VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202505-1788 CVE-2025-4825 plural  TOTOLINK  Buffer error vulnerability in the product CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability classified as critical was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. This vulnerability affects unknown code of the file /boafrm/formDMZ of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A702R firmware, A3002R firmware, A3002RU The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202505-1822 CVE-2025-4824 plural  TOTOLINK  Buffer error vulnerability in the product CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability classified as critical has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. This affects an unknown part of the file /boafrm/formWsc of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A702R firmware, A3002R firmware, A3002RU The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202505-1809 CVE-2025-4823 plural  TOTOLINK  Buffer error vulnerability in the product CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. It has been rated as critical. Affected by this issue is the function submit-url of the file /boafrm/formReflashClientTbl of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A702R firmware, A3002R firmware, A3002RU The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202505-1764 CVE-2025-4810 Shenzhen Tenda Technology Co.,Ltd.  of  AC7  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in Tenda AC7 15.03.06.44. It has been declared as critical. Affected by this vulnerability is the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument reboot_time leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. of AC7 The firmware contains a buffer error vulnerability, a stack-based buffer overflow vulnerability, and an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC7 has a buffer overflow vulnerability, which is caused by the parameter reboot_time in the file /goform/SetRebootTimer failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202505-1823 CVE-2025-4809 Shenzhen Tenda Technology Co.,Ltd.  of  AC7  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in Tenda AC7 15.03.06.44. It has been classified as critical. Affected is the function fromSafeSetMacFilter of the file /goform/setMacFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. of AC7 The firmware contains a buffer error vulnerability, a stack-based buffer overflow vulnerability, and an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC7 has a buffer overflow vulnerability, which is caused by the failure of the parameter deviceList in the file /goform/setMacFilterCfg to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202505-2435 CVE-2025-4600 Google Cloud Classic Application Load Balancer Input Validation Error Vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: High
A request smuggling vulnerability existed in the Google Cloud Classic Application Load Balancer due to improper handling of chunked-encoded HTTP requests. This allowed attackers to craft requests that could be misinterpreted by backend servers. The issue was fixed by disallowing stray data after a chunk, and is no longer exploitable. No action is required as Classic Application Load Balancer service after 2025-04-26 is not vulnerable. No detailed vulnerability details are currently provided
VAR-202505-1651 CVE-2025-4756 D-Link Systems, Inc.  of  di-7003g  Improper Shutdown and Release of Resources in Firmware Vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125). It has been declared as problematic. This vulnerability affects unknown code of the file /H5/restart.asp. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of di-7003g A vulnerability exists in firmware related to improper shutdown and release of resources.Service operation interruption (DoS) It may be in a state. D-Link DI-7003GV2 is a router from D-Link, a Chinese company. D-Link DI-7003GV2 has a denial of service vulnerability, which is caused by improper permission management of the file /H5/restart.asp
VAR-202505-1721 CVE-2025-4755 D-Link Systems, Inc.  of  di-7003g  Authentication vulnerability in firmware CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125). It has been classified as critical. This affects the function sub_497DE4 of the file /H5/netconfig.asp. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of di-7003g An authentication vulnerability exists in firmware.Information may be tampered with. D-Link DI-7003GV2 is a router from D-Link, a Chinese company. D-Link DI-7003GV2 has an authorization vulnerability, which is caused by improper permission management of function sub_497DE4 in file /H5/netconfig.asp. No detailed vulnerability details are provided at present
VAR-202505-1652 CVE-2025-4753 D-Link Systems, Inc.  of  di-7003g  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125) and classified as problematic. Affected by this issue is some unknown functionality of the file /login.data. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of di-7003g There are unspecified vulnerabilities in the firmware.Information may be obtained. D-Link DI-7003GV2 is a router from D-Link, a Chinese company. The vulnerability is caused by improper access control of the file /login.data. Attackers can exploit this vulnerability to cause information leakage
VAR-202505-1901 CVE-2025-4752 D-Link Systems, Inc.  of  di-7003g  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability has been found in D-Link DI-7003GV2 24.04.18D1 R(68125) and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /install_base.data. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of di-7003g There are unspecified vulnerabilities in the firmware.Information may be obtained. D-Link DI-7003GV2 is a router from D-Link, a Chinese company. Attackers can exploit this vulnerability to cause information leakage
