VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202509-1455 CVE-2025-10322 WAVLINK  of  WL-WN578W2  Vulnerability related to password management function in firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability has been found in Wavlink WL-WN578W2 221110. The affected element is an unknown function of the file /sysinit.html. The manipulation of the argument newpass/confpass leads to weak password recovery. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 There is a vulnerability in the firmware related to the password management function.Information may be tampered with. The Wavlink WL-WN578W2 is a wireless repeater from the Chinese company Wavlink. The Wavlink WL-WN578W2 version 221110 contains an authorization vulnerability. This vulnerability stems from improper permission management for the newpass/confpass parameters in the /sysinit.html file
VAR-202509-1538 CVE-2025-10321 WAVLINK  of  WL-WN578W2  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is an unknown function of the file /live_online.shtml. Executing manipulation can lead to information disclosure. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 There are unspecified vulnerabilities in the firmware.Information may be obtained. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company. The Wavlink WL-WN578W2 version 221110 contains an access control vulnerability. This vulnerability stems from incorrect access control in the file /live_online.shtml. An attacker could exploit this vulnerability to leak information
VAR-202509-4027 No CVE GeoVision GV-EFD4700 has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The GeoVision GV-EFD4700 is a 4MP (4-megapixel) network camera. The GeoVision GV-EFD4700 has a weak password vulnerability that could allow attackers to log into the system and obtain sensitive information.
VAR-202509-4206 No CVE D-Link DI-8400 has a denial of service vulnerability CVSS V2: 3.8
CVSS V3: -
Severity: LOW
The DI-8400 is an enterprise-class router. The D-Link DI-8400 has a denial of service vulnerability that could be exploited by an attacker to cause a denial of service.
VAR-202509-4203 No CVE D-Link Electronic Equipment (Shanghai) Co., Ltd. DI-7003G has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
The DI-7003G is an enterprise-class router. The DI-7003G router from D-Link Electronics (Shanghai) Co., Ltd. has a command execution vulnerability that could allow an attacker to execute arbitrary commands.
VAR-202509-3042 CVE-2025-58321 Delta Electronics DIALink Directory Traversal Remote Code Execution Vulnerability CVSS V2: 10.0
CVSS V3: 10.0
Severity: CRITICAL
Delta Electronics DIALink has an Directory Traversal Authentication Bypass Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DIALink. Authentication is not required to exploit this vulnerability.The specific flaw exists within the DataCenter service, which listens on TCP port 7631 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Delta Electronics DIALink is an industrial automation communication gateway from Delta Electronics, a Chinese company
VAR-202509-3613 CVE-2025-58320 Delta Electronics, INC.  of  DIALink  Past traversal vulnerability in CVSS V2: 7.5
CVSS V3: 7.3
Severity: HIGH
Delta Electronics DIALink has an Directory Traversal Authentication Bypass Vulnerability. Delta Electronics, INC. of DIALink Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to overwrite configuration files on affected installations of Delta Electronics DIALink. Authentication is not required to exploit this vulnerability.The specific flaw exists within the web service, which listens on TCP port 7631 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations
VAR-202509-4087 No CVE Samsung (China) Investment Co., Ltd. Samsung C565FW has a command execution vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Samsung (China) Investment Co., Ltd. is a company primarily engaged in business services. A command execution vulnerability exists in Samsung (China) Investment Co., Ltd.'s Samsung C565FW devices, allowing attackers to execute commands.
VAR-202509-4205 No CVE NETGEAR Extender EAX14 has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The NETGEAR Extender EAX14 is a mesh network extender that supports WiFi 6 technology. The NETGEAR Extender EAX14 has an unauthorized access vulnerability that could allow an attacker to obtain sensitive information.
VAR-202509-4249 No CVE D-Link DSL-2890AL has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The D-Link DSL-2890AL is a unified service router. The D-Link DSL-2890AL has a weak password vulnerability that could allow attackers to log into the system and obtain sensitive information.
VAR-202509-4026 No CVE D-Link DI-8200 has a binary vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The DI-8200 is an enterprise-grade router. The D-Link DI-8200 has a binary vulnerability that could be exploited to cause a denial of service.
