VARIoT IoT vulnerabilities database
    | VAR-202509-0021 | CVE-2025-9783 | TOTOLINK of A702R Buffer error vulnerability in firmware | 
                                      
                                        CVSS V2: 9.0 CVSS V3: 8.8 Severity: High  | 
                            A vulnerability was determined in TOTOLINK A702R 4.0.0-B20211108.1423. This issue affects the function sub_418030 of the file /boafrm/formParentControl. Executing manipulation of the argument submit-url can lead to buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. TOTOLINK of A702R The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK A702R is a wireless router manufactured by China's TOTOLINK Electronics, primarily used for home network connectivity and signal coverage. 
The TOTOLINK A702R suffers from a buffer overflow vulnerability caused by a failure to properly validate the length of input data in the submit-url parameter in the /boafrm/formParentControl file. This vulnerability could allow an attacker to execute arbitrary code on the system or cause a denial of service
                        
| VAR-202509-0188 | CVE-2025-9782 | TOTOLINK of A702R Buffer error vulnerability in firmware | 
                                      
                                        CVSS V2: 9.0 CVSS V3: 8.8 Severity: High  | 
                            A vulnerability was found in TOTOLINK A702R 4.0.0-B20211108.1423. This vulnerability affects the function sub_4466F8 of the file /boafrm/formOneKeyAccessButton. Performing manipulation of the argument submit-url results in buffer overflow. The attack may be initiated remotely. The exploit has been made public and could be used. TOTOLINK of A702R The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK A702R is a wireless router manufactured by China's TOTOLINK Electronics, primarily used for home network connectivity and signal coverage. 
The TOTOLINK A702R suffers from a buffer overflow vulnerability caused by a failure to properly validate the length of input data in the submit-url parameter in the file /boafrm/formOneKeyAccessButton. An attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service
                        
| VAR-202509-0071 | CVE-2025-9781 | TOTOLINK of A702R Buffer error vulnerability in firmware | 
                                      
                                        CVSS V2: 9.0 CVSS V3: 8.8 Severity: High  | 
                            A vulnerability has been found in TOTOLINK A702R 4.0.0-B20211108.1423. This affects the function sub_4162DC of the file /boafrm/formFilter. Such manipulation of the argument ip6addr leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A702R The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK A702R is a wireless router manufactured by China's TOTOLINK Electronics, primarily used for home network connectivity and signal coverage. This vulnerability could allow an attacker to execute arbitrary code or cause a denial of service (DoS) on the system
                        
| VAR-202509-0010 | CVE-2025-9780 | TOTOLINK of A702R Buffer error vulnerability in firmware | 
                                      
                                        CVSS V2: 9.0 CVSS V3: 8.8 Severity: High  | 
                            A flaw has been found in TOTOLINK A702R 4.0.0-B20211108.1423. Affected by this issue is the function sub_419BE0 of the file /boafrm/formIpQoS. This manipulation of the argument mac causes buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used. TOTOLINK of A702R The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK A702R is a wireless router manufactured by China's TOTOLINK Electronics, primarily used for home network connectivity and signal coverage. 
The TOTOLINK A702R suffers from a buffer overflow vulnerability caused by a failure to properly validate the length of input data in the parameter mac in the file /boafrm/formIpQoS. This vulnerability could allow an attacker to execute arbitrary code on the system or cause a denial of service
                        
| VAR-202509-0003 | CVE-2025-9779 | TOTOLINK of A702R Buffer error vulnerability in firmware | 
                                      
                                        CVSS V2: 9.0 CVSS V3: 8.8 Severity: High  | 
                            A vulnerability was detected in TOTOLINK A702R 4.0.0-B20211108.1423. Affected by this vulnerability is the function sub_4162DC of the file /boafrm/formFilter. The manipulation of the argument ip6addr results in buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used. TOTOLINK of A702R The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK A702R is a wireless router manufactured by China's TOTOLINK Electronics, primarily used for home network connectivity and signal coverage. This vulnerability could allow an attacker to execute arbitrary code or cause a denial of service
                        
| VAR-202509-0708 | CVE-2025-58318 | Delta Electronics DIAView Security Bypass Vulnerability | 
                                      
                                        CVSS V2: 6.4 CVSS V3: - Severity: Medium  | 
                            Delta Electronics DIAView has an authentication bypass vulnerability
                        
| VAR-202509-0115 | CVE-2025-20708 | Out-of-bounds write vulnerability in multiple MediaTek products | 
                                      
