VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202502-1624 CVE-2024-46429 Shenzhen Tenda Technology Co.,Ltd.  of  w18e  Vulnerability related to use of hardcoded credentials in firmware CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
A hardcoded credentials vulnerability in Tenda W18E V16.01.0.8(1625) allows unauthenticated remote attackers to access the web management portal using a default guest account with administrative privileges. Shenzhen Tenda Technology Co.,Ltd. of w18e A vulnerability exists in the firmware regarding the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202502-2088 No CVE HP OfficeJet Pro 9010 has information disclosure vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
HP China Ltd. is an enterprise mainly engaged in scientific research and technical services. HP China Ltd. HP officeJet Pro 9010 has an information leakage vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202502-2687 No CVE Shenzhen Jixiang Tenda Technology Co., Ltd. Tenda router AC8v4 has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Shenzhen Jixiang Tenda Technology Co., Ltd. (Tenda) is a high-tech enterprise specializing in the research and development, production, sales and service of network communication equipment. Shenzhen Jixiang Tenda Technology Co., Ltd. Tenda router AC8v4 has a binary vulnerability that can be exploited by attackers to cause denial of service.
VAR-202502-2089 No CVE Beijing Trendwell Network Technology Co., Ltd. TEW-639GR has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
TEW-639GR is a wireless router. Beijing Trendwell Network Technology Co., Ltd. TEW-639GR has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202502-2292 No CVE Netis Technology Co., Ltd. Netis WF2411 router has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Netis Technology Co., Ltd. is a high-tech enterprise focusing on the research, development, production and sales of data communication network equipment. Netis Technology Co., Ltd.'s Netis WF2411 router has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202502-2293 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. Tenda AC10 router has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise specializing in the research and development, production, sales and service of network communication equipment. Shenzhen Jixiang Tengda Technology Co., Ltd. Tenda AC10 router has a binary vulnerability that can be exploited by attackers to cause denial of service.
VAR-202502-2480 No CVE Hangzhou Hikvision Digital Technology Co., Ltd. HIK-WiFi has an information leakage vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Hangzhou Hikvision Digital Technology Co., Ltd. (Hikvision) is a technology company focusing on technological innovation and intelligent IoT. Hangzhou Hikvision Digital Technology Co., Ltd. HIK-WiFi has an information leakage vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202502-3427 No CVE Netis Technology Co., Ltd. Netis WF2411 router has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Netis Technology Co., Ltd. is a high-tech enterprise focusing on the research, development, production and sales of data communication network equipment. Netis Technology Co., Ltd.'s Netis WF2411 router has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202502-3428 No CVE Mitsubishi Electric Automation (China) Co., Ltd. PLC FX5U-64MR/ES has a denial of service vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Mitsubishi Electric Automation (China) Co., Ltd. is a company mainly engaged in loading, unloading, handling and warehousing. Mitsubishi Electric Automation (China) Co., Ltd. PLC FX5U-64MR/ES has a denial of service vulnerability, which can be exploited by attackers to cause denial of service.
VAR-202502-2481 No CVE Netis Technology Co., Ltd. Netis WF2210 router has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Netis Technology Co., Ltd. is a high-tech enterprise focusing on the research, development, production and sales of data communication network equipment. Netis Technology Co., Ltd.'s Netis WF2210 router has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202502-0092 CVE-2025-1104 D-Link Systems, Inc.  of  dhp-w310av  Authentication vulnerability in firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability has been found in D-Link DHP-W310AV 1.04 and classified as critical. This vulnerability affects unknown code. The manipulation leads to authentication bypass by spoofing. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of dhp-w310av The firmware contains vulnerabilities related to authentication and vulnerabilities related to authentication evasion through spoofing.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DHP-W310AV is a popular router device
VAR-202502-0157 CVE-2025-1103 D-Link Systems, Inc.  of  DIR-823X  in the firmware  NULL  Pointer dereference vulnerability CVSS V2: 6.8
CVSS V3: 6.5
Severity: High
A vulnerability, which was classified as problematic, was found in D-Link DIR-823X 240126/240802. This affects the function set_wifi_blacklists of the file /goform/set_wifi_blacklists of the component HTTP POST Request Handler. The manipulation of the argument macList leads to null pointer dereference. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-823X The firmware has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. D-Link DIR-823X is a wireless router of D-Link, a Chinese company. No detailed vulnerability details are currently provided
VAR-202502-0854 CVE-2025-22880 Delta Electronics CNCSoft-G2 DPAX File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics CNCSoft-G2. Delta Electronics CNCSoft-G2 is a human-machine interface (HMI) software from Delta Electronics, a Chinese company
VAR-202502-2090 No CVE The TOTOLINK N200RE router of Jiong Electronics (Shenzhen) Co., Ltd. has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Jiong Electronics (Shenzhen) Co., Ltd. is a high-tech foreign-invested enterprise specializing in the research and development, design, manufacturing and sales of various network products. Jiong Electronics (Shenzhen) Co., Ltd.'s TOTOLINK N200RE router has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202502-2688 No CVE Ricoh (China) Investment Co., Ltd. Aficio SP 3500SF has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Aficio SP 3500SF is a multi-function commercial all-in-one printer with printing, copying, scanning and faxing functions. Ricoh (China) Investment Co., Ltd. Aficio SP 3500SF has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202502-2482 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR2100G-E has an information leakage vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Beijing Xingwang Ruijie Network Technology Co., Ltd. is a provider of ICT infrastructure and industry solutions. Its main business is the research, design and sales of network equipment, network security products and cloud desktop solutions. Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR2100G-E has an information leakage vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202502-2294 No CVE Shenzhen Bilian Electronics Co., Ltd. BL-X-PRO has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
BL-X-PRO is a six-line six-signal high-power Gigabit wireless router. BL-X-PRO of Shenzhen Bilian Electronics Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202502-3429 No CVE Wuxi Xinjie Electric Co., Ltd. Xinjie XSF5-A32 PLC has industrial control equipment vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Wuxi Xinjie Electric Co., Ltd. is a listed company that focuses on the research and development and application of industrial automation products. Wuxi Xinjie Electric Co., Ltd.'s Xinjie XSF5-A32 PLC has an industrial control equipment vulnerability that attackers can exploit to cause a denial of service.
VAR-202502-1472 CVE-2024-57673 Project Floodlight  of  Floodlight  Resource exhaustion vulnerability in CVSS V2: -
CVSS V3: 5.5
Severity: MEDIUM
An issue in floodlight v1.2 allows a local attacker to cause a denial of service via the Topology Manager module and Linkdiscovery module. Project Floodlight of Floodlight Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202502-1321 CVE-2024-57672 Project Floodlight  of  Floodlight  Resource exhaustion vulnerability in CVSS V2: -
CVSS V3: 5.5
Severity: MEDIUM
An issue in floodlight v1.2 allows a local attacker to cause a denial of service via the Topology Manager module, Topologylnstance module, Routing module. Project Floodlight of Floodlight Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state