VARIoT IoT vulnerabilities database
| VAR-202505-3181 | No CVE | D-Link DI-7003GV2 has a logic flaw vulnerability |
CVSS V2: 3.3 CVSS V3: - Severity: LOW |
D-Link DI-7003GV2 is a router from D-Link, a Chinese company.
D-Link DI-7003GV2 has a logic flaw that can be exploited by attackers to cause a denial of service.
| VAR-202505-2465 | No CVE | Ruiyin Technology (Shenzhen) Co., Ltd. QUANTUM D2G has a logical defect vulnerability |
CVSS V2: 3.3 CVSS V3: - Severity: LOW |
QUANTUM D2G is a dual-gigabit home router.
Ruiyin Technology (Shenzhen) Co., Ltd. QUANTUM D2G has a logic defect vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202505-2806 | No CVE | H3C M60 of H3C Technologies Co., Ltd. has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
H3C M60 is a new generation of enterprise-class high-performance wireless AP manager launched by H3C.
H3C M60 of H3C Technologies Co., Ltd. has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202505-2044 | CVE-2025-5127 | FLIR Systems, Inc. of flir ax8 Cross-site scripting vulnerability in firmware |
CVSS V2: 4.0 CVSS V3: 3.5 Severity: Low |
A vulnerability was determined in Teledyne FLIR AX8 up to 1.46.16. This issue affects some unknown processing of the file /prod.php. Executing manipulation of the argument cmd can lead to cross site scripting. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.49.16 is capable of addressing this issue. It is recommended to upgrade the affected component. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities.". FLIR Systems, Inc. of flir ax8 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
| VAR-202505-2061 | CVE-2025-5126 | FLIR Systems, Inc. of flir ax8 Command injection vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in Teledyne FLIR AX8 up to 1.46.16. This vulnerability affects the function setDataTime of the file \usr\www\application\models\settingsregional.php. Performing manipulation of the argument year/month/day/hour/minute results in command injection. The attack may be initiated remotely. The exploit has been made public and could be used. Upgrading to version 1.49.16 is able to resolve this issue. Upgrading the affected component is recommended. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities.". FLIR Systems, Inc. of flir ax8 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202505-3046 | CVE-2025-46176 | D-Link Systems, Inc. of DIR-605L firmware and DIR-816L Command injection vulnerability in firmware |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
Hardcoded credentials in the Telnet service in D-Link DIR-605L v2.13B01 and DIR-816L v2.06B01 allow attackers to remotely execute arbitrary commands via firmware analysis. D-Link Systems, Inc. of DIR-605L firmware and DIR-816L Firmware contains a command injection vulnerability.Information may be obtained and information may be tampered with. The D-Link DIR-605L is the company's first cloud router, designed primarily for home and small office network environments. The D-Link DIR-816L is a dual-band wireless router supporting both the 2.4GHz and 5GHz bands. It complies with IEEE 802.11ac and IEEE 802.11n network standards, offering a maximum transfer rate of 450Mbps.
The D-Link DIR-605L and D-Link DIR-816L contain a hardcoded vulnerability. No detailed vulnerability details have been provided
| VAR-202505-2079 | CVE-2022-31812 | Siemens' SiPass integrated Out-of-bounds read vulnerability in |
CVSS V2: - CVSS V3: 7.5 Severity: High |
A vulnerability has been identified in SiPass integrated (All versions < V2.95.3.18). Affected server applications contain an out of bounds read past the end of an allocated buffer while checking the integrity of incoming packets. This could allow an unauthenticated remote attacker to create a denial of service condition. Siemens' SiPass integrated Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202505-2761 | CVE-2024-13945 | ABB multiple products path traversal vulnerability (CNVD-2025-13774) |
CVSS V2: 7.3 CVSS V3: 6.0 Severity: High |
Stored Absolute Path Traversal vulnerabilities in ASPECT could expose sensitive data
if administrator credentials become compromised.
This issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications
| VAR-202505-4248 | CVE-2024-51553 | ABB products predict file name vulnerability |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: High |
Predictable filename vulnerabilities in ASPECT may expose sensitive information to a potential attacker if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT and others are products of ABB of Switzerland. ABB ASPECT is a scalable building energy management and control solution. ABB MATRIX is an embedded building automation network controller. ABB NEXUS is a wireless and wired solution.
Many ABB products have a predictive file name vulnerability, which can be exploited by attackers to leak sensitive information
| VAR-202505-3144 | CVE-2024-51552 | ABB products have weak password storage vulnerabilities |
CVSS V2: 7.3 CVSS V3: 6.0 Severity: High |
Weak password storage vulnerabilities exist in ASPECT if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT is a scalable building energy management and control solution. ABB MATRIX is an embedded building automation network controller. ABB NEXUS is a wireless and wired solution
| VAR-202505-3345 | CVE-2024-48848 | Denial of Service Vulnerabilities in Multiple ABB Products |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: High |
Large content vulnerabilities are present in ASPECT exposing a device to disk overutilization on a system if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT and others are products of ABB of Switzerland. ABB ASPECT is a scalable building energy management and control solution. ABB MATRIX is an embedded building automation network controller. ABB NEXUS is a wireless and wired solution.
