VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202502-2075 No CVE ZTE Corporation ZSRV2 router web management system has arbitrary file read vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
ZTE Corporation is a leading global provider of integrated information and communications technology solutions. An arbitrary file read vulnerability exists in the web management system of ZTE Corporation's ZSRV2 router, which can be exploited by attackers to obtain sensitive information.
VAR-202502-3256 No CVE Shenzhen Anjiaweishi Information Technology Co., Ltd. MC series cameras have arbitrary file download vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shenzhen Anjia Vision Information Technology Co., Ltd. MC-A37 300 is a 3-megapixel camera. MC-A37P 300 is a 3-megapixel camera. MC-A85 800 is an 8-megapixel camera. MC-A52 500 is a 5-megapixel camera. MC-J30 is a 4-megapixel camera. MC-J40 500 is a 5-megapixel full-color camera. MC-A42P 400 is a 4-megapixel camera. Shenzhen Anjia Vision Information Technology Co., Ltd. MC-A37 300, MC-A37P 300, MC-A85 800, MC-A52 500, MC-J30, MC-J40 500, MC-A42P 400 have arbitrary file download vulnerabilities, which can be exploited by attackers to obtain sensitive information.
VAR-202502-3791 No CVE Epson WF-M5799 Series has a command execution vulnerability CVSS V2: 8.5
CVSS V3: -
Severity: HIGH
The WF-M5799 Series is a high-end black and white commercial ink tank all-in-one printer. The Epson WF-M5799 Series has a command execution vulnerability. Attackers can exploit this vulnerability to execute printer commands, which may cause the printer to lose response, thus affecting the printing service.
VAR-202502-3780 No CVE Fujifilm (China) Investment Co., Ltd. DocuCentre-V C2265 has a command execution vulnerability CVSS V2: 8.5
CVSS V3: -
Severity: HIGH
DocuCentre-V C2265 is a digital multifunction printer. There is a command execution vulnerability in DocuCentre-V C2265 of Fujifilm (China) Investment Co., Ltd. Attackers can use this vulnerability to execute printer commands, which may cause the printer to lose response, thus affecting the printing service.
VAR-202502-3798 No CVE TOTOLINK A3002R has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
A3002R is a dual-band Gigabit port 5G wireless router. TOTOLINK A3002R has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202502-2685 No CVE Shenzhen Anjiaweishi Information Technology Co., Ltd. MC series cameras have unauthorized access vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shenzhen Anjia Vision Information Technology Co., Ltd. MC-A37 300 is a 3-megapixel camera. MC-A37P 300 is a 3-megapixel camera. MC-A85 800 is an 8-megapixel camera. MC-A52 500 is a 5-megapixel camera. MC-J30 is a 4-megapixel camera. MC-J40 500 is a 5-megapixel full-color camera. MC-A42P 400 is a 4-megapixel camera. Shenzhen Anjia Vision Information Technology Co., Ltd. MC-A37 300, MC-A37P 300, MC-A85 800, MC-A52 500, MC-J30, MC-J40 500, MC-A42P 400 have unauthorized access vulnerabilities, which can be exploited by attackers to obtain sensitive information.
VAR-202502-3814 No CVE TP-LINK TL-R473 has SSH weak password vulnerability CVSS V2: 7.6
CVSS V3: -
Severity: HIGH
TP-LINK TL-R473 is an enterprise VPN router. TP-LINK TL-R473 has a weak SSH password vulnerability, which can be exploited by attackers to gain control of the server.
VAR-202502-3854 No CVE TOTOLINK A3002R has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
A3002R is a dual-band Gigabit port 5G wireless router. TOTOLINK A3002R has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202502-2076 No CVE There is an arbitrary file read vulnerability in the intelligent bus electronic stop sign integrated management service platform of Shanghai Zhengxian Electronic Technology Co., Ltd. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shanghai Zhengxian Electronic Technology Co., Ltd. is one of the few specialized and innovative enterprises in China that specializes in the research and development, production and sales of smart city furniture. There is an arbitrary file reading vulnerability in the intelligent bus electronic stop sign integrated management service platform of Shanghai Zhengxian Electronic Technology Co., Ltd., which can be exploited by attackers to obtain sensitive information.
