VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202503-0549 CVE-2025-29385 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
In Tenda AC9 v1.0 V15.03.05.14_multi, the cloneType parameter of /goform/AdvSetMacMtuWan has a stack overflow vulnerability, which can lead to remote arbitrary code execution. Shenzhen Tenda Technology Co.,Ltd. of AC9 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC9 has a buffer overflow vulnerability. The vulnerability is caused by the cloneType parameter of the formAdvSetMacMtuWan function failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202503-0623 CVE-2025-29384 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
In Tenda AC9 v1.0 V15.03.05.14_multi, the wanMTU parameter of /goform/AdvSetMacMtuWan has a stack overflow vulnerability, which can lead to remote arbitrary code execution. Shenzhen Tenda Technology Co.,Ltd. of AC9 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC9 has a buffer overflow vulnerability. The vulnerability is caused by the wanMTU parameter of the formAdvSetMacMtuWan function failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202503-1739 CVE-2025-29032 Tenda  of  AC9  Classic buffer overflow vulnerability in firmware CVSS V2: 6.1
CVSS V3: 5.9
Severity: MEDIUM
Tenda AC9 v15.03.05.19(6318) was discovered to contain a buffer overflow via the formWifiWpsOOB function. Tenda of AC9 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC9 is a wireless router from China's Tenda company. No detailed vulnerability details are currently available
VAR-202503-0654 CVE-2025-29031 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the fromAddressNat function. Shenzhen Tenda Technology Co.,Ltd. of AC6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the fromAddressNat function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202503-0607 CVE-2025-29030 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the formWifiWpsOOB function. Shenzhen Tenda Technology Co.,Ltd. of AC6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the formWifiWpsOOB function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202503-0498 CVE-2025-29029 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the formSetSpeedWan function. Shenzhen Tenda Technology Co.,Ltd. of AC6 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the formSetSpeedWan function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202503-0401 CVE-2024-12858 Delta Electronics CNCSoft-G2 Input Validation Error Vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. *** Duplicate of CVE-2025-22880 ***. Delta Electronics CNCSoft-G2 is a human-machine interface (HMI) software from Delta Electronics, a Chinese company. Delta Electronics CNCSoft-G2 2.1.0.16 and earlier versions have an input validation error vulnerability. The vulnerability is caused by not properly validating the length of the data provided by the user. Attackers can exploit this vulnerability to execute code in the current process environment
VAR-202503-1941 CVE-2025-29363 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to buffer overflow via the schedStartTime and schedEndTime parameters at /goform/saveParentControlInfo. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a dual-band WiFi home wireless router from China's Tenda Company
VAR-202503-2140 CVE-2025-29362 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the list parameter at /goform/setPptpUserList. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a dual-band WiFi 6 home wireless router from China's Tenda Company
VAR-202503-1031 CVE-2025-29361 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the list parameter at /goform/SetVirtualServerCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
VAR-202503-0683 CVE-2025-29360 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the time and timeZone parameters at /goform/SetSysTimeCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
VAR-202503-0851 CVE-2025-29359 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the deviceId parameter at /goform/saveParentControlInfo. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
VAR-202503-1032 CVE-2025-29358 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the firewallEn parameter at /goform/SetFirewallCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a dual-band WiFi 6 home wireless router from China's Tenda company. It is used for home network coverage and supports high-speed wireless connections. The vulnerability is caused by the firewallEn parameter in /goform/SetFirewallCfg failing to correctly verify the length of the input data
VAR-202503-2141 CVE-2025-29357 Tenda  of  RX3  Improper Shutdown and Release of Resources in Firmware Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the startIp and endIp parameters at /goform/SetPptpServerCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda of RX3 A vulnerability exists in firmware related to improper shutdown and release of resources.Service operation interruption (DoS) It may be in a state. Tenda RX3 is a dual-band WiFi 6 home wireless router from China's Tenda company. It is used for home network coverage and supports high-speed wireless connections. The vulnerability is caused by the startIp and endIp parameters in /goform/SetPptpServerCfg failing to correctly verify the length of the input data
VAR-202503-0471 CVE-2025-0813 Schneider Electric EcoStruxure Power Automation System User Interface Authorization Issue Vulnerability CVSS V2: 7.2
CVSS V3: 6.8
Severity: High
CWE-287: Improper Authentication vulnerability exists that could cause an Authentication Bypass when an unauthorized user without permission rights has physical access to the EPAS-UI computer and is able to reboot the workstation and interrupt the normal boot process. Schneider Electric EcoStruxure Power Automation System User Interface is a user interface software for power automation systems developed by Schneider Electric of France. It is used for operators to interact with power automation systems to improve operational efficiency. Schneider Electric EcoStruxure Power Automation System User Interface has an authorization vulnerability. The vulnerability is caused by improper authentication
VAR-202503-2006 CVE-2025-24070 CVSS V2: -
CVSS V3: 7.0
Severity: HIGH
Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network.
VAR-202503-0301 CVE-2025-27396 Siemens SCALANCE LPE9403 Privilege Escalation Vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly limit the elevation of privileges required to perform certain valid functionality. This could allow an authenticated lowly-privileged remote attacker to escalate their privileges. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing of Siemens, Germany. It is used to capture, collect and pre-process industrial field data. Siemens SCALANCE LPE9403 has a privilege escalation vulnerability. Attackers can exploit this vulnerability to elevate privileges
VAR-202503-0298 CVE-2025-27395 Siemens SCALANCE LPE9403 SFTP Function Path Traversal Vulnerability CVSS V2: 8.3
CVSS V3: 7.2
Severity: High
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly limit the scope of files accessible through and the privileges of the SFTP functionality. This could allow an authenticated highly-privileged remote attacker to read and write arbitrary files. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing from Siemens, Germany. It is used to capture, collect and pre-process industrial field data
VAR-202503-0300 CVE-2025-27394 Siemens SCALANCE LPE9403 Operating System Command Injection Vulnerability CVSS V2: 8.3
CVSS V3: 7.2
Severity: High
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly sanitize user input when creating new SNMP users. This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing from Siemens, Germany. It is used to capture, collect and pre-process industrial field data. SCALANCE LPE9403 (6GK5998-3GS00-2AC2) has an operating system command injection vulnerability
VAR-202503-0299 CVE-2025-27393 Siemens SCALANCE LPE9403 Operating System Command Injection Vulnerability (CNVD-2025-09962) CVSS V2: 8.3
CVSS V3: 7.2
Severity: High
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly sanitize user input when creating new users. This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing from Siemens, Germany. It is used to capture, collect and pre-process industrial field data. Siemens SCALANCE LPE9403 (6GK5998-3GS00-2AC2) has an operating system command injection vulnerability