Many ABB products have a denial of service vulnerability, which is caused by disk overuse. Attackers can exploit this vulnerability to cause system resource exhaustion
| VAR-202505-3887 | CVE-2024-13958 | ABB products have cross-site scripting vulnerabilities (CNVD-2025-13777) |
CVSS V2: 4.7 CVSS V3: 4.8 Severity: Medium |
Stored Cross Site Scripting vulnerabilities exist in ASPECT if administrator creden-tials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB NEXUS Series is a monitoring and management system. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications.
ABB has a cross-site scripting vulnerability in many products. No detailed vulnerability details are currently available
| VAR-202505-4265 | CVE-2024-13956 | ABB products have trust management vulnerabilities |
CVSS V2: 8.0 CVSS V3: 6.7 Severity: High |
SSL Verification Bypass vulnerabilities exist in ASPECT if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB NEXUS Series is a monitoring and management system. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications.
ABB products have a trust management issue vulnerability, which is caused by credential leakage and may lead to SSL authentication bypass. No detailed vulnerability details are provided at this time
| VAR-202505-4071 | CVE-2024-13955 | SQL injection vulnerabilities in multiple ABB products |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: Critical |
2nd Order SQL injection vulnerabilities in ASPECT allow unintended access and manipulation of database repositories if administrator credentials become compromised.This issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB NEXUS Series is a monitoring and management system. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications.
ABB products have a SQL injection vulnerability that can lead to a second-order SQL injection attack due to credential leakage. An attacker can use this vulnerability to view, add, modify or delete information in the backend database
| VAR-202505-2760 | CVE-2024-13954 | ABB multiple product information leakage vulnerability (CNVD-2025-13421) |
CVSS V2: 5.8 CVSS V3: 6.5 Severity: Medium |
Serialized configuration information may be disclosed during device commissioning while using ASPECT's configuration toolsetThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB NEXUS Series is a monitoring and management system. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications.
ABB has an information disclosure vulnerability in many products, which is caused by the insecure storage of sensitive information. Attackers can exploit this vulnerability to obtain serialized configuration information
| VAR-202505-2598 | CVE-2024-13953 | ABB products have information leakage vulnerabilities |
CVSS V2: 6.1 CVSS V3: 4.9 Severity: Medium |
Sensitive device logger information in ASPECT may be exposed if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB NEXUS Series is a monitoring and management system. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications.
ABB has information leakage vulnerabilities in many products
| VAR-202505-3718 | CVE-2024-13952 | ABB products have code injection vulnerabilities |
CVSS V2: 8.3 CVSS V3: 8.4 Severity: High |
Predictable filename vulnerabilities in ASPECT may expose sensitive information to a potential attacker if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB NEXUS Series is a monitoring and management system. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications.
ABB products have a code injection vulnerability that may lead to file name prediction attacks due to credential leakage. No detailed vulnerability details are currently available
| VAR-202505-3350 | CVE-2024-13951 | ABB multiple product information leakage vulnerability (CNVD-2025-13332) |
CVSS V2: 8.0 CVSS V3: 7.6 Severity: Medium |
One way hash with predictable salt vulnerabilities in ASPECT may expose sensitive information to a potential attackerThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB NEXUS Series is a monitoring and management system. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications.
ABB has information leakage vulnerabilities in many products
| VAR-202505-2938 | CVE-2024-13950 | ABB products have cross-site scripting vulnerabilities |
CVSS V2: 6.1 CVSS V3: 6.8 Severity: Medium |
Log injection vulnerabilities in ASPECT provide attacker access to inject malicious browser scripts if administrator credentials become compromised.This issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB NEXUS Series is a monitoring and management system. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications.
ABB has a cross-site scripting vulnerability in many products that can be exploited by attackers to access and inject malicious browser scripts
| VAR-202505-2939 | CVE-2024-13949 | ABB products have security bypass vulnerabilities |
CVSS V2: 6.1 CVSS V3: 6.8 Severity: Medium |
Large content vulnerabilities are present in ASPECT exposing a device to disk overutilization on a system if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*. ABB ASPECT-Enterprise is a scalable building energy management and control solution. ABB NEXUS Series is a monitoring and management system. ABB MATRIX Series is an embedded IoT ASPECT control engine designed to provide flexible field control for medium to large field control applications.
ABB has a security bypass vulnerability in multiple products. The vulnerability is caused by credential leakage, which may lead to excessive disk usage. No detailed vulnerability details are currently provided