VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202502-1685 CVE-2025-1340 TOTOLINK  of  x18  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability classified as critical has been found in TOTOLINK X18 9.1.0cu.2024_B20220329. Affected is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi. The manipulation as part of String leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK of x18 The firmware contains a buffer error vulnerability, a stack-based buffer overflow vulnerability, and an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK X18 is a Gigabit router from China's TOTOLINK Electronics. The vulnerability is caused by the parameter String of the file /cgi-bin/cstecgi.cgi failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202502-1679 CVE-2025-1339 TOTOLINK  of  x18  Command injection vulnerability in firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Medium
A vulnerability was found in TOTOLINK X18 9.1.0cu.2024_B20220329. It has been rated as critical. This issue affects the function setL2tpdConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument enable leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK of x18 The firmware contains a command injection vulnerability. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK X18 is a Gigabit router from China's TOTOLINK Electronics. TOTOLINK X18 9.1.0cu.2024_B20220329 version has a command injection vulnerability, which is caused by the parameter enable of the file /cgi-bin/cstecgi.cgi failing to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202502-2080 No CVE Texas Instruments Incorporated. TMS320F28335 has a logic flaw vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
TMS320F28335 is a high-performance TMS320C28x series 32-bit floating-point DSP processor produced by TI. Texas Instruments Incorporated. TMS320F28335 has a logic flaw vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202502-3426 No CVE The video surveillance management system of Xiamen Sixin Communication Technology Co., Ltd. has a logical flaw vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Xiamen Four-Faith Communication Technology Co., Ltd. is a global leading provider of IoT communication equipment and solutions. There is a logic flaw in the video surveillance management system of Xiamen Four-Faith Communication Technology Co., Ltd., which can be exploited by attackers to obtain sensitive information.
VAR-202502-2111 CVE-2025-25745 D-Link Systems, Inc.  of  dir-853  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetQuickVPNSettings module. D-Link Systems, Inc. (DoS) It may be in a state. The D-Link DIR-853 is a dual-band wireless router that supports the 802.11ac protocol, providing dual-band network connections in 2.4GHz (up to 400Mbps) and 5GHz (up to 867Mbps), making it ideal for HD video streaming and online gaming. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202502-2912 CVE-2025-25740 D-Link Systems, Inc.  of  dir-853  Stack-based buffer overflow vulnerability in firmware CVSS V2: 6.5
CVSS V3: 5.5
Severity: MEDIUM
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the PSK parameter in the SetQuickVPNSettings module. D-Link Systems, Inc. (DoS) It may be in a state. The D-Link DIR-853 is a dual-band wireless router that supports the 802.11ac protocol, providing dual-band network connections in 2.4GHz (up to 400Mbps) and 5GHz (up to 867Mbps), making it ideal for HD video streaming and online gaming. An attacker could exploit this vulnerability to cause a denial of service
VAR-202502-3257 No CVE Sharp Corporation MX-3071 has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
MX-3071 is a digital multifunction printer, mainly used for black and white copying, printing and scanning functions. Sharp Corporation MX-3071 has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202502-2078 No CVE Beijing Digital China Cloud Technology Co., Ltd. DCWS-6028 has an unauthorized access vulnerability CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
DCWS-6028 is a new generation of high-performance 10G smart wireless controller, designed for large and medium-sized wireless network environments. Beijing Digital China Cloud Technology Co., Ltd. DCWS-6028 has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202502-0188 CVE-2025-25067 mySCADA Technologies  of  myPRO  In  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: Critical
mySCADA myPRO Manager is vulnerable to an OS command injection which could allow a remote attacker to execute arbitrary OS commands. mySCADA Technologies of myPRO for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. mySCADA myPRO is a professional HMI/SCADA system from mySCADA, designed for visualization and control of industrial processes. mySCADA myPRO has an operating system command injection vulnerability that stems from improper input validation
