for industrial field data processing. It is used to capture, collect, and pre-process industrial field data
VAR-202505-1598 CVE-2025-40579 Siemens'  SCALANCE LPE9403  Stack-based buffer overflow vulnerability in firmware CVSS V2: 6.0
CVSS V3: 6.7
Severity: Medium
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices are vulnerable to a stack-based buffer overflow. This could allow a non-privileged local attacker to execute arbitrary code on the device or to cause a denial of service condition. Siemens' SCALANCE LPE9403 The firmware contains a stack-based buffer overflow vulnerability and an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Siemens SCALANCE LPE9403 is a local processing engine designed by Siemens for industrial field data processing. It is used to capture, collect, and pre-process industrial field data
VAR-202505-1603 CVE-2025-40578 Siemens'  SCALANCE LPE9403  Out-of-bounds read vulnerability in firmware CVSS V2: 3.3
CVSS V3: 4.3
Severity: Medium
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions). Affected devices do not properly handle multiple incoming Profinet packets received in rapid succession. An unauthenticated remote attacker can exploit this flaw by sending multiple packets in a very short time frame, which leads to a crash of the dcpd process. Siemens' SCALANCE LPE9403 An out-of-bounds read vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. The Siemens SCALANCE LPE9403 is a local processing engine designed by Siemens for industrial field data processing. It is used to capture, collect, and pre-process industrial field data. An attacker could exploit this vulnerability to cause the DCPD process to crash
VAR-202505-1604 CVE-2025-40577 Siemens'  SCALANCE LPE9403  Out-of-bounds read vulnerability in firmware CVSS V2: 3.3
CVSS V3: 4.3
Severity: Medium
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices do not properly validate incoming Profinet packets. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted malicious packet, which leads to a crash of the dcpd process. Siemens' SCALANCE LPE9403 An out-of-bounds read vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. The Siemens SCALANCE LPE9403 is a local processing engine designed by Siemens for industrial field data processing. It is used to capture, collect, and pre-process industrial field data
VAR-202505-1601 CVE-2025-40576 Siemens'  SCALANCE LPE9403  in the firmware  NULL  Pointer dereference vulnerability CVSS V2: 3.3
CVSS V3: 4.3
Severity: Medium
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices do not properly validate incoming Profinet packets. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted malicious packet, which leads to a crash of the dcpd process. Siemens' SCALANCE LPE9403 The firmware has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. The Siemens SCALANCE LPE9403 is a local processing engine designed by Siemens for industrial field data processing. It is used to capture, collect, and pre-process industrial field data
VAR-202505-1593 CVE-2025-40575 Siemens'  SCALANCE LPE9403  Firmware vulnerabilities CVSS V2: 3.3
CVSS V3: 4.3
Severity: Medium
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices do not properly validate incoming Profinet packets. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted malicious packet, which leads to a crash of the dcpd process. Siemens' SCALANCE LPE9403 There are unspecified vulnerabilities in the firmware.Service operation interruption (DoS) It may be in a state. The Siemens SCALANCE LPE9403 is a local processing engine designed by Siemens for industrial field data processing. It is used to capture, collect, and pre-process industrial field data. The Siemens SCALANCE LPE9403 has a denial of service vulnerability due to improper validation of Profinet packets
VAR-202505-1602 CVE-2025-40574 Siemens'  SCALANCE LPE9403  Improper Permission Assignment Vulnerability for Critical Resources in Firmware CVSS V2: 6.8
CVSS V3: 7.8
Severity: High
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices do not properly assign permissions to critical ressources. This could allow a non-privileged local attacker to interact with the backupmanager service. Siemens' SCALANCE LPE9403 A firmware vulnerability related to improper assignment of permissions to critical resources.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Siemens SCALANCE LPE9403 is a local processing engine designed by Siemens for industrial field data processing. It is used to capture, collect, and pre-process industrial field data
VAR-202505-1596 CVE-2025-40573 Siemens'  SCALANCE LPE9403  Path traversal vulnerability in firmware CVSS V2: 4.6
CVSS V3: 4.4
Severity: Medium
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices are vulnerable to path traversal attacks. This could allow a privileged local attacker to restore backups that are outside the backup folder. The Siemens SCALANCE LPE9403 is a local processing engine designed by Siemens for industrial field data processing. It is used to capture, collect, and pre-process industrial field data
VAR-202505-1594 CVE-2025-40572 Siemens'  SCALANCE LPE9403  Improper Permission Assignment Vulnerability for Critical Resources in Firmware CVSS V2: 4.6
CVSS V3: 5.5
Severity: Medium
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices do not properly assign permissions to critical ressources. This could allow a non-privileged local attacker to access sensitive information stored on the device. Siemens' SCALANCE LPE9403 A firmware vulnerability related to improper assignment of permissions to critical resources.Information may be obtained. The Siemens SCALANCE LPE9403 is a local processing engine designed by Siemens for industrial field data processing. It is used to capture, collect, and pre-process industrial field data
VAR-202505-1698 CVE-2025-40566 Siemens'  SIMATIC PCS neo  Session deadline vulnerability in CVSS V2: -
CVSS V3: 8.8
Severity: High
A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions < V4.1 Update 3), SIMATIC PCS neo V5.0 (All versions < V5.0 Update 1). Affected products do not correctly invalidate user sessions upon user logout. This could allow a remote unauthenticated attacker, who has obtained the session token by other means, to re-use a legitimate user's session even after logout. Siemens' SIMATIC PCS neo contains a session expiration vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202505-1581 CVE-2025-40555 Siemens APOGEE PXC+TALON TC Series Denial of Service Vulnerability CVSS V2: 3.3
CVSS V3: 4.7
Severity: Medium
A vulnerability has been identified in APOGEE PXC+TALON TC Series (BACnet) (All versions). Affected devices start sending unsolicited BACnet broadcast messages after processing a specific BACnet createObject request. This could allow an attacker residing in the same BACnet network to send a specially crafted message that results in a partial denial of service condition of the targeted device, and potentially reduce the availability of BACnet network. A power cycle is required to restore the device's normal operation. Attackers can exploit this vulnerability to cause a denial of service