VARIoT IoT vulnerabilities database
| VAR-202507-2630 | CVE-2024-27779 | fortinet's FortiIsolator and FortiSandbox Session deadline vulnerability in |
CVSS V2: - CVSS V3: 6.7 Severity: MEDIUM |
An insufficient session expiration vulnerability [CWE-613] in FortiSandbox FortiSandbox version 4.4.4 and below, version 4.2.6 and below, 4.0 all versions, 3.2 all versions and FortiIsolator version 2.4 and below, 2.3 all versions, 2.2 all versions, 2.1 all versions, 2.0 all versions, 1.2 all versions may allow a remote attacker in possession of an admin session cookie to keep using that admin's session even after the admin user was deleted. fortinet's FortiIsolator and FortiSandbox contains a session expiration vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202507-3917 | No CVE | Ricoh M 320F has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Ricoh M320F is a monochrome laser multifunction printer.
The Ricoh M320F has an unauthorized access vulnerability that could allow an attacker to obtain sensitive information.
| VAR-202507-2366 | CVE-2025-7762 | D-Link Systems, Inc. of di-8100 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability, which was classified as critical, has been found in D-Link DI-8100 16.07.26A1. This issue affects some unknown processing of the file /menu_nat_more.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. The D-Link DI-8100 is a broadband router designed for small and medium-sized networks. It supports four Internet ports and four LAN ports, and uses a dedicated network processor, allowing up to 80 devices to connect to the network simultaneously. This vulnerability stems from a failure to properly validate the length of input data in the file /menu_nat_more.asp. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202507-2367 | CVE-2025-7758 | TOTOLINK of t6 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability, which was classified as critical, has been found in TOTOLINK T6 up to 4.1.5cu.748_B20211015. Affected by this issue is the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of t6 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK T6 is a wireless dual-band router released by China's Jiweng Electronics (TOTOLINK). It supports the MQTT protocol and Telnet service.
The TOTOLINK T6 suffers from a buffer overflow vulnerability caused by a failure to properly validate the length of input data in the parameter "ip" in the file "/cgi-bin/cstecgi.cgi". An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202507-1340 | CVE-2025-52046 | TOTOLINK A3300R Command Injection Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Totolink A3300R V17.0.0cu.596_B20250515 was found to contain a command injection vulnerability in the sub_4197C0 function via the mac and desc parameters. This vulnerability allows unauthenticated attackers to execute arbitrary commands via a crafted request. TOTOLINK A3300R is a wireless router from China's TOTOLINK Electronics
| VAR-202507-1788 | CVE-2025-51630 | TOTOLINK N350RT Buffer Overflow Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a buffer overflow via the ePort parameter in the function setIpPortFilterRules. The TOTOLINK N350RT is a small home router manufactured by the Chinese company TOTOLINK. This vulnerability stems from a failure to properly validate the length of input data in the ePort parameter. A remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service
| VAR-202507-2422 | CVE-2025-7747 | Shenzhen Tenda Technology Co.,Ltd. of fh451 Classic buffer overflow vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. This affects the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. The manipulation of the argument PPW leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of fh451 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter PPW in the file /goform/WizardHandle failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
| VAR-202507-1298 | No CVE | HP LaserJet 600 M602 of HP Trading (Shanghai) Co., Ltd. has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
HP Trading (Shanghai) Co., Ltd. focuses on the research and development, production, sales and international trade of computer equipment, printing equipment and related parts.
HP LaserJet 600 M602 of HP Trading (Shanghai) Co., Ltd. has a weak password vulnerability, and attackers can use the vulnerability to log in to the system and obtain sensitive information.
