VARIoT IoT vulnerabilities database
| VAR-202510-3385 | CVE-2025-12553 | An undiscovered vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29076). |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Email Server Certificate Verification Disabled.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a security vulnerability stemming from the disabling of email server certificate verification. Attackers could exploit this vulnerability to launch a man-in-the-middle attack
| VAR-202510-3993 | CVE-2025-12552 | An unidentified vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29072). |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Insufficient Password Policy.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a security vulnerability stemming from insufficient password policies. Detailed vulnerability information is not currently available
| VAR-202510-2153 | CVE-2025-62232 |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Sensitive data exposure via logging in basic-auth leads to plaintext usernames and passwords written to error logs and forwarded to log sinks when log level is INFO/DEBUG. This creates a high risk of credential compromise through log access.
It has been fixed in the following commit: https://github.com/apache/apisix/pull/12629
Users are recommended to upgrade to version 3.14, which fixes this issue.
| VAR-202510-2085 | CVE-2025-61498 | Tenda AC8 buffer overflow vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A buffer overflow in the UPnP service of Tenda AC8 Hardware v03.03.10.01 allows attackers to cause a Denial of Service (DoS) via supplying a crafted packet. The Tenda AC8 is a wireless router manufactured by Tenda, a Chinese company.
The Tenda AC8 Hardware version v03.03.10.01 contains a buffer overflow vulnerability. This vulnerability stems from a boundary error in the UPnP service when processing untrusted input. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
| VAR-202510-2077 | CVE-2025-46363 | Dell Secure Connect Gateway relative path traversal vulnerability |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
Dell Secure Connect Gateway (SCG) 5.0 Application and Appliance version(s) 5.26.00.00 - 5.30.00.00, contain a Relative Path Traversal vulnerability in the SCG exposed for an internal collection download REST API (if this REST API is enabled by Admin user from UI). A low privileged attacker with remote access could potentially exploit this vulnerability, leading to allowing relative path traversal to restricted resources. Dell Secure Connect Gateway is an enterprise-grade secure connectivity gateway device from Dell, primarily used to monitor hardware status, automatically create support requests, and ensure secure communication between devices and Dell backend services
| VAR-202510-3184 | CVE-2025-12517 | An unidentified vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29075). |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Credits Page not Matching Versions in Use in the FirmwareThis issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a security vulnerability stemming from a firmware version mismatch. Detailed vulnerability information is not currently available
| VAR-202510-2768 | CVE-2025-12516 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 Denial-of-Service Vulnerabilities (CNVD-2025-29073) |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Lack of Graceful Error Handling - HTTP 5xx ErrorThis issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a denial-of-service vulnerability stemming from a lack of graceful error handling
| VAR-202510-4097 | CVE-2025-12515 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 Denial-of-Service Vulnerabilities (CNVD-2025-29074) |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Systemic Internal Server Errors - HTTP 500 ResponseThis issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a denial-of-service vulnerability stemming from an internal server error. An attacker could exploit this vulnerability to cause an HTTP 500 response
| VAR-202510-4199 | CVE-2025-12479 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 Cross-Site Request Forgery Vulnerabilities |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: HIGH |
Systemic Lack of Cross-Site Request Forgery (CSRF) Token Implementation.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a cross-site request forgery (XPS) vulnerability caused by improper validation of user-provided input. An attacker could exploit this vulnerability to perform unauthorized actions by sending malformed HTTP requests
| VAR-202510-3387 | CVE-2025-12478 | An unidentified vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29079). |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Non-Compliant TLS Configuration.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a security vulnerability stemming from non-compliant TLS configuration. Detailed vulnerability information is not currently available
| VAR-202510-3717 | CVE-2025-12477 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 information disclosure vulnerabilities |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Server Version Disclosure.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain an information disclosure vulnerability caused by incorrect authentication. Attackers could exploit this vulnerability to obtain server version information
| VAR-202510-4098 | CVE-2025-12476 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 information disclosure vulnerabilities (CNVD-2025-29078) |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Resource Lacking AuthN.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a security vulnerability stemming from a lack of authentication. Attackers could exploit this vulnerability to obtain sensitive information
| VAR-202510-4200 | CVE-2025-12425 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 privilege escalation vulnerabilities |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
Local Privilege Escalation.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a privilege escalation vulnerability caused by improper privilege management. An attacker could exploit this vulnerability to achieve local privilege escalation
| VAR-202510-3388 | CVE-2025-12424 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 privilege escalation vulnerabilities (CNVD-2025-29084) |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Privilege Escalation through SUID-bit Binary.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a privilege escalation vulnerability caused by improper privilege management in the SUID bit binary. An attacker could exploit this vulnerability to gain elevated privileges on the system
| VAR-202510-3902 | CVE-2025-12423 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 Denial-of-Service Vulnerabilities (CNVD-2025-29082) |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Protocol manipulation might lead to denial of service.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a denial-of-service vulnerability caused by an uncaught exception during protocol operation. An attacker could exploit this vulnerability to cause a denial-of-service attack
| VAR-202510-4375 | CVE-2025-12422 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 privilege escalation vulnerabilities (CNVD-2025-29083) |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Vulnerable Upgrade Feature (Arbitrary File Write) may lead to obtaining super user permissions on board.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a privilege escalation vulnerability caused by an arbitrary file write flaw in the escalation feature. An attacker could exploit this vulnerability to gain escalated privileges on the system
| VAR-202510-2217 | CVE-2025-12322 | Tenda CH22 buffer overflow vulnerability fromNatStaticSetting function |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A flaw has been found in Tenda CH22 1.0.0.1. Affected by this issue is the function fromNatStaticSetting of the file /goform/NatStaticSetting. Executing manipulation of the argument page can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company.
Version 1.0.0.1 of the Tenda CH22 contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `page` parameter of the function `fromNatStaticSetting` in the file `/goform/NatStaticSetting` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
| VAR-202510-2966 | CVE-2025-12365 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 information disclosure vulnerabilities (CNVD-2025-29150) |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Error Messages Wrapped In HTTP Header.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain an information disclosure vulnerability caused by an error message wrapped in the HTTP header. An attacker could exploit this vulnerability to obtain sensitive information
| VAR-202510-4374 | CVE-2025-12364 | An unidentified vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29151). |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Weak Password Policy.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a security vulnerability stemming from a weak password policy. Detailed vulnerability information is not currently available
| VAR-202510-3719 | CVE-2025-12363 | Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 information disclosure vulnerabilities (CNVD-2025-29149) |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Email Password Disclosure.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company.
Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain an information disclosure vulnerability caused by improper authorization verification. An attacker could exploit this vulnerability to obtain email password information