VAR-202502-0190 CVE-2025-24865 mySCADA Technologies  of  myPRO  Vulnerability regarding lack of authentication for critical features in CVSS V2: 10.0
CVSS V3: 10.0
Severity: Critical
The administrative web interface of mySCADA myPRO Manager can be accessed without authentication which could allow an unauthorized attacker to retrieve sensitive information and upload files without the associated password. mySCADA Technologies of myPRO There is a vulnerability in the lack of authentication for critical features.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. mySCADA myPRO is a professional HMI/SCADA system from mySCADA, designed for visualization and control of industrial processes. mySCADA myPRO has an access control error vulnerability that allows access to the management interface without authentication
VAR-202502-0191 CVE-2025-23411 mySCADA Technologies  of  myPRO  Cross-site request forgery vulnerability in CVSS V2: 7.5
CVSS V3: 6.3
Severity: Medium
mySCADA myPRO Manager is vulnerable to cross-site request forgery (CSRF), which could allow an attacker to obtain sensitive information. An attacker would need to trick the victim in to visiting an attacker-controlled website. mySCADA myPRO is a professional HMI/SCADA system from mySCADA, designed for visualization and control of industrial processes
VAR-202502-0189 CVE-2025-22896 mySCADA Technologies  of  myPRO  Vulnerability in plaintext storage of important information in CVSS V2: 7.8
CVSS V3: 8.6
Severity: Critical
mySCADA myPRO Manager stores credentials in cleartext, which could allow an attacker to obtain sensitive information. mySCADA Technologies of myPRO There is a vulnerability in plaintext storage of important information.Information may be obtained. mySCADA myPRO is a professional HMI/SCADA system from mySCADA, designed for visualization and control of industrial processes. mySCADA myPRO has an information leakage vulnerability due to the storage of credentials in plain text
VAR-202502-1117 CVE-2025-25901 TP-LINK Technologies  of  TL-WR841ND  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11, triggered by the dnsserver1 and dnsserver2 parameters at /userRpm/WanSlaacCfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. TP-LINK Technologies of TL-WR841ND An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state
VAR-202502-0688 CVE-2025-25898 TP-LINK Technologies  of  TL-WR841ND  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the pskSecret parameter at /userRpm/WlanSecurityRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. TP-LINK Technologies of TL-WR841ND An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state
VAR-202502-1394 CVE-2025-25897 TP-LINK Technologies  of  TL-WR841ND  Out-of-bounds write vulnerability in firmware CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the 'ip' parameter at /userRpm/WanStaticIpV6CfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. TP-LINK Technologies of TL-WR841ND An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state
VAR-202502-2288 No CVE Qi'anxin Netshen Information Technology (Beijing) Co., Ltd. Netshen SecFox operation and maintenance security management and audit system has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
SecFox Operation and Maintenance Security Management and Auditing System is a comprehensive operation and maintenance management system that integrates identity authentication, account management, permission control and operation and maintenance auditing. Qi'anxin SecFox Operation and Maintenance Security Management and Auditing System of SecFox ...
VAR-202502-2077 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. AC8V4.0 has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
AC8V4.0 is an AC1200 dual-gigabit wireless router. Shenzhen Jixiang Tengda Technology Co., Ltd. AC8V4.0 has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202502-1254 CVE-2025-25343 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC6 V15.03.05.16 firmware has a buffer overflow vulnerability in the formexeCommand function. Shenzhen Tenda Technology Co.,Ltd. of AC6 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202502-1396 CVE-2025-25741 D-Link Systems, Inc.  of  dir-853  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.5
CVSS V3: 5.4
Severity: MEDIUM
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the IPv6_PppoePassword parameter in the SetIPv6PppoeSettings module. D-Link Systems, Inc. D-Link DIR-853 is a router from D-Link, a Chinese company. No detailed vulnerability details are currently available
VAR-202502-1395 CVE-2025-25746 D-Link Systems, Inc.  of  dir-853  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetWanSettings module. D-Link Systems, Inc. of dir-853 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-853 is a router from D-Link, a Chinese company. No detailed vulnerability details are currently provided