VARIoT IoT vulnerabilities database
    | VAR-202509-0309 | CVE-2025-40796 | Siemens' SIMATIC PCS neo and User Management Component (UMC) Out-of-bounds read vulnerability in | 
                                      
                                        CVSS V2: - CVSS V3: 7.5 Severity: High  | 
                            A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions), SIMATIC PCS neo V5.0 (All versions), SIMATIC PCS neo V6.0 (All versions), User Management Component (UMC) (All versions < V2.15.1.3). Affected products contain a out-of-bounds read vulnerability in the integrated UMC component. This could allow an unauthenticated remote attacker to cause a denial of service condition. Siemens' SIMATIC PCS neo and User Management Component (UMC) Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
                        
| VAR-202509-0307 | CVE-2025-40795 | Siemens' SIMATIC PCS neo and User Management Component (UMC) Stack-based buffer overflow vulnerability in | 
                                      
                                        CVSS V2: - CVSS V3: 9.8 Severity: Critical  | 
                            A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions), SIMATIC PCS neo V5.0 (All versions), SIMATIC PCS neo V6.0 (All versions), User Management Component (UMC) (All versions < V2.15.1.3). Affected products contain a stack-based buffer overflow vulnerability in the integrated UMC component. This could allow an unauthenticated remote attacker to execute arbitrary code or to cause a denial of service condition. Siemens' SIMATIC PCS neo and User Management Component (UMC) Exists in a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
                        
| VAR-202509-0246 | CVE-2025-10123 | D-Link Corporation of DIR-823X Injection Vulnerability in Firmware | 
                                      
                                        CVSS V2: 7.5 CVSS V3: 7.3 Severity: Medium  | 
                            A vulnerability was determined in D-Link DIR-823X up to 250416. Affected by this vulnerability is the function sub_415028 of the file /goform/set_static_leases. Executing manipulation of the argument Hostname can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. D-Link Corporation of DIR-823X The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-823X is a wireless router manufactured by D-Link, a Chinese company. This vulnerability could allow an attacker to execute arbitrary commands on the system
                        
| VAR-202509-0311 | CVE-2025-10120 | Shenzhen Tenda Technology Co.,Ltd. of AC20 Buffer error vulnerability in firmware | 
                                      
                                        CVSS V2: 9.0 CVSS V3: 8.8 Severity: High  | 
                            A vulnerability was detected in Tenda AC20 up to 16.03.08.12. The impacted element is the function strcpy of the file /goform/GetParentControlInfo. The manipulation of the argument mac results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. Shenzhen Tenda Technology Co.,Ltd. of AC20 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker could exploit this vulnerability by remotely sending specially crafted data to trigger the buffer overflow, thereby executing arbitrary code or causing the system to crash
                        
| VAR-202509-0249 | CVE-2025-10093 | D-Link Corporation of DIR-852 Firmware vulnerabilities | 
                                      
                                        CVSS V2: 5.0 CVSS V3: 5.3 Severity: Medium  | 
                            A vulnerability was identified in D-Link DIR-852 up to 1.00CN B09. Affected by this vulnerability is the function phpcgi_main of the file /getcfg.php of the component Device Configuration Handler. Such manipulation leads to information disclosure. The attack may be performed from remote. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-852 There are unspecified vulnerabilities in the firmware.Information may be obtained
                        
| VAR-202509-4204 | No CVE | D-Link DI-8200 has a denial of service vulnerability | 
                                      
                                        CVSS V2: 3.8 CVSS V3: - Severity: LOW  | 
                            The DI-8200 is an enterprise-class router.
The D-Link DI-8200 has a denial of service vulnerability that could be exploited by an attacker to cause a denial of service.
                        
| VAR-202509-4248 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. AC23 has an ICMP Redirect hijacking vulnerability | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            The AC23 is a gigabit router.
The AC23 of Shenzhen Jixiang Tengda Technology Co., Ltd. suffers from an ICMP Redirect hijacking vulnerability, which could be exploited to cause a denial of service.
                        
| VAR-202509-4025 | No CVE | D-Link DI-8300 has a denial of service vulnerability | 
                                      
                                        CVSS V2: 3.8 CVSS V3: - Severity: LOW  | 
                            The DI-8300 is a broadband router designed for business users, featuring Internet behavior management features.
The D-Link DI-8300 has a denial of service vulnerability that could be exploited by an attacker to cause a denial of service.
                        
| VAR-202509-0186 | CVE-2025-10034 | D-Link Corporation of DIR-825 Classic buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 9.0 CVSS V3: 8.8 Severity: High  | 
                            A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-825 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
                        
| VAR-202509-4024 | No CVE | Samsung SL-J1760W has an unauthorized access vulnerability | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            The Samsung SL-J1760W is a laser printer.
The Samsung SL-J1760W has an unauthorized access vulnerability that could allow an attacker to obtain sensitive information.
                        
| VAR-202509-0043 | CVE-2025-9935 | TOTOLINK of n600r Injection Vulnerability in Firmware | 
                                      
                                        CVSS V2: 7.5 CVSS V3: 7.3 Severity: Medium  | 
                            A vulnerability was determined in TOTOLINK N600R 4.3.0cu.7866_B20220506. This vulnerability affects the function sub_4159F8 of the file /web_cste/cgi-bin/cstecgi.cgi. Executing manipulation can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. TOTOLINK of n600r The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK N600R is a dual-band wireless router released by the Korean brand TOTOLINK in 2013. It supports concurrent operation in the 2.4GHz and 5GHz bands, with a maximum wireless transmission rate of 300Mbps. No detailed vulnerability details are currently available
                        
| VAR-202509-0181 | CVE-2025-9934 | TOTOLINK of X5000R Injection Vulnerability in Firmware | 
                                      
