VARIoT IoT vulnerabilities database
| VAR-202505-1677 | CVE-2025-4733 | TOTOLINK of A3002R firmware and A3002RU Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability, which was classified as critical, has been found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. This issue affects some unknown processing of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation of the argument mac leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A3002R firmware and A3002RU The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R and A3002RU are routers produced by TOTOLINK, supporting multiple network functions and services. No detailed vulnerability details are currently available
| VAR-202505-1746 | CVE-2025-4732 | TOTOLINK of A3002R firmware and A3002RU Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability classified as critical was found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. This vulnerability affects unknown code of the file /boafrm/formFilter of the component HTTP POST Request Handler. The manipulation of the argument ip6addr leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A3002R firmware and A3002RU The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R and A3002RU are two high-performance dual-band wireless routers. The vulnerability is related to /boafrm/formFilter and is caused by the failure to properly validate the ip6addr parameter entered by the user. An attacker can exploit this vulnerability to execute arbitrary code
| VAR-202505-1655 | CVE-2025-4731 | TOTOLINK of A3002R firmware and A3002RU Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability classified as critical has been found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. This affects an unknown part of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type/ip_subnet leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A3002R firmware and A3002RU The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R and A3002RU are routers produced by TOTOLINK, supporting multiple network functions and services. No detailed vulnerability details are currently provided
| VAR-202505-1723 | CVE-2025-4730 | TOTOLINK of A3002R firmware and A3002RU Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. It has been rated as critical. Affected by this issue is some unknown functionality of the file /boafrm/formMapDel of the component HTTP POST Request Handler. The manipulation of the argument devicemac1 leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A3002R firmware and A3002RU The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R and A3002RU are wireless router products under the TOTOLINK brand, supporting multiple network functions and services. No detailed vulnerability details are currently provided
| VAR-202505-1630 | CVE-2025-4729 | TOTOLINK of A3002R firmware and A3002RU Injection Vulnerability in Firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Medium |
A vulnerability was found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formMapDelDevice of the component HTTP POST Request Handler. The manipulation of the argument macstr leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A3002R firmware and A3002RU The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R and A3002RU are routers produced by TOTOLINK, supporting multiple network functions and services. No detailed vulnerability details are currently provided
| VAR-202505-2569 | CVE-2025-20103 | Intel Processors Denial of Service Vulnerability |
CVSS V2: 4.6 CVSS V3: 6.5 Severity: Medium |
Insufficient resource pool in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access. Intel Processors are a family of processors manufactured by Intel Corporation, covering a wide range of applications, including laptops, desktops, workstations, and servers, offering performance support from basic to professional levels. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202505-3508 | CVE-2025-20100 | Intel Xeon 6 Processor Improper Access Control Vulnerability |
CVSS V2: 5.9 CVSS V3: 7.5 Severity: High |
Improper access control in the memory controller configurations for some Intel(R) Xeon(R) 6 processor with E-cores may allow a privileged user to potentially enable escalation of privilege via local access. The Intel Xeon 6 Processor is Intel's next-generation server processor, primarily targeted at data centers, artificial intelligence (AI), and high-performance computing (HPC)
| VAR-202505-3509 | CVE-2025-20054 | Intel Processors Denial of Service Vulnerability (CNVD-2025-21345) |
CVSS V2: 4.6 CVSS V3: 6.5 Severity: Medium |
Uncaught exception in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access. Intel Processors are a family of processors manufactured by Intel Corporation, covering a wide range of applications, including laptops, desktops, workstations, and servers, offering performance support from basic to professional levels. An attacker could exploit this vulnerability to cause a denial of service attack
| VAR-202505-3510 | CVE-2025-20004 | Intel Xeon 6 Processor Privilege Escalation Vulnerability |
CVSS V2: 5.3 CVSS V3: 7.2 Severity: High |
Insufficient control flow management in the Alias Checking Trusted Module for some Intel(R) Xeon(R) 6 processor E-Cores firmware may allow a privileged user to potentially enable escalation of privilege via local access. The Intel Xeon 6 Processor is Intel's next-generation server processor, primarily targeted at data centers, artificial intelligence (AI), and high-performance computing (HPC). Detailed vulnerability details are currently unavailable
| VAR-202505-1674 | CVE-2024-45332 | Intel Processors Information Disclosure Vulnerability |
CVSS V2: 3.8 CVSS V3: 5.6 Severity: Medium |
Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel Processors are a family of processors manufactured by Intel Corporation, covering a wide range of applications, including laptops, desktops, workstations, and servers, offering performance support from basic to professional levels.
