VARIoT IoT vulnerabilities database

VAR-202503-1031 | CVE-2025-29361 | Tenda of RX3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the list parameter at /goform/SetVirtualServerCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
VAR-202503-0683 | CVE-2025-29360 | Tenda of RX3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the time and timeZone parameters at /goform/SetSysTimeCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
VAR-202503-0851 | CVE-2025-29359 | Tenda of RX3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the deviceId parameter at /goform/saveParentControlInfo. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
VAR-202503-1032 | CVE-2025-29358 | Tenda of RX3 Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the firewallEn parameter at /goform/SetFirewallCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a dual-band WiFi 6 home wireless router from China's Tenda company. It is used for home network coverage and supports high-speed wireless connections. The vulnerability is caused by the firewallEn parameter in /goform/SetFirewallCfg failing to correctly verify the length of the input data
VAR-202503-2141 | CVE-2025-29357 | Tenda of RX3 Improper Shutdown and Release of Resources in Firmware Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the startIp and endIp parameters at /goform/SetPptpServerCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda of RX3 A vulnerability exists in firmware related to improper shutdown and release of resources.Service operation interruption (DoS) It may be in a state. Tenda RX3 is a dual-band WiFi 6 home wireless router from China's Tenda company. It is used for home network coverage and supports high-speed wireless connections. The vulnerability is caused by the startIp and endIp parameters in /goform/SetPptpServerCfg failing to correctly verify the length of the input data
VAR-202503-0471 | CVE-2025-0813 | Schneider Electric EcoStruxure Power Automation System User Interface Authorization Issue Vulnerability |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: High |
CWE-287: Improper Authentication vulnerability exists that could cause an Authentication Bypass when an
unauthorized user without permission rights has physical access to the EPAS-UI computer and is able to
reboot the workstation and interrupt the normal boot process. Schneider Electric EcoStruxure Power Automation System User Interface is a user interface software for power automation systems developed by Schneider Electric of France. It is used for operators to interact with power automation systems to improve operational efficiency.
Schneider Electric EcoStruxure Power Automation System User Interface has an authorization vulnerability. The vulnerability is caused by improper authentication
VAR-202503-1168 | CVE-2024-13872 | BitDefender of Bitdefender BOX Vulnerability in cleartext transmission of sensitive information in firmware |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device. BitDefender of Bitdefender BOX A vulnerability exists in the firmware regarding the transmission of sensitive information in plaintext.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202503-2100 | CVE-2024-13871 | BitDefender of Bitdefender BOX Command injection vulnerability in firmware |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
A command injection vulnerability exists in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 (firmware version 1.3.11.490). This flaw allows an unauthenticated, network-adjacent attacker to execute arbitrary commands on the device, potentially leading to full remote code execution (RCE). (DoS) It may be in a state
VAR-202503-1337 | CVE-2024-13870 | BitDefender of Bitdefender BOX Vulnerability in firmware where security version number can be changed to an older version |
CVSS V2: - CVSS V3: 5.7 Severity: MEDIUM |
An improper access control vulnerability exists in Bitdefender Box 1 (firmware version 1.3.52.928 and below) that allows an unauthenticated attacker to downgrade the device's firmware to an older, potentially vulnerable version of a Bitdefender-signed firmware. The attack requires Bitdefender BOX to be booted in Recovery Mode and that the attacker be present within the WiFi range of the BOX unit
VAR-202503-2006 | CVE-2025-24070 | Microsoft's ASP.NET Core and Microsoft Visual Studio Elevated Privileges in |
CVSS V2: - CVSS V3: 7.0 Severity: HIGH |
Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network
VAR-202503-0792 | CVE-2024-54026 |
CVSS V2: - CVSS V3: 4.3 Severity: MEDIUM |
An improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiSandbox Cloud version 23.4, FortiSandbox at least 4.4.0 through 4.4.6 and 4.2.0 through 4.2.7 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 allows attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
VAR-202503-2484 | CVE-2024-54018 | fortinet's FortiSandbox In OS Command injection vulnerability |
CVSS V2: - CVSS V3: 7.2 Severity: HIGH |
Multiple improper neutralization of special elements used in an OS Command vulnerabilities [CWE-78] in FortiSandbox before 4.4.5 allows a privileged attacker to execute unauthorized commands via crafted requests. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202503-1498 | CVE-2024-52961 | fortinet's FortiSandbox In OS Command injection vulnerability |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.7, 4.2.0 through 4.2.7 and before 4.0.5 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202503-1155 | CVE-2024-52960 |
CVSS V2: - CVSS V3: 4.3 Severity: MEDIUM |
A client-side enforcement of server-side security vulnerability [CWE-602] in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.6 and before 4.2.7 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests.
VAR-202503-0802 | CVE-2024-45328 |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
An incorrect authorization vulnerability [CWE-863] in FortiSandbox 4.4.0 through 4.4.6 may allow a low priviledged administrator to execute elevated CLI commands via the GUI console menu.
VAR-202503-0301 | CVE-2025-27396 | Siemens' SCALANCE LPE9403 Vulnerability due to improper checks for deleted privileges in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly limit the elevation of privileges required to perform certain valid functionality.
This could allow an authenticated lowly-privileged remote attacker to escalate their privileges. Siemens' SCALANCE LPE9403 The firmware contains a vulnerability related to improper checking of deleted privileges.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing of Siemens, Germany. It is used to capture, collect and pre-process industrial field data.
Siemens SCALANCE LPE9403 has a privilege escalation vulnerability. Attackers can exploit this vulnerability to elevate privileges
VAR-202503-0298 | CVE-2025-27395 | Siemens' SCALANCE LPE9403 Path traversal vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly limit the scope of files accessible through and the privileges of the SFTP functionality.
This could allow an authenticated highly-privileged remote attacker to read and write arbitrary files. Siemens' SCALANCE LPE9403 A path traversal vulnerability exists in firmware.Information may be obtained and information may be tampered with. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing from Siemens, Germany. It is used to capture, collect and pre-process industrial field data
VAR-202503-0300 | CVE-2025-27394 | Siemens' SCALANCE LPE9403 in the firmware OS Command injection vulnerability |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly sanitize user input when creating new SNMP users.
This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device. Siemens' SCALANCE LPE9403 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing from Siemens, Germany. It is used to capture, collect and pre-process industrial field data.
SCALANCE LPE9403 (6GK5998-3GS00-2AC2) has an operating system command injection vulnerability
VAR-202503-0299 | CVE-2025-27393 | Siemens' SCALANCE LPE9403 in the firmware OS Command injection vulnerability |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly sanitize user input when creating new users.
This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device. Siemens' SCALANCE LPE9403 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing from Siemens, Germany. It is used to capture, collect and pre-process industrial field data
VAR-202503-0279 | CVE-2025-23402 | Siemens Teamcenter Visualization and Siemens Tecnomatix Plant Simulation Resource Management Error Vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain a use-after-free vulnerability that could be triggered while parsing specially crafted WRL files.
An attacker could leverage this vulnerability to execute code in the context of the current process. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume, thereby improving manufacturing system performance