                                        CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low  | 
                            A vulnerability was found in TOTOLINK X5000R 9.1.0cu.2415_B20250515. This affects the function sub_410C34 of the file /cgi-bin/cstecgi.cgi. Performing manipulation of the argument pid results in command injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. TOTOLINK of X5000R The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK X5000R is a wireless router that supports Wi-Fi 6 technology, featuring a full-coverage mesh system and dual-band transmission capabilities, making it suitable for home and enterprise network environments. 
The TOTOLINK X5000R has a command injection vulnerability caused by the failure of the pid parameter in the /cgi-bin/cstecgi.cgi file to properly sanitize special characters and commands when constructing commands. Detailed vulnerability details are not available at this time
                        
| VAR-202509-0357 | CVE-2025-55852 | Shenzhen Tenda Technology Co.,Ltd. of AC8 Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: - CVSS V3: 7.5 Severity: HIGH  | 
                            Tenda AC8 v16.03.34.06 is vulnerable to Buffer Overflow in the formWifiBasicSet function via the parameter security or security_5g. Shenzhen Tenda Technology Co.,Ltd. of AC8 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state
                        
| VAR-202509-1283 | CVE-2025-21035 | Samsung's calendar Vulnerability in | 
                                      
                                        CVSS V2: - CVSS V3: 4.6 Severity: MEDIUM  | 
                            Improper access control in Samsung Calendar prior to version 12.5.06.5 in Android 14 and 12.6.01.12 in Android 15 allows physical attackers to access data across multiple user profiles. Samsung's calendar Exists in unspecified vulnerabilities.Information may be obtained
                        
| VAR-202509-0418 | CVE-2023-21483 | Samsung's Galaxy Store Vulnerability in | 
                                      
                                        CVSS V2: - CVSS V3: 6.4 Severity: MEDIUM  | 
                            Improper Access Control vulnerability in Galaxy Store prior to version 4.5.53.6 allows local attacker to access protected data using exported service. Samsung's Galaxy Store Exists in unspecified vulnerabilities.Information may be obtained
                        
| VAR-202509-0299 | CVE-2023-21467 | Samsung's Exynos Authentication vulnerability in | 
                                      
                                        CVSS V2: - CVSS V3: 4.6 Severity: MEDIUM  | 
                            Error in 3GPP specification implementation in Exynos baseband prior to SMR Apr-2023 Release 1 allows incorrect handling of unencrypted message. Samsung's Exynos There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
                        
| VAR-202509-0089 | CVE-2025-9828 | Tenda CP6 encryption vulnerability | 
                                      
                                        CVSS V2: 2.6 CVSS V3: 3.7 Severity: Low  | 
                            A vulnerability was determined in Tenda CP6 11.10.00.243. The affected element is the function sub_2B7D04 of the component uhttp. Executing manipulation can lead to risky cryptographic algorithm. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is described as difficult. The exploit has been publicly disclosed and may be utilized. The Tenda CP6 is a smart camera from the Chinese company Tenda. This vulnerability stems from the use of a compromised encryption algorithm in the function sub_2B7D04 in the uhttp component. An attacker could exploit this vulnerability to compromise the device's integrity
                        
| VAR-202509-0020 | CVE-2025-9813 | Shenzhen Tenda Technology Co.,Ltd. of ch22 Buffer error vulnerability in firmware | 
                                      
                                        CVSS V2: 9.0 CVSS V3: 8.8 Severity: High  | 
                            A vulnerability was identified in Tenda CH22 1.0.0.1. This issue affects the function formSetSambaConf of the file /goform/SetSambaConf. The manipulation of the argument samba_userNameSda leads to buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. Shenzhen Tenda Technology Co.,Ltd. of ch22 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability stems from the failure of the samba_userNameSda parameter in the /goform/SetSambaConf file to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
                        
| VAR-202509-0136 | CVE-2025-9812 | Shenzhen Tenda Technology Co.,Ltd. of ch22 Buffer error vulnerability in firmware | 
                                      
                                        CVSS V2: 9.0 CVSS V3: 8.8 Severity: High  | 
                            A vulnerability was determined in Tenda CH22 1.0.0.1. This vulnerability affects the function formexeCommand of the file /goform/exeCommand. Executing manipulation of the argument cmdinput can lead to buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. Shenzhen Tenda Technology Co.,Ltd. of ch22 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability stems from the failure of the cmdinput parameter in the /goform/exeCommand file to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service
                        
| VAR-202509-0139 | CVE-2025-9791 | Shenzhen Tenda Technology Co.,Ltd. of AC20 Out-of-bounds write vulnerability in firmware | 
                                      
                                        CVSS V2: 9.0 CVSS V3: 8.8 Severity: High  | 
                            A weakness has been identified in Tenda AC20 16.03.08.05. This vulnerability affects unknown code of the file /goform/fromAdvSetMacMtuWan. This manipulation of the argument wanMTU causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. Shenzhen Tenda Technology Co.,Ltd. of AC20 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability stems from the failure of the wanMTU parameter in the file /goform/fromAdvSetMacMtuWan to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service