| VAR-202507-1637 | CVE-2025-53032 | Oracle MySQL of MySQL Server In Server: Optimizer Vulnerability |
CVSS V2: 6.1 CVSS V3: 4.9 Severity: MEDIUM |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). An attacker could exploit this vulnerability to cause a denial of service
| VAR-202507-1502 | CVE-2025-52082 | of netgear XR300 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
In Netgear XR300 V1.0.3.38_10.3.30, a stack-based buffer overflow exists in the HTTPD service through the usb_device.cgi endpoint. The vulnerability occurs when processing POST requests containing the read_access parameter. The NETGEAR XR300 is an entry-level Nighthawk Pro Gaming series wireless router from NETGEAR. Detailed vulnerability details are not available at this time
| VAR-202507-0815 | CVE-2025-52081 | of netgear XR300 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
In Netgear XR300 V1.0.3.38_10.3.30, a stack-based buffer overflow vulnerability exists in the HTTPD service through the usb_device.cgi endpoint. The vulnerability occurs when processing POST requests containing the usb_folder parameter. The NETGEAR XR300 is an entry-level Nighthawk Pro Gaming series wireless router from NETGEAR. Detailed vulnerability details are not available at this time
| VAR-202507-1944 | CVE-2025-52080 | of netgear XR300 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
In Netgear XR300 V1.0.3.38_10.3.30, a stack-based buffer overflow vulnerability exists in the HTTPD service through the usb_device.cgi endpoint. The vulnerability occurs when processing POST requests containing the share_name parameter. The NETGEAR XR300 is an entry-level Nighthawk Pro Gaming series wireless router from NETGEAR. Detailed vulnerability details are not available at this time
| VAR-202507-1786 | CVE-2025-52363 | Shenzhen Tenda Technology Co.,Ltd. of CP3 Pro Vulnerability related to use of hardcoded credentials in firmware |
CVSS V2: 5.6 CVSS V3: 6.8 Severity: MEDIUM |
Tenda CP3 Pro Firmware V22.5.4.93 contains a hardcoded root password hash in the /etc/passwd file and /etc/passwd-. An attacker with access to the firmware image can extract and attempt to crack the root password hash, potentially obtaining administrative access. Shenzhen Tenda Technology Co.,Ltd. Tenda CP3 Pro is an intelligent wireless PTZ camera that integrates 360° panoramic monitoring, 3-megapixel high-definition video, and Wi-Fi 6 network technology. It supports functions such as human/pet detection, crying detection, and one-click calling. No detailed vulnerability details are currently provided
| VAR-202507-0681 | CVE-2025-7615 | TOTOLINK of t6 Injection Vulnerability in Firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability classified as critical was found in TOTOLINK T6 4.1.5cu.748. Affected by this vulnerability is the function clearPairCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of t6 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK T6 is a wireless dual-band router released by China's TOTOLINK Electronics. It supports the MQTT protocol and Telnet service. No detailed vulnerability details are currently available
| VAR-202507-0626 | CVE-2025-7614 | TOTOLINK of t6 Injection Vulnerability in Firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability classified as critical has been found in TOTOLINK T6 4.1.5cu.748. Affected is the function delDevice of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ipAddr leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of t6 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK T6 is a wireless dual-band router released by China's TOTOLINK Electronics. It supports the MQTT protocol and Telnet service. No detailed vulnerability details are currently available
| VAR-202507-0534 | CVE-2025-7613 | TOTOLINK of t6 Injection Vulnerability in Firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability was found in TOTOLINK T6 4.1.5cu.748. It has been rated as critical. This issue affects the function CloudSrvVersionCheck of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of t6 The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK T6 is a wireless dual-band router released by China's TOTOLINK Electronics. It supports the MQTT protocol and Telnet service. No detailed vulnerability details are currently available
| VAR-202507-0536 | CVE-2025-7603 | D-Link Systems, Inc. of di-8100 Buffer error vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. Affected is an unknown function of the file /jingx.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of di-8100 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DI-8100 is a broadband router designed for small and medium-sized networks. It supports up to four Internet ports and four LAN ports, allowing up to 80 users to access the internet simultaneously. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202507-0602 | CVE-2025-7602 | D-Link Systems, Inc. of di-8100 Buffer error vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
A vulnerability was found in D-Link DI-8100 16.07.26A1 and classified as critical. This issue affects some unknown processing of the file /arp_sys.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of di-8100 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DI-8100 is a broadband router designed for small and medium-sized networks. It supports up to four Internet ports and four LAN ports, allowing up to 80 users to access the internet simultaneously. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202507-0658 | CVE-2025-7598 | Shenzhen Tenda Technology Co.,Ltd. of ax1803 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability classified as critical was found in Tenda AX1803 1.0.0.1. Affected by this vulnerability is the function formSetWifiMacFilterCfg of the file /goform/setWifiFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of ax1803 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. No detailed vulnerability details are currently provided
| VAR-202507-0548 | CVE-2025-7597 | Shenzhen Tenda Technology Co.,Ltd. of ax1803 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability classified as critical has been found in Tenda AX1803 1.0.0.1. Affected is the function formSetMacFilterCfg of the file /goform/setMacFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of ax1803 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. It provides a series of functions for setting and managing network devices. Users can use Tenda Ax1803 Firmware to perform network configuration, manage routers, and other operations, which is convenient and practical. No detailed vulnerability details are currently provided