VAR-202505-1689 CVE-2025-4751 D-Link Systems, Inc.  of  di-7003g  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability, which was classified as problematic, was found in D-Link DI-7003GV2 24.04.18D1 R(68125). Affected is an unknown function of the file /index.data. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of di-7003g There are unspecified vulnerabilities in the firmware.Information may be obtained. D-Link DI-7003GV2 is a router from D-Link, a Chinese company. The vulnerability is caused by insufficient protection of sensitive information in the file /index.data. Attackers can exploit this vulnerability to cause information leakage
VAR-202505-1690 CVE-2025-4750 D-Link Systems, Inc.  of  di-7003g  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability, which was classified as problematic, has been found in D-Link DI-7003GV2 24.04.18D1 R(68125). This issue affects some unknown processing of the file /H5/get_version.data of the component Configuration Handler. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of di-7003g There are unspecified vulnerabilities in the firmware.Information may be obtained. D-Link DI-7003GV2 is a router from D-Link, a Chinese company. The vulnerability is caused by improper access control of the file /H5/get_version.data. Attackers can exploit this vulnerability to cause information leakage
VAR-202505-1691 CVE-2025-4749 D-Link Systems, Inc.  of  di-7003g  Improper Shutdown and Release of Resources in Firmware Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: High
A vulnerability classified as critical was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This vulnerability affects the function sub_4983B0 of the file /H5/backup.asp?opt=reset of the component Factory Reset Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. D-Link Systems, Inc. of di-7003g A vulnerability exists in firmware related to improper shutdown and release of resources.Service operation interruption (DoS) It may be in a state. D-Link DI-7003GV2 is a router from D-Link, a Chinese company
VAR-202505-1677 CVE-2025-4733 TOTOLINK A3002R and A3002RU Buffer Overflow Vulnerability (CNVD-2025-11996) CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability, which was classified as critical, has been found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. This issue affects some unknown processing of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation of the argument mac leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK A3002R and A3002RU are routers produced by TOTOLINK, supporting multiple network functions and services. No detailed vulnerability details are currently available
VAR-202505-1746 CVE-2025-4732 TOTOLINK A3002R and A3002RU Buffer Overflow Vulnerability (CNVD-2025-11997) CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability classified as critical was found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. This vulnerability affects unknown code of the file /boafrm/formFilter of the component HTTP POST Request Handler. The manipulation of the argument ip6addr leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK A3002R and A3002RU are two high-performance dual-band wireless routers. The vulnerability is related to /boafrm/formFilter and is caused by the failure to properly validate the ip6addr parameter entered by the user. An attacker can exploit this vulnerability to execute arbitrary code
VAR-202505-1655 CVE-2025-4731 TOTOLINK A3002R and A3002RU Buffer Overflow Vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability classified as critical has been found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. This affects an unknown part of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type/ip_subnet leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. TOTOLINK A3002R and A3002RU are routers produced by TOTOLINK, supporting multiple network functions and services. No detailed vulnerability details are currently provided
VAR-202505-1723 CVE-2025-4730 TOTOLINK A3002R/A3002RU Buffer Overflow Vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. It has been rated as critical. Affected by this issue is some unknown functionality of the file /boafrm/formMapDel of the component HTTP POST Request Handler. The manipulation of the argument devicemac1 leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK A3002R and A3002RU are wireless router products under the TOTOLINK brand, supporting multiple network functions and services. No detailed vulnerability details are currently provided
VAR-202505-1630 CVE-2025-4729 TOTOLINK A3002R and A3002RU Command Injection Vulnerability CVSS V2: 6.5
CVSS V3: 6.3
Severity: Medium
A vulnerability was found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formMapDelDevice of the component HTTP POST Request Handler. The manipulation of the argument macstr leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK A3002R and A3002RU are routers produced by TOTOLINK, supporting multiple network functions and services. No detailed vulnerability details are currently provided
VAR-202505-2167 CVE-2025-45863 TOTOLINK  of  A3002R  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the macstr parameter in the formMapDelDevice interface. TOTOLINK of A3002R Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the macstr parameter in the formMapDelDevice interface failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202505-1719 CVE-2025-45865 TOTOLINK  of  A3002R  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the dnsaddr parameter in the formDhcpv6s interface. TOTOLINK of A3002R Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3002R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the failure of the dnsaddr parameter in the formDhcpv6s interface to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service