An information disclosure vulnerability exists in Intel Processors. An attacker could exploit this vulnerability to cause local information disclosure
| VAR-202505-2931 | CVE-2024-43420 | Intel Atom Processors Information Disclosure Vulnerability |
CVSS V2: 3.8 CVSS V3: 5.6 Severity: Medium |
Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom(R) processors may allow an authenticated user to potentially enable information disclosure via local access. Intel Atom Processors are a family of low-power processors designed for edge computing and networking applications. They are designed for devices that prioritize battery life and compact size over raw processing performance.
Intel Atom Processors contain an information disclosure vulnerability. An attacker can exploit this vulnerability to cause local information disclosure
| VAR-202505-2167 | CVE-2025-45863 | TOTOLINK of A3002R Classic buffer overflow vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the macstr parameter in the formMapDelDevice interface. TOTOLINK of A3002R Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the macstr parameter in the formMapDelDevice interface failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202505-1719 | CVE-2025-45865 | TOTOLINK of A3002R Classic buffer overflow vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the dnsaddr parameter in the formDhcpv6s interface. TOTOLINK of A3002R Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the failure of the dnsaddr parameter in the formDhcpv6s interface to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202505-1687 | CVE-2025-45861 | TOTOLINK of A3002R Classic buffer overflow vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the routername parameter in the formDnsv6 interface. TOTOLINK of A3002R Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the failure of the routername parameter in the formDnsv6 interface to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202505-2166 | CVE-2025-45858 | TOTOLINK of A3002R in the firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a command injection vulnerability via the FUN_00459fdc function. TOTOLINK of A3002R The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R is a wireless router produced by China's TOTOLINK Electronics. Attackers can exploit this vulnerability to execute arbitrary commands
| VAR-202505-2212 | CVE-2025-45867 | TOTOLINK of A3002R Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 4.8 CVSS V3: 5.4 Severity: MEDIUM |
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the static_dns1 parameter in the formIpv6Setup interface. TOTOLINK of A3002R A stack-based buffer overflow vulnerability exists in the firmware.Information may be obtained and information may be tampered with. TOTOLINK A3002R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the static_dns1 parameter in the formIpv6Setup interface failing to correctly verify the length of the input data. No detailed vulnerability details are currently available
| VAR-202505-2329 | CVE-2025-45866 | TOTOLINK of A3002R Classic buffer overflow vulnerability in firmware |
CVSS V2: 4.8 CVSS V3: 5.4 Severity: MEDIUM |
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the addrPoolEnd parameter in the formDhcpv6s interface. TOTOLINK A3002R is a wireless router from China's TOTOLINK Electronics. The vulnerability is caused by the addrPoolEnd parameter in the formDhcpv6s interface failing to correctly verify the length of the input data. No detailed vulnerability details are currently available
| VAR-202505-2316 | CVE-2025-45864 | TOTOLINK of A3002R Classic buffer overflow vulnerability in firmware |
CVSS V2: 4.8 CVSS V3: 5.4 Severity: MEDIUM |
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the addrPoolStart parameter in the formDhcpv6s interface. TOTOLINK A3002R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the addrPoolStart parameter in the formDhcpv6s interface failing to correctly verify the length of the input data. No detailed vulnerability details are currently available
| VAR-202505-2211 | CVE-2025-45859 | TOTOLINK of A3002R Classic buffer overflow vulnerability in firmware |
CVSS V2: 4.8 CVSS V3: 5.4 Severity: MEDIUM |
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the bandstr parameter in the formMapDelDevice interface. TOTOLINK A3002R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the failure of the bandstr parameter in the formMapDelDevice interface to correctly verify the length of the input data. No detailed vulnerability details are currently provided
| VAR-202505-1884 | CVE-2025-32756 | Stack-based buffer overflow vulnerability in multiple Fortinet products |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiVoice versions 7.2.0, 7.0.0 through 7.0.6, 6.4.0 through 6.4.10, FortiRecorder versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.5, 6.4.0 through 6.4.5, FortiMail versions 7.6.0 through 7.6.2, 7.4.0 through 7.4.4, 7.2.0 through 7.2.7, 7.0.0 through 7.0.8, FortiNDR versions 7.6.0, 7.4.0 through 7.4.7, 7.2.0 through 7.2.4, 7.0.0 through 7.0.6, FortiCamera versions 2.1.0 through 2.1.3, 2.0 all versions, 1.1 all versions, allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookie. FortiMail , FortiNDR , FortiRecorder Multiple Fortinet products, including firmware, contain stack-based buffer overflow vulnerabilities and out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state