VARIoT IoT vulnerabilities database
| VAR-202509-1455 | CVE-2025-10322 | WAVLINK of WL-WN578W2 Vulnerability related to password management function in firmware |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: Medium |
A vulnerability has been found in Wavlink WL-WN578W2 221110. The affected element is an unknown function of the file /sysinit.html. The manipulation of the argument newpass/confpass leads to weak password recovery. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 There is a vulnerability in the firmware related to the password management function.Information may be tampered with. The Wavlink WL-WN578W2 is a wireless repeater from the Chinese company Wavlink.
The Wavlink WL-WN578W2 version 221110 contains an authorization vulnerability. This vulnerability stems from improper permission management for the newpass/confpass parameters in the /sysinit.html file
| VAR-202509-1538 | CVE-2025-10321 | WAVLINK of WL-WN578W2 Firmware vulnerabilities |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: Medium |
A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is an unknown function of the file /live_online.shtml. Executing manipulation can lead to information disclosure. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. WAVLINK of WL-WN578W2 There are unspecified vulnerabilities in the firmware.Information may be obtained. The Wavlink WL-WN578W2 is a wireless repeater manufactured by Wavlink, a Chinese company.
The Wavlink WL-WN578W2 version 221110 contains an access control vulnerability. This vulnerability stems from incorrect access control in the file /live_online.shtml. An attacker could exploit this vulnerability to leak information
| VAR-202509-4027 | No CVE | GeoVision GV-EFD4700 has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The GeoVision GV-EFD4700 is a 4MP (4-megapixel) network camera.
The GeoVision GV-EFD4700 has a weak password vulnerability that could allow attackers to log into the system and obtain sensitive information.
| VAR-202509-4206 | No CVE | D-Link DI-8400 has a denial of service vulnerability |
CVSS V2: 3.8 CVSS V3: - Severity: LOW |
The DI-8400 is an enterprise-class router.
The D-Link DI-8400 has a denial of service vulnerability that could be exploited by an attacker to cause a denial of service.
| VAR-202509-4203 | No CVE | D-Link Electronic Equipment (Shanghai) Co., Ltd. DI-7003G has a command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The DI-7003G is an enterprise-class router.
The DI-7003G router from D-Link Electronics (Shanghai) Co., Ltd. has a command execution vulnerability that could allow an attacker to execute arbitrary commands.
| VAR-202509-3042 | CVE-2025-58321 | Delta Electronics DIALink Directory Traversal Remote Code Execution Vulnerability |
CVSS V2: 10.0 CVSS V3: 10.0 Severity: CRITICAL |
Delta Electronics DIALink has an Directory Traversal Authentication Bypass Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DIALink. Authentication is not required to exploit this vulnerability.The specific flaw exists within the DataCenter service, which listens on TCP port 7631 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Delta Electronics DIALink is an industrial automation communication gateway from Delta Electronics, a Chinese company
| VAR-202509-3613 | CVE-2025-58320 | Delta Electronics, INC. of DIALink Past traversal vulnerability in |
CVSS V2: 7.5 CVSS V3: 7.3 Severity: HIGH |
Delta Electronics DIALink has an Directory Traversal Authentication Bypass Vulnerability. Delta Electronics, INC. of DIALink Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to overwrite configuration files on affected installations of Delta Electronics DIALink. Authentication is not required to exploit this vulnerability.The specific flaw exists within the web service, which listens on TCP port 7631 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations
| VAR-202509-4087 | No CVE | Samsung (China) Investment Co., Ltd. Samsung C565FW has a command execution vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Samsung (China) Investment Co., Ltd. is a company primarily engaged in business services.
A command execution vulnerability exists in Samsung (China) Investment Co., Ltd.'s Samsung C565FW devices, allowing attackers to execute commands.
| VAR-202509-4205 | No CVE | NETGEAR Extender EAX14 has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The NETGEAR Extender EAX14 is a mesh network extender that supports WiFi 6 technology.
The NETGEAR Extender EAX14 has an unauthorized access vulnerability that could allow an attacker to obtain sensitive information.
| VAR-202509-4249 | No CVE | D-Link DSL-2890AL has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The D-Link DSL-2890AL is a unified service router.
