VARIoT IoT vulnerabilities database

VAR-202502-1624 | CVE-2024-46429 | Shenzhen Tenda Technology Co.,Ltd. of w18e Vulnerability related to use of hardcoded credentials in firmware |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
A hardcoded credentials vulnerability in Tenda W18E V16.01.0.8(1625) allows unauthenticated remote attackers to access the web management portal using a default guest account with administrative privileges. Shenzhen Tenda Technology Co.,Ltd. of w18e A vulnerability exists in the firmware regarding the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202502-2088 | No CVE | HP OfficeJet Pro 9010 has information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
HP China Ltd. is an enterprise mainly engaged in scientific research and technical services.
HP China Ltd. HP officeJet Pro 9010 has an information leakage vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202502-2687 | No CVE | Shenzhen Jixiang Tenda Technology Co., Ltd. Tenda router AC8v4 has a binary vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Shenzhen Jixiang Tenda Technology Co., Ltd. (Tenda) is a high-tech enterprise specializing in the research and development, production, sales and service of network communication equipment.
Shenzhen Jixiang Tenda Technology Co., Ltd. Tenda router AC8v4 has a binary vulnerability that can be exploited by attackers to cause denial of service.
VAR-202502-2089 | No CVE | Beijing Trendwell Network Technology Co., Ltd. TEW-639GR has a command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
TEW-639GR is a wireless router.
Beijing Trendwell Network Technology Co., Ltd. TEW-639GR has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202502-2292 | No CVE | Netis Technology Co., Ltd. Netis WF2411 router has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Netis Technology Co., Ltd. is a high-tech enterprise focusing on the research, development, production and sales of data communication network equipment.
Netis Technology Co., Ltd.'s Netis WF2411 router has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202502-2293 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. Tenda AC10 router has a binary vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise specializing in the research and development, production, sales and service of network communication equipment.
Shenzhen Jixiang Tengda Technology Co., Ltd. Tenda AC10 router has a binary vulnerability that can be exploited by attackers to cause denial of service.
VAR-202502-2480 | No CVE | Hangzhou Hikvision Digital Technology Co., Ltd. HIK-WiFi has an information leakage vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Hangzhou Hikvision Digital Technology Co., Ltd. (Hikvision) is a technology company focusing on technological innovation and intelligent IoT.
Hangzhou Hikvision Digital Technology Co., Ltd. HIK-WiFi has an information leakage vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202502-3427 | No CVE | Netis Technology Co., Ltd. Netis WF2411 router has a binary vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Netis Technology Co., Ltd. is a high-tech enterprise focusing on the research, development, production and sales of data communication network equipment.
Netis Technology Co., Ltd.'s Netis WF2411 router has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202502-3428 | No CVE | Mitsubishi Electric Automation (China) Co., Ltd. PLC FX5U-64MR/ES has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Mitsubishi Electric Automation (China) Co., Ltd. is a company mainly engaged in loading, unloading, handling and warehousing.
Mitsubishi Electric Automation (China) Co., Ltd. PLC FX5U-64MR/ES has a denial of service vulnerability, which can be exploited by attackers to cause denial of service.
VAR-202502-2481 | No CVE | Netis Technology Co., Ltd. Netis WF2210 router has a command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Netis Technology Co., Ltd. is a high-tech enterprise focusing on the research, development, production and sales of data communication network equipment.
Netis Technology Co., Ltd.'s Netis WF2210 router has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202502-0092 | CVE-2025-1104 | D-Link Systems, Inc. of dhp-w310av Authentication vulnerability in firmware |
CVSS V2: 7.5 CVSS V3: 7.3 Severity: Medium |
A vulnerability has been found in D-Link DHP-W310AV 1.04 and classified as critical. This vulnerability affects unknown code. The manipulation leads to authentication bypass by spoofing. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of dhp-w310av The firmware contains vulnerabilities related to authentication and vulnerabilities related to authentication evasion through spoofing.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DHP-W310AV is a popular router device
VAR-202502-0157 | CVE-2025-1103 | D-Link Systems, Inc. of DIR-823X in the firmware NULL Pointer dereference vulnerability |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: High |
A vulnerability, which was classified as problematic, was found in D-Link DIR-823X 240126/240802. This affects the function set_wifi_blacklists of the file /goform/set_wifi_blacklists of the component HTTP POST Request Handler. The manipulation of the argument macList leads to null pointer dereference. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of DIR-823X The firmware has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. D-Link DIR-823X is a wireless router of D-Link, a Chinese company. No detailed vulnerability details are currently provided
VAR-202502-0854 | CVE-2025-22880 | Delta Electronics CNCSoft-G2 DPAX File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics CNCSoft-G2. Delta Electronics CNCSoft-G2 is a human-machine interface (HMI) software from Delta Electronics, a Chinese company
VAR-202502-2090 | No CVE | The TOTOLINK N200RE router of Jiong Electronics (Shenzhen) Co., Ltd. has a command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Jiong Electronics (Shenzhen) Co., Ltd. is a high-tech foreign-invested enterprise specializing in the research and development, design, manufacturing and sales of various network products.
Jiong Electronics (Shenzhen) Co., Ltd.'s TOTOLINK N200RE router has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202502-2688 | No CVE | Ricoh (China) Investment Co., Ltd. Aficio SP 3500SF has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Aficio SP 3500SF is a multi-function commercial all-in-one printer with printing, copying, scanning and faxing functions.
Ricoh (China) Investment Co., Ltd. Aficio SP 3500SF has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202502-2482 | No CVE | Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR2100G-E has an information leakage vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Beijing Xingwang Ruijie Network Technology Co., Ltd. is a provider of ICT infrastructure and industry solutions. Its main business is the research, design and sales of network equipment, network security products and cloud desktop solutions.
Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR2100G-E has an information leakage vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202502-2294 | No CVE | Shenzhen Bilian Electronics Co., Ltd. BL-X-PRO has a command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
BL-X-PRO is a six-line six-signal high-power Gigabit wireless router.
BL-X-PRO of Shenzhen Bilian Electronics Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202502-3429 | No CVE | Wuxi Xinjie Electric Co., Ltd. Xinjie XSF5-A32 PLC has industrial control equipment vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Wuxi Xinjie Electric Co., Ltd. is a listed company that focuses on the research and development and application of industrial automation products.
Wuxi Xinjie Electric Co., Ltd.'s Xinjie XSF5-A32 PLC has an industrial control equipment vulnerability that attackers can exploit to cause a denial of service.
VAR-202502-1472 | CVE-2024-57673 | Project Floodlight of Floodlight Resource exhaustion vulnerability in |
CVSS V2: - CVSS V3: 5.5 Severity: MEDIUM |
An issue in floodlight v1.2 allows a local attacker to cause a denial of service via the Topology Manager module and Linkdiscovery module. Project Floodlight of Floodlight Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202502-1321 | CVE-2024-57672 | Project Floodlight of Floodlight Resource exhaustion vulnerability in |
CVSS V2: - CVSS V3: 5.5 Severity: MEDIUM |
An issue in floodlight v1.2 allows a local attacker to cause a denial of service via the Topology Manager module, Topologylnstance module, Routing module. Project Floodlight of Floodlight Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state