VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202503-1031 CVE-2025-29361 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the list parameter at /goform/SetVirtualServerCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
VAR-202503-0683 CVE-2025-29360 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the time and timeZone parameters at /goform/SetSysTimeCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
VAR-202503-0851 CVE-2025-29359 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the deviceId parameter at /goform/saveParentControlInfo. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a home wireless router from China's Tenda company
VAR-202503-1032 CVE-2025-29358 Tenda  of  RX3  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the firewallEn parameter at /goform/SetFirewallCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda RX3 is a dual-band WiFi 6 home wireless router from China's Tenda company. It is used for home network coverage and supports high-speed wireless connections. The vulnerability is caused by the firewallEn parameter in /goform/SetFirewallCfg failing to correctly verify the length of the input data
VAR-202503-2141 CVE-2025-29357 Tenda  of  RX3  Improper Shutdown and Release of Resources in Firmware Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the startIp and endIp parameters at /goform/SetPptpServerCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. Tenda of RX3 A vulnerability exists in firmware related to improper shutdown and release of resources.Service operation interruption (DoS) It may be in a state. Tenda RX3 is a dual-band WiFi 6 home wireless router from China's Tenda company. It is used for home network coverage and supports high-speed wireless connections. The vulnerability is caused by the startIp and endIp parameters in /goform/SetPptpServerCfg failing to correctly verify the length of the input data
VAR-202503-0471 CVE-2025-0813 Schneider Electric EcoStruxure Power Automation System User Interface Authorization Issue Vulnerability CVSS V2: 7.2
CVSS V3: 6.8
Severity: High
CWE-287: Improper Authentication vulnerability exists that could cause an Authentication Bypass when an unauthorized user without permission rights has physical access to the EPAS-UI computer and is able to reboot the workstation and interrupt the normal boot process. Schneider Electric EcoStruxure Power Automation System User Interface is a user interface software for power automation systems developed by Schneider Electric of France. It is used for operators to interact with power automation systems to improve operational efficiency. Schneider Electric EcoStruxure Power Automation System User Interface has an authorization vulnerability. The vulnerability is caused by improper authentication
VAR-202503-1168 CVE-2024-13872 BitDefender  of  Bitdefender BOX  Vulnerability in cleartext transmission of sensitive information in firmware CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device. BitDefender of Bitdefender BOX A vulnerability exists in the firmware regarding the transmission of sensitive information in plaintext.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202503-2100 CVE-2024-13871 BitDefender  of  Bitdefender BOX  Command injection vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
A command injection vulnerability exists in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 (firmware version 1.3.11.490). This flaw allows an unauthenticated, network-adjacent attacker to execute arbitrary commands on the device, potentially leading to full remote code execution (RCE). (DoS) It may be in a state
VAR-202503-1337 CVE-2024-13870 BitDefender  of  Bitdefender BOX  Vulnerability in firmware where security version number can be changed to an older version CVSS V2: -
CVSS V3: 5.7
Severity: MEDIUM
An improper access control vulnerability exists in Bitdefender Box 1 (firmware version 1.3.52.928 and below) that allows an unauthenticated attacker to downgrade the device's firmware to an older, potentially vulnerable version of a Bitdefender-signed firmware. The attack requires Bitdefender BOX to be booted in Recovery Mode and that the attacker be present within the WiFi range of the BOX unit
VAR-202503-2006 CVE-2025-24070 Microsoft's  ASP.NET Core  and  Microsoft Visual Studio  Elevated Privileges in CVSS V2: -
CVSS V3: 7.0
Severity: HIGH
Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network
VAR-202503-0792 CVE-2024-54026 CVSS V2: -
CVSS V3: 4.3
Severity: MEDIUM
An improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiSandbox Cloud version 23.4, FortiSandbox at least 4.4.0 through 4.4.6 and 4.2.0 through 4.2.7 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 allows attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
VAR-202503-2484 CVE-2024-54018 fortinet's  FortiSandbox  In  OS  Command injection vulnerability CVSS V2: -
CVSS V3: 7.2
Severity: HIGH
Multiple improper neutralization of special elements used in an OS Command vulnerabilities [CWE-78] in FortiSandbox before 4.4.5 allows a privileged attacker to execute unauthorized commands via crafted requests. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202503-1498 CVE-2024-52961 fortinet's  FortiSandbox  In  OS  Command injection vulnerability CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.7, 4.2.0 through 4.2.7 and before 4.0.5 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202503-1155 CVE-2024-52960 CVSS V2: -
CVSS V3: 4.3
Severity: MEDIUM
A client-side enforcement of server-side security vulnerability [CWE-602] in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.6 and before 4.2.7 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests.
VAR-202503-0802 CVE-2024-45328 CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
An incorrect authorization vulnerability [CWE-863] in FortiSandbox 4.4.0 through 4.4.6 may allow a low priviledged administrator to execute elevated CLI commands via the GUI console menu.
VAR-202503-0301 CVE-2025-27396 Siemens'  SCALANCE LPE9403  Vulnerability due to improper checks for deleted privileges in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly limit the elevation of privileges required to perform certain valid functionality. This could allow an authenticated lowly-privileged remote attacker to escalate their privileges. Siemens' SCALANCE LPE9403 The firmware contains a vulnerability related to improper checking of deleted privileges.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing of Siemens, Germany. It is used to capture, collect and pre-process industrial field data. Siemens SCALANCE LPE9403 has a privilege escalation vulnerability. Attackers can exploit this vulnerability to elevate privileges
VAR-202503-0298 CVE-2025-27395 Siemens'  SCALANCE LPE9403  Path traversal vulnerability in firmware CVSS V2: 8.3
CVSS V3: 7.2
Severity: High
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly limit the scope of files accessible through and the privileges of the SFTP functionality. This could allow an authenticated highly-privileged remote attacker to read and write arbitrary files. Siemens' SCALANCE LPE9403 A path traversal vulnerability exists in firmware.Information may be obtained and information may be tampered with. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing from Siemens, Germany. It is used to capture, collect and pre-process industrial field data
VAR-202503-0300 CVE-2025-27394 Siemens'  SCALANCE LPE9403  in the firmware  OS  Command injection vulnerability CVSS V2: 8.3
CVSS V3: 7.2
Severity: High
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly sanitize user input when creating new SNMP users. This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device. Siemens' SCALANCE LPE9403 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing from Siemens, Germany. It is used to capture, collect and pre-process industrial field data. SCALANCE LPE9403 (6GK5998-3GS00-2AC2) has an operating system command injection vulnerability
VAR-202503-0299 CVE-2025-27393 Siemens'  SCALANCE LPE9403  in the firmware  OS  Command injection vulnerability CVSS V2: 8.3
CVSS V3: 7.2
Severity: High
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly sanitize user input when creating new users. This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device. Siemens' SCALANCE LPE9403 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing from Siemens, Germany. It is used to capture, collect and pre-process industrial field data
VAR-202503-0279 CVE-2025-23402 Siemens Teamcenter Visualization and Siemens Tecnomatix Plant Simulation Resource Management Error Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: High
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain a use-after-free vulnerability that could be triggered while parsing specially crafted WRL files. An attacker could leverage this vulnerability to execute code in the context of the current process. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume, thereby improving manufacturing system performance