VAR-202502-1921 CVE-2025-25605 TOTOLINK  of  X5000R  Command injection vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
Totolink X5000R V9.1.0u.6369_B20230113 is vulnerable to command injection via the apcli_wps_gen_pincode function in mtkwifi.lua. TOTOLINK of X5000R Firmware contains a command injection vulnerability.Information may be obtained and information may be tampered with. TOTOLINK X5000R is a router product of China's TOTOLINK Electronics. No detailed vulnerability details are currently provided
VAR-202502-2114 CVE-2025-25604 TOTOLINK  of  X5000R  Command injection vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
Totolink X5000R V9.1.0u.6369_B20230113 is vulnerable to command injection via the vif_disable function in mtkwifi.lua. TOTOLINK of X5000R Firmware contains a command injection vulnerability.Information may be obtained and information may be tampered with. TOTOLINK X5000R is a router product of China's TOTOLINK Electronics. No detailed vulnerability details are currently provided
VAR-202502-3291 CVE-2025-25510 Shenzhen Tenda Technology Co.,Ltd.  of  AC8  Classic buffer overflow vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
Tenda AC8 V16.03.34.06 is vulnerable to Buffer Overflow in the get_parentControl_list_Info function. Shenzhen Tenda Technology Co.,Ltd. of AC8 Firmware has a classic buffer overflow vulnerability.Information may be obtained and information may be tampered with. No detailed vulnerability details are currently provided
VAR-202502-2320 CVE-2025-25507 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Code injection vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
There is a RCE vulnerability in Tenda AC6 15.03.05.16_multi. In the formexeCommand function, the parameter cmdinput will cause remote command execution. of AC6 A code injection vulnerability exists in the firmware.Information may be obtained and information may be tampered with. Tenda AC6 has a code execution vulnerability, which is caused by the cmdinput parameter of the formexeCommand function failing to properly filter special elements in the constructed code segment. No detailed vulnerability details are currently available
VAR-202502-2914 CVE-2025-25505 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Classic buffer overflow vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
Tenda AC6 15.03.05.16_multi is vulnerable to Buffer Overflow in the sub_452A4 function. Shenzhen Tenda Technology Co.,Ltd. of AC6 Firmware has a classic buffer overflow vulnerability.Information may be obtained and information may be tampered with. No detailed vulnerability details are currently provided
VAR-202502-1766 CVE-2025-1539 D-Link Systems, Inc.  of  DAP-1320  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability, which was classified as critical, has been found in D-Link DAP-1320 1.00. Affected by this issue is the function replace_special_char of the file /storagein.pd-XXXXXX. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Systems, Inc. of DAP-1320 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DAP-1320 is a wireless signal extender from D-Link, a Chinese company. Attackers can exploit this vulnerability to cause the program to crash or even execute arbitrary code
VAR-202502-1799 CVE-2025-1538 D-Link Systems, Inc.  of  DAP-1320  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability classified as critical was found in D-Link DAP-1320 1.00. Affected by this vulnerability is the function set_ws_action of the file /dws/api/. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Systems, Inc. of DAP-1320 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DAP-1320 is a wireless signal extender from D-Link, a Chinese company. Attackers can exploit this vulnerability to cause the program to crash or even execute arbitrary code
VAR-202502-3821 No CVE Hangzhou Hikvision Digital Technology Co., Ltd. DS-A80624S has a logical defect vulnerability CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
DS-A80624S is a 24-slot network storage device launched by Hikvision. Hangzhou Hikvision Digital Technology Co., Ltd. DS-A80624S has a logic defect vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202502-3255 No CVE Sharp Corporation MX-3070N has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The MX-3070N is a commercial-grade color multifunction printer that is primarily designed to meet the office needs of medium to large companies. The Sharp Corporation MX-3070N has an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202502-1750 CVE-2025-25678 Shenzhen Tenda Technology Co.,Ltd.  of  I12  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the funcpara1 parameter in the formSetCfm function. Shenzhen Tenda Technology Co.,Ltd. of I12 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda i12 is a high-power AP wireless access point for commercial use. Remote attackers can use this vulnerability to submit special requests, which can cause the application to crash and cause a denial of service attack
VAR-202502-1732 CVE-2025-25676 Shenzhen Tenda Technology Co.,Ltd.  of  I12  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDset function. Shenzhen Tenda Technology Co.,Ltd. of I12 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda i12 is a high-power AP wireless access point for commercial use. Remote attackers can use this vulnerability to submit special requests, which can cause the application to crash and cause a denial of service attack