VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202501-1520 CVE-2024-57014 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "recHour" parameter in setScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1639 CVE-2024-57013 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "switch" parameter in setScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1579 CVE-2024-57012 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "week" parameter in setScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-4232 CVE-2024-57011 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "minute" parameters in setScheduleCfg. (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1635 CVE-2025-22968 D-Link Systems, Inc.  of  DWR-M972V  Code injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An issue in D-Link DWR-M972V 1.05SSG allows a remote attacker to execute arbitrary code via SSH using root account without restrictions. D-Link Systems, Inc. of DWR-M972V A code injection vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DWR-M972V is a router from D-Link, a Chinese company
VAR-202501-3355 CVE-2025-0356 NEC Aterm Multiple vulnerabilities in the series ( NV25-003 ) CVSS V2: -
CVSS V3: 7.2
Severity: HIGH
NEC Corporation Aterm WX1500HP Ver.1.4.2 and earlier and WX3600HP Ver.1.5.3 and earlier allows a attacker to execute arbitrary OS commands via the network. None
VAR-202501-2751 CVE-2025-0355 NEC Aterm Multiple vulnerabilities in the series ( NV25-003 ) CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Missing Authentication for Critical Function vulnerability in NEC Corporation Aterm WG2600HS Ver.1.7.2 and earlier, WF1200CRS Ver.1.6.0 and earlier, WG1200CRS Ver.1.5.0 and earlier, GB1200PE Ver.1.3.0 and earlier, WG2600HP4 Ver.1.4.2 and earlier, WG2600HM4 Ver.1.4.2 and earlier, WG2600HS2 Ver.1.3.2 and earlier, WX3000HP Ver.2.4.2 and earlier and WX4200D5 Ver.1.2.4 and earlier allows a attacker to get a Wi-Fi password via the network. None
VAR-202501-3163 CVE-2025-0354 NEC Aterm Multiple vulnerabilities in the series ( NV25-003 ) CVSS V2: -
CVSS V3: 4.8
Severity: MEDIUM
Cross-site scripting vulnerability in NEC Corporation Aterm WG2600HS Ver.1.7.2 and earlier, WG2600HP4 Ver.1.4.2 and earlier, WG2600HM4 Ver.1.4.2 and earlier, WG2600HS2 Ver.1.3.2 and earlier, WX3000HP Ver.2.4.2 and earlier and WX4200D5 Ver.1.2.4 and earlier allows a attacker to inject an arbitrary script via the network. None
VAR-202501-3115 CVE-2025-22997 Linksys  of  E5600  Cross-site scripting vulnerability in firmware CVSS V2: 4.1
CVSS V3: 4.8
Severity: MEDIUM
A stored cross-site scripting (XSS) vulnerability in the prf_table_content component of Linksys E5600 Router Ver. 1.1.0.26 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the desc parameter. Linksys E5600 is a powerful, compact and reliable WiFi 5 router from Linksys of the United States. The vulnerability is caused by the lack of effective filtering and escaping of user-provided data by the application
VAR-202501-2163 CVE-2024-57483 Shenzhen Tenda Technology Co.,Ltd.  of  i24  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda i24 V2.0.0.5 is vulnerable to Buffer Overflow in the addWifiMacFilter function. Shenzhen Tenda Technology Co.,Ltd. of i24 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1336 CVE-2024-39803 WAVLINK AC3000 Buffer Overflow Vulnerability (CNVD-2025-08330) CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `sel_mode` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the sel_mode parameter of the qos.cgi qos_settings function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1335 CVE-2024-39802 WAVLINK AC3000 Buffer Overflow Vulnerability (CNVD-2025-08329) CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `qos_dat` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the qos_dat parameter of the qos.cgi qos_settings function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1334 CVE-2024-39801 WAVLINK AC3000 Buffer Overflow Vulnerability (CNVD-2025-08328) CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `qos_bandwidth` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the qos_bandwidth parameter of the qos.cgi qos_settings function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1313 CVE-2024-39800 WAVLINK AC3000 External Configuration Control Vulnerability (CNVD-2025-09258) CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exists in the openvpn.cgi openvpn_server_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `open_port` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has an external configuration control vulnerability, which stems from the fact that the open_port parameter of the openvpn.cgi openvpn_server_setup function fails to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202501-1312 CVE-2024-39799 WAVLINK AC3000 External Configuration Control Vulnerability (CNVD-2025-09257) CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exists in the openvpn.cgi openvpn_server_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `sel_open_interface` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has an external configuration control vulnerability, which stems from the fact that the sel_open_interface parameter of the openvpn.cgi openvpn_server_setup function fails to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202501-1311 CVE-2024-39798 WAVLINK AC3000 External Configuration Control Vulnerability (CNVD-2025-09259) CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exists in the openvpn.cgi openvpn_server_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `sel_open_protocol` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has an external configuration control vulnerability, which stems from the fact that the sel_open_protocol parameter of the openvpn.cgi openvpn_server_setup function fails to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202501-1296 CVE-2024-39795 WAVLINK AC3000 External Configuration Control Vulnerability (CNVD-2025-11442) CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exist in the nas.cgi set_nas() proftpd functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `ftp_max_sessions` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
VAR-202501-1294 CVE-2024-39794 WAVLINK AC3000 External Configuration Control Vulnerability CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exist in the nas.cgi set_nas() proftpd functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `ftp_port` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
VAR-202501-1295 CVE-2024-39793 WAVLINK AC3000 External Configuration Control Vulnerability (CNVD-2025-11445) CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exist in the nas.cgi set_nas() proftpd functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `ftp_name` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
VAR-202501-1316 CVE-2024-39790 WAVLINK AC3000 External Configuration Control Vulnerability (CNVD-2025-11441) CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple external config control vulnerabilities exist in the nas.cgi set_ftp_cfg() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists within the `ftp_max_sessions` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company