VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202501-1781 CVE-2024-57680 D-Link Systems, Inc.  of  DIR-816  Fraudulent Authentication Vulnerability in Firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
An access control issue in the component form2PortriggerRule.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the port trigger of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 An incorrect authentication vulnerability exists in firmware.Information may be obtained. D-Link DIR-816A2 is a router from D-Link, a Chinese company. D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the form2PortriggerRule.cgi component
VAR-202501-2357 CVE-2024-57679 D-Link Systems, Inc.  of  DIR-816  Fraudulent Authentication Vulnerability in Firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
An access control issue in the component form2RepeaterSetup.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G repeater service of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 An incorrect authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. D-Link DIR-816A2 is a router from D-Link, a Chinese company. D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the form2RepeaterSetup.cgi component
VAR-202501-2556 CVE-2024-57678 D-Link Systems, Inc.  of  DIR-816  Fraudulent Authentication Vulnerability in Firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
An access control issue in the component form2WlAc.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G mac access control list of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 An incorrect authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. D-Link DIR-816A2 is a router from D-Link, a Chinese company. D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the form2WlAc.cgi component
VAR-202501-2770 CVE-2024-57677 D-Link Systems, Inc.  of  DIR-816  Fraudulent Authentication Vulnerability in Firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
An access control issue in the component form2Wan.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the wan service of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 An incorrect authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. D-Link DIR-816A2 is a router from D-Link, a Chinese company. D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the form2Wan.cgi component
VAR-202501-2978 CVE-2024-57676 D-Link Systems, Inc.  of  DIR-816  Fraudulent Authentication Vulnerability in Firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
An access control issue in the component form2WlanBasicSetup.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G wlan service of the device via a crafted POST request. D-Link Systems, Inc. of DIR-816 An incorrect authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. D-Link DIR-816A2 is a router from D-Link, a Chinese company. D-Link DIR-816A2 has an access control error vulnerability, which is caused by improper access control of the form2WlanBasicSetup.cgi component
VAR-202501-1996 CVE-2024-48885 Path traversal vulnerability in multiple Fortinet products CVSS V2: -
CVSS V3: 5.3
Severity: MEDIUM
A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiRecorder versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiWeb versions 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10, 6.4.0 through 6.4.3, FortiVoice versions 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.0 through 6.0.12 allows attacker to escalate privilege via specially crafted packets. FortiManager , FortiManager Cloud , FortiProxy There is a path traversal vulnerability in several Fortinet products, including:Information is tampered with and service operation is interrupted (DoS) It may be in a state
VAR-202501-4394 No CVE Netgear EX6120 WiFi Range Extender has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Netgear EX6120 WiFi Range Extender‌ is a dual-band 1200Mbps WiFi range extender. Netgear EX6120 WiFi Range Extender has a weak password vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202501-1431 CVE-2025-0492 D-Link DIR-823X has an unspecified vulnerability (CNVD-2025-02107) CVSS V2: 7.8
CVSS V3: 7.5
Severity: High
A vulnerability has been found in D-Link DIR-823X 240126/240802 and classified as critical. Affected by this vulnerability is the function FUN_00412244. The manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. D-Link DIR-823X is a wireless router from D-Link, a Chinese company. No detailed vulnerability details are currently available
VAR-202501-1452 CVE-2025-0481 D-Link DIR-878 Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability classified as problematic has been found in D-Link DIR-878 1.03. Affected is an unknown function of the file /dllog.cgi of the component HTTP POST Request Handler. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. D-Link DIR-878 is a wireless router from D-Link, a Chinese company. D-Link DIR-878 version 1.03 has an information leakage vulnerability. Attackers can exploit this vulnerability to obtain sensitive information
VAR-202501-2166 CVE-2024-57025 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "desc" parameter in setWiFiScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-3190 CVE-2024-57024 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "eMinute" parameter in setWiFiScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1634 CVE-2024-57023 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "week" parameter in setWiFiScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1547 CVE-2024-57022 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "sHour" parameter in setWiFiScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1794 CVE-2024-57021 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "eHour" parameter in setWiFiScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1565 CVE-2024-57020 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "sMinute" parameter in setWiFiScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1654 CVE-2024-57019 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "limit" parameter in setVpnAccountCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-2779 CVE-2024-57018 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "desc" parameter in setVpnAccountCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1508 CVE-2024-57017 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "pass" parameter in setVpnAccountCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-2167 CVE-2024-57016 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "user" parameter in setVpnAccountCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1509 CVE-2024-57015 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "hour" parameter in setScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution