VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202502-3089 CVE-2025-25675 Shenzhen Tenda Technology Co.,Ltd.  of  AC10  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC10 V1.0 V15.03.06.23 has a command injection vulnerablility located in the formexeCommand function. The str variable receives the cmdinput parameter from a POST request and is later assigned to the cmd_buf variable, which is directly used in the doSystemCmd function, causing an arbitrary command execution. Shenzhen Tenda Technology Co.,Ltd. of AC10 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. No detailed vulnerability details are currently provided
VAR-202502-3462 CVE-2025-25674 Shenzhen Tenda Technology Co.,Ltd.  of  AC10  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC10 V1.0 V15.03.06.23 is vulnerable to Buffer Overflow in form_fast_setting_wifi_set via the parameter ssid. Shenzhen Tenda Technology Co.,Ltd. of AC10 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202502-3289 CVE-2025-25668 Shenzhen Tenda Technology Co.,Ltd.  of  AC8  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_47D878 function. Shenzhen Tenda Technology Co.,Ltd. of AC8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202502-3090 CVE-2025-25667 Shenzhen Tenda Technology Co.,Ltd.  of  AC8  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the urls parameter in the function get_parentControl_list_Info. Shenzhen Tenda Technology Co.,Ltd. of AC8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Attackers can exploit this vulnerability to cause the program to crash or even execute arbitrary code
VAR-202502-2733 CVE-2025-25664 Shenzhen Tenda Technology Co.,Ltd.  of  AC8  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_49E098 function. Shenzhen Tenda Technology Co.,Ltd. of AC8 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Attackers can exploit this vulnerability to corrupt memory and possibly cause the browser to crash
VAR-202502-1920 CVE-2025-25663 Shenzhen Tenda Technology Co.,Ltd.  of  AC8  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability was found in Tenda AC8V4 V16.03.34.06. Affected is the function SUB_0046AC38 of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. of AC8 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC8 has a buffer overflow vulnerability, which can be exploited by attackers to cause the program to crash or even execute arbitrary code
VAR-202502-3290 CVE-2025-25662 Shenzhen Tenda Technology Co.,Ltd.  of  O4  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda O4 V3.0 V1.0.0.10(2936) is vulnerable to Buffer Overflow in the function SafeSetMacFilter of the file /goform/setMacFilterList via the argument remark/type/time. Shenzhen Tenda Technology Co.,Ltd. of O4 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda O4 is a router product of Tenda. Remote attackers can use this vulnerability to submit special requests, which can cause the application to crash and execute arbitrary code in the context of the application
VAR-202502-2543 CVE-2025-20153 Cisco Systems  Secure Email Gateway  Vulnerability in CVSS V2: 5.0
CVSS V3: 5.8
Severity: MEDIUM
A vulnerability in the email filtering mechanism of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to bypass the configured rules and allow emails that should have been denied to flow through an affected device.   This vulnerability is due to improper handling of email that passes through an affected device. An attacker could exploit this vulnerability by sending a crafted email through the affected device. A successful exploit could allow the attacker to bypass email filters on the affected device. Cisco Systems Secure Email Gateway Exists in unspecified vulnerabilities.Information may be tampered with. Remote attackers can bypass the rules and conduct malicious attacks by submitting special emails through the vulnerability
VAR-202502-1670 No CVE Siemens SiPass integrated third-party component DotNetZip directory traversal vulnerability CVSS V2: 9.4
CVSS V3: -
Severity: HIGH
‌Siemens SiPass integrated‌ is a powerful and flexible access control system for organizations of all sizes, from simple offices to large, complex facilities with thousands of doors, gates, barriers, and elevators. A directory traversal vulnerability exists in DotNetZip, a third-party component of Siemens SiPass integrated, which can be exploited by an attacker to execute arbitrary code on the application server if a specially crafted backup set is used to restore it.
VAR-202502-3667 CVE-2025-25896 D-Link Systems, Inc.  of  DSL-3782  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.5
CVSS V3: 5.7
Severity: MEDIUM
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the destination, netmask, and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. D-Link Systems, Inc. D-Link DSL-3782 is a wireless router from Taiwan's D-Link company
VAR-202502-2725 CVE-2025-25895 D-Link Systems, Inc.  of  DSL-3782  in the firmware  OS  Command injection vulnerability CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the public_type parameter. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet. D-Link Systems, Inc. (DoS) It may be in a state. D-Link DSL-3782 is a wireless router from D-Link. The vulnerability originates from processing the public_type parameter
VAR-202502-2106 CVE-2025-25894 D-Link Systems, Inc.  of  DSL-3782  in the firmware  OS  Command injection vulnerability CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the samba_wg and samba_nbn parameters. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet. D-Link Systems, Inc. (DoS) It may be in a state. D-Link DSL-3782 is a wireless router from Taiwan's D-Link company
VAR-202502-2909 CVE-2025-25893 D-Link Systems, Inc.  of  DSL-3782  in the firmware  OS  Command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.0
Severity: HIGH
An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the inIP, insPort, inePort, exsPort, exePort, and protocol parameters. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet. D-Link Systems, Inc. (DoS) It may be in a state. D-Link DSL-3782 is a wireless router from Taiwan's D-Link company
VAR-202502-2726 CVE-2025-25892 D-Link Systems, Inc.  of  DSL-3782  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.5
CVSS V3: 5.7
Severity: MEDIUM
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the sstartip, sendip, dstartip, and dendip parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. D-Link Systems, Inc. D-Link DSL-3782 is a wireless router from Taiwan's D-Link company
VAR-202502-2107 CVE-2025-25891 D-Link Systems, Inc.  of  DSL-3782  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.5
CVSS V3: 5.7
Severity: MEDIUM
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01, triggered by the destination, netmask and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. D-Link Systems, Inc. D-Link DSL-3782 is a wireless router from D-Link, a Chinese company
VAR-202502-2954 CVE-2024-57050 TP-LINK Technologies  of  wr840n  Authentication vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: Critical
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-11714. Reason: This candidate is a reservation duplicate of CVE-2018-11714. Notes: All CVE users should reference CVE-2018-11714 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. TP-LINK Technologies of wr840n An authentication vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202502-2375 CVE-2024-57046 of netgear  DGN2200  Authentication vulnerability in firmware CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
A vulnerability in the Netgear DGN2200 router with firmware version v1.0.0.46 and earlier permits unauthorized individuals to bypass the authentication. When adding "?x=1.gif" to the the requested url, it will be recognized as passing the authentication. of netgear DGN2200 An authentication vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR DGN2200 is a wireless router from NETGEAR. NETGEAR DGN2200 has a permission issue vulnerability
VAR-202502-3865 No CVE Siemens Opcenter Intelligence Tableau Server component has multiple vulnerabilities CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Opcenter Intelligence (formerly known as "Manufacturing Intelligence") connects manufacturing data from disparate company sources and aggregates it into cohesive, intelligent, and contextualized information. Siemens Opcenter Intelligence Tableau Server component has multiple vulnerabilities that can be exploited by attackers to affect the confidentiality and integrity of the system.
VAR-202502-1661 CVE-2025-1392 D-Link Systems, Inc.  of  DIR-816  Cross-site scripting vulnerability in firmware CVSS V2: 4.0
CVSS V3: 3.5
Severity: Medium
A vulnerability has been found in D-Link DIR-816 1.01TO and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/webproc?getpage=html/index.html&var:menu=24gwlan&var:page=24G_basic. The manipulation of the argument SSID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Systems, Inc. of DIR-816 The firmware contains cross-site scripting and code injection vulnerabilities.Information may be obtained and information may be tampered with. D-Link DIR-816 is a wireless router from D-Link of China. D-Link DIR-816 version 1.01TO has a code injection vulnerability. The vulnerability is caused by the incorrect operation of the parameter SSID, which will lead to a cross-site scripting attack. Attackers can use this vulnerability to execute malicious scripts, steal user cookies, or conduct phishing attacks
VAR-202502-1667 CVE-2025-1354 ASUS RT-N12E Cross-Site Scripting Vulnerability CVSS V2: 3.3
CVSS V3: 2.4
Severity: Medium
A cross-site scripting (XSS) vulnerability in the RT-N10E/ RT-N12E 2.0.0.x firmware . This vulnerability caused by improper input validation and can be triggered via the manipulation of the SSID argument in the sysinfo.asp file, leading to disclosure of sensitive information. Note: All versions of RT-N10E and RT-N12E are unsupported (End-of-Life, EOL). Consumers can mitigate this vulnerability by disabling the remote access features from WAN. ASUS RT-N12E is a wireless router from ASUS, a Chinese company. Attackers can exploit this vulnerability to execute arbitrary web scripts or HTML by injecting carefully crafted payloads