VAR-202509-4394 No CVE D-Link Electronic Equipment (Shanghai) Co., Ltd. DAP-1665 has a denial of service vulnerability CVSS V2: 3.8
CVSS V3: -
Severity: LOW
The DAP-1665 is an enterprise-class wireless access device. D-Link Electronics (Shanghai) Co., Ltd.'s DAP-1665 has a denial of service vulnerability that could be exploited by an attacker to cause a denial of service.
VAR-202509-3258 CVE-2025-55976 CVSS V2: -
CVSS V3: 8.4
Severity: HIGH
Intelbras IWR 3000N 1.9.8 exposes the Wi-Fi password in plaintext via the /api/wireless endpoint. Any unauthenticated user on the local network can directly obtain the Wi-Fi network password by querying this endpoint.
VAR-202509-1555 CVE-2025-57573 Shenzhen Tenda Technology Co.,Ltd.  of  F3  Classic buffer overflow vulnerability in firmware CVSS V2: 5.1
CVSS V3: 5.6
Severity: MEDIUM
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the wifiTimeClose parameter in goform/setWifi. Shenzhen Tenda Technology Co.,Ltd. of F3 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda F3 is a 300M wireless router launched by Shenzhen Jixiang Tengda Technology Co., Ltd. on May 15, 2015. This vulnerability stems from a failure in the goform/setWifi file to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
VAR-202509-1660 CVE-2025-57572 Shenzhen Tenda Technology Co.,Ltd.  of  F3  Classic buffer overflow vulnerability in firmware CVSS V2: 5.1
CVSS V3: 5.6
Severity: MEDIUM
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the onlineList parameter in goform/setParentControl. Shenzhen Tenda Technology Co.,Ltd. of F3 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda F3 is a 300M wireless router released by Shenzhen Jixiang Tengda Technology Co., Ltd. on May 15, 2015. The Tenda F3 suffers from a buffer overflow vulnerability caused by a failure in the goform/setParentControl function to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
VAR-202509-1544 CVE-2025-57571 Shenzhen Tenda Technology Co.,Ltd.  of  F3  Classic buffer overflow vulnerability in firmware CVSS V2: 5.1
CVSS V3: 5.6
Severity: MEDIUM
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow. via the macFilterList parameter in goform/setNAT. Shenzhen Tenda Technology Co.,Ltd. of F3 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda F3 is a 300M wireless router released by Shenzhen Jixiang Tengda Technology Co., Ltd. on May 15, 2015. This vulnerability stems from the failure of the macFilterList parameter in the goform/setNAT file to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
VAR-202509-1609 CVE-2025-57570 Shenzhen Tenda Technology Co.,Ltd.  of  F3  Classic buffer overflow vulnerability in firmware CVSS V2: 5.1
CVSS V3: 5.6
Severity: MEDIUM
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the QosList parameter in goform/setQoS. Shenzhen Tenda Technology Co.,Ltd. of F3 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda F3 is a 300M wireless router released by Shenzhen Jixiang Tengda Technology Co., Ltd. on May 15, 2015. This vulnerability stems from the failure of the QosList parameter in the goform/setQoS file to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
VAR-202509-1556 CVE-2025-57569 Shenzhen Tenda Technology Co.,Ltd.  of  F3  Classic buffer overflow vulnerability in firmware CVSS V2: 5.1
CVSS V3: 5.6
Severity: MEDIUM
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the portList parameter in /goform/setNAT. Shenzhen Tenda Technology Co.,Ltd. of F3 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda F3 is a 300M wireless router launched by Shenzhen Jixiang Tengda Technology Co., Ltd. on May 15, 2015. This vulnerability stems from a failure to properly validate the length of input data in the portList parameter in the /goform/setNAT file. An attacker could exploit this vulnerability to cause a denial of service
VAR-202509-4150 No CVE Moxa EDR-G902 has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The EDR-G902 is a high-performance, industrial-grade VPN security router. The Moxa EDR-G902 has a weak password vulnerability that could allow attackers to log into the system and obtain sensitive information.
VAR-202509-0593 CVE-2025-57060 Shenzhen Tenda Technology Co.,Ltd.  of  G3  Stack-based buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the rules parameter in the dns_forward_rule_store function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of G3 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda G3 is a QoS VPN router from the Chinese company Tenda. This vulnerability stems from the failure of the "rules" parameter in the dns_forward_rule_store function to properly validate the length of input data