The D-Link DSL-2890AL has a weak password vulnerability that could allow attackers to log into the system and obtain sensitive information.
| VAR-202509-4026 | No CVE | D-Link DI-8200 has a binary vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The DI-8200 is an enterprise-grade router.
The D-Link DI-8200 has a binary vulnerability that could be exploited to cause a denial of service.
| VAR-202509-4394 | No CVE | D-Link Electronic Equipment (Shanghai) Co., Ltd. DAP-1665 has a denial of service vulnerability |
CVSS V2: 3.8 CVSS V3: - Severity: LOW |
The DAP-1665 is an enterprise-class wireless access device.
D-Link Electronics (Shanghai) Co., Ltd.'s DAP-1665 has a denial of service vulnerability that could be exploited by an attacker to cause a denial of service.
| VAR-202509-3258 | CVE-2025-55976 |
CVSS V2: - CVSS V3: 8.4 Severity: HIGH |
Intelbras IWR 3000N 1.9.8 exposes the Wi-Fi password in plaintext via the /api/wireless endpoint. Any unauthenticated user on the local network can directly obtain the Wi-Fi network password by querying this endpoint.
| VAR-202509-1555 | CVE-2025-57573 | Shenzhen Tenda Technology Co.,Ltd. of F3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 5.1 CVSS V3: 5.6 Severity: MEDIUM |
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the wifiTimeClose parameter in goform/setWifi. Shenzhen Tenda Technology Co.,Ltd. of F3 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda F3 is a 300M wireless router launched by Shenzhen Jixiang Tengda Technology Co., Ltd. on May 15, 2015. This vulnerability stems from a failure in the goform/setWifi file to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202509-1660 | CVE-2025-57572 | Shenzhen Tenda Technology Co.,Ltd. of F3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 5.1 CVSS V3: 5.6 Severity: MEDIUM |
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the onlineList parameter in goform/setParentControl. Shenzhen Tenda Technology Co.,Ltd. of F3 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda F3 is a 300M wireless router released by Shenzhen Jixiang Tengda Technology Co., Ltd. on May 15, 2015.
The Tenda F3 suffers from a buffer overflow vulnerability caused by a failure in the goform/setParentControl function to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202509-1544 | CVE-2025-57571 | Shenzhen Tenda Technology Co.,Ltd. of F3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 5.1 CVSS V3: 5.6 Severity: MEDIUM |
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow. via the macFilterList parameter in goform/setNAT. Shenzhen Tenda Technology Co.,Ltd. of F3 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda F3 is a 300M wireless router released by Shenzhen Jixiang Tengda Technology Co., Ltd. on May 15, 2015. This vulnerability stems from the failure of the macFilterList parameter in the goform/setNAT file to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202509-1609 | CVE-2025-57570 | Shenzhen Tenda Technology Co.,Ltd. of F3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 5.1 CVSS V3: 5.6 Severity: MEDIUM |
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the QosList parameter in goform/setQoS. Shenzhen Tenda Technology Co.,Ltd. of F3 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda F3 is a 300M wireless router released by Shenzhen Jixiang Tengda Technology Co., Ltd. on May 15, 2015. This vulnerability stems from the failure of the QosList parameter in the goform/setQoS file to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202509-1556 | CVE-2025-57569 | Shenzhen Tenda Technology Co.,Ltd. of F3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 5.1 CVSS V3: 5.6 Severity: MEDIUM |
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the portList parameter in /goform/setNAT. Shenzhen Tenda Technology Co.,Ltd. of F3 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda F3 is a 300M wireless router launched by Shenzhen Jixiang Tengda Technology Co., Ltd. on May 15, 2015. This vulnerability stems from a failure to properly validate the length of input data in the portList parameter in the /goform/setNAT file. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202509-4150 | No CVE | Moxa EDR-G902 has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The EDR-G902 is a high-performance, industrial-grade VPN security router.
The Moxa EDR-G902 has a weak password vulnerability that could allow attackers to log into the system and obtain sensitive information.
| VAR-202509-0593 | CVE-2025-57060 | Shenzhen Tenda Technology Co.,Ltd. of G3 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the rules parameter in the dns_forward_rule_store function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of G3 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda G3 is a QoS VPN router from the Chinese company Tenda. This vulnerability stems from the failure of the "rules" parameter in the dns_forward_rule_store function to properly validate the length of input data