VARIoT IoT vulnerabilities database

VAR-202503-3932 | No CVE | Samsung (China) Investment Co., Ltd. Samsung sl-j3520w has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Samsung (China) Investment Co., Ltd. is a company whose main business is: televisions, wires, audio-visual accessories, communication accessories, computers, computer network equipment, etc.
Samsung (China) Investment Co., Ltd. Samsung sl-j3520w has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202503-2887 | No CVE | Red Lion SIXNET SYS-800-021 has a command injection vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Red Lion is an American company, Red Lion Controls, which provides a complete line of high-performance products to meet the needs of global customers.
Red Lion SIXNET SYS-800-021 has a command injection vulnerability that can be exploited by attackers to gain server privileges.
VAR-202503-2888 | No CVE | Samsung printer models have unauthorized access vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Samsung (China) Investment Co., Ltd. is a company whose main business is: televisions, wires, audio-visual accessories, communication accessories, computers, computer network equipment, etc.
Samsung's multi-model printer series has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information and perform unauthorized operations.
VAR-202503-3417 | No CVE | Beijing Xingwang Ruijie Network Technology Co., Ltd. RG-UAC-6000-E20 has a command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Beijing StarNet Ruijie Network Technology Co., Ltd. is an industry-leading ICT infrastructure and industry solution provider. Its main business is the research, design and sales of network equipment, network security products and cloud desktop solutions.
Beijing StarNet Ruijie Network Technology Co., Ltd. RG-UAC-6000-E20 has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202503-3931 | No CVE | RICOH IM C3000 has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
RICOH IM C3000 is a color copier.
RICOH IM C3000 has an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202503-3554 | No CVE | TP-Link Technology Co., Ltd. TL-R5406PE-AC has a command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
TL-R5406PE-AC is a router.
TL-R5406PE-AC of TP-Link Technologies Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202503-4054 | No CVE | Beijing Digital China Cloud Technology Co., Ltd. DCME-320 has an arbitrary file deletion vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
DCME-320 is a high-performance Internet egress gateway.
Beijing Digital China Cloud Technology Co., Ltd. DCME-320 has an arbitrary file deletion vulnerability, which can be exploited by attackers to delete arbitrary files.
VAR-202503-3553 | No CVE | MIKAPU Bluetooth model of Mikasha (Shenzhen) Technology Co., Ltd. has a logic defect vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Mikasha (Shenzhen) Technology Co., Ltd. is a technology company that focuses on the research and development and production of smart drinking water equipment.
Mikasha (Shenzhen) Technology Co., Ltd.'s MIKAPU Bluetooth model has a logic defect vulnerability, which can be exploited by attackers to unlock the water cup via Bluetooth and send Bluetooth commands to delete the user's fingerprint.
VAR-202503-4055 | No CVE | TP-Link Technology Co., Ltd. TL-R479GP-AC has a command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
TL-R479GP-AC is an enterprise router from TP-Link Technologies Co., Ltd.
TL-R479GP-AC from TP-Link Technologies Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202502-2734 | CVE-2025-25635 | TOTOLINK of A3002R Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the pppoe_dns1 parameter in the formIpv6Setup interface of /bin/boa. TOTOLINK of A3002R Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R is a wireless router from China's TOTOLINK Electronics. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202502-2112 | CVE-2025-25610 | TOTOLINK of A3002R Classic buffer overflow vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 8.0 Severity: HIGH |
TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_gw parameter in the formIpv6Setup interface of /bin/boa. TOTOLINK of A3002R Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R is a wireless router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202502-2113 | CVE-2025-25609 | TOTOLINK of A3002R Classic buffer overflow vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 8.0 Severity: HIGH |
TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_ipv6 parameter in the formIpv6Setup interface of /bin/boa. TOTOLINK of A3002R Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R is a wireless router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202502-2738 | CVE-2025-25429 | TRENDnet of TEW-929DRU Cross-site scripting vulnerability in |
CVSS V2: 4.1 CVSS V3: 4.8 Severity: MEDIUM |
Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the r_name variable inside the have_same_name function on the /addschedule.htm page. TRENDnet of TEW-929DRU Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. TRENDnet TEW-929DRU is a wireless router from TRENDnet, an American company. Attackers can exploit this vulnerability to execute arbitrary web scripts or HTML by injecting carefully designed payloads
VAR-202502-2917 | CVE-2025-25428 | TRENDnet of TEW-929DRU Vulnerability related to the use of hard-coded passwords in |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
TRENDnet TEW-929DRU 1.0.0.10 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. TRENDnet of TEW-929DRU contains a vulnerability related to the use of hardcoded passwords.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TRENDnet TEW-929DRU is a wireless router from TRENDnet, an American company
VAR-202502-3463 | CVE-2025-25431 | TRENDnet of TEW-929DRU Cross-site scripting vulnerability in |
CVSS V2: 4.8 CVSS V3: 4.8 Severity: MEDIUM |
Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the The ssid key of wifi_data parameter on the /captive_portal.htm page. TRENDnet of TEW-929DRU Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. TRENDnet TEW-929DRU is a wireless router from TRENDnet, an American company.
TRENDnet TEW-929DRU has a cross-site scripting vulnerability. Attackers can exploit this vulnerability to execute arbitrary web scripts or HTML by injecting carefully designed payloads
VAR-202502-2737 | CVE-2025-25430 | TRENDnet of TEW-929DRU Cross-site scripting vulnerability in |
CVSS V2: 4.8 CVSS V3: 4.8 Severity: MEDIUM |
Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the configname parameter on the /cbi_addcert.htm page. TRENDnet TEW-929DRU is a wireless router from TRENDnet, an American company. Attackers can exploit this vulnerability to execute arbitrary web scripts or HTML by injecting carefully designed payloads
VAR-202502-2307 | CVE-2025-26263 | GeoVision ASManager Windows Application Credential Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 5.1 Severity: MEDIUM |
GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less (fixed in 6.2.0), is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process. GeoVision ASManager (GV-ASManager) is an access control system developed by GeoVision, a Chinese company. An attacker could exploit this vulnerability to obtain sensitive information
VAR-202502-3859 | No CVE | Multiple routers from Shanghai Feixun Data Communication Technology Co., Ltd. have command execution vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
FIR303B is a wireless router produced in mainland China. FIR304D is a wireless router. HGE318 is a wireless router.
Shanghai Feixun Data Communication Technology Co., Ltd. has a command execution vulnerability in many routers. Attackers can use this vulnerability to execute arbitrary commands.
VAR-202502-3864 | No CVE | Yaskawa Electric (China) Co., Ltd. Yaskawa MP2310 motion controller has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Yaskawa Electric (China) Co., Ltd. is a company that provides overall solutions.
Yaskawa Electric (China) Co., Ltd.'s Yaskawa MP2310 motion controller has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202502-3844 | No CVE | Beijing Huali Chuangtong Technology Co., Ltd. 6100 satellite mobile terminal has a command execution vulnerability |
CVSS V2: 8.3 CVSS V3: - Severity: HIGH |
Beijing Huali Chuangtong Technology Co., Ltd. (hereinafter referred to as Huali Chuangtong) is a leader in information technology and innovative applications for domestic defense, government and industry.
Beijing Huali Chuangtong Technology Co., Ltd.'s 6100 satellite mobile terminal has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.