                                        CVSS V2: - CVSS V3: 8.1 Severity: HIGH  | 
                            In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01123853; Issue ID: MSV-4131. NR15 , nr16 , NR17 A number of MediaTek products, including the following, contain out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
                        
| VAR-202509-0101 | CVE-2025-20703 | Out-of-bounds read vulnerability in multiple MediaTek products | 
                                      
                                        CVSS V2: - CVSS V3: 7.5 Severity: HIGH  | 
                            In Modem, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01599794; Issue ID: MSV-3708. NR15 , nr16 , NR17 Multiple MediaTek products, including the following, contain vulnerabilities related to out-of-bounds reading.Service operation interruption (DoS) It may be in a state
                        
| VAR-202509-0001 | CVE-2025-9752 | D-Link Corporation of DIR-852 in the firmware OS Command injection vulnerability | 
                                      
                                        CVSS V2: 7.5 CVSS V3: 7.3 Severity: Medium  | 
                            A security vulnerability has been detected in D-Link DIR-852 1.00CN B09. Impacted is the function soapcgi_main of the file soap.cgi of the component SOAP Service. Such manipulation of the argument service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer. (DoS) It may be in a state
                        
| VAR-202508-2441 | CVE-2025-9748 | Shenzhen Tenda Technology Co.,Ltd. of ch22 Out-of-bounds write vulnerability in firmware | 
                                      
                                        CVSS V2: 9.0 CVSS V3: 8.8 Severity: High  | 
                            A vulnerability was determined in Tenda CH22 1.0.0.1. Affected by this issue is the function fromIpsecitem of the file /goform/IPSECsave of the component httpd. Executing manipulation of the argument ipsecno can lead to stack-based buffer overflow. The attack may be performed from remote. Shenzhen Tenda Technology Co.,Ltd. of ch22 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. 
The Tenda CH22 suffers from a buffer overflow vulnerability caused by a failure to properly validate the length of the input data in the parameter "ipsecno" in the file "/goform/IPSECsave". This vulnerability could allow an attacker to execute arbitrary code on the system or cause a denial of service
                        
| VAR-202508-2475 | CVE-2025-9731 | Shenzhen Tenda Technology Co.,Ltd. of AC9 Hardcoded password usage vulnerability in firmware | 
                                      
                                        CVSS V2: 1.0 CVSS V3: 2.5 Severity: Low  | 
                            A vulnerability was determined in Tenda AC9 15.03.05.19. The impacted element is an unknown function of the file /etc_ro/shadow of the component Administrative Interface. This manipulation causes hard-coded credentials. It is possible to launch the attack on the local host. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been publicly disclosed and may be utilized. Shenzhen Tenda Technology Co.,Ltd. of AC9 The firmware contains vulnerabilities related to the use of hard-coded passwords and vulnerabilities related to the use of hard-coded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker could exploit this vulnerability to compromise confidentiality
                        
| VAR-202508-2617 | CVE-2025-9727 | D-Link Corporation of DIR-816L Command injection vulnerability in firmware | 
                                      
                                        CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low  | 
                            A weakness has been identified in D-Link DIR-816L 206b01. Affected by this issue is the function soapcgi_main of the file /soap.cgi. This manipulation of the argument service causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-816L The firmware contains a command injection vulnerability. (DoS) It may be in a state
                        
| VAR-202508-3455 | No CVE | Mosa Technology (Shanghai) Co., Ltd.'s NPort 5410 has an unauthorized access vulnerability | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            The NPort 5410 is an industrial-grade serial communication processor primarily used to connect traditional serial devices to a network for remote management and monitoring.
The NPort 5410 from Mosa Technology (Shanghai) Co., Ltd. has an unauthorized access vulnerability that could allow attackers to obtain sensitive information.
                        
| VAR-202508-2645 | CVE-2025-9377 | plural TP-LINK Technologies In the product OS Command injection vulnerability | 
                                      
                                        CVSS V2: - CVSS V3: 7.2 Severity: HIGH  | 
                            The authenticated remote command execution (RCE) vulnerability exists  in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9. 
This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108. 
Both products have reached the status of EOL (end-of-life). 
It's recommending to 
purchase the new 
product to ensure better performance and security. If replacement is not
 an option in the short term, please use the second reference link to 
download and install the patch(es). TP-LINK Technologies of TL-WR841N firmware, TL-WR841ND firmware, Archer C7 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
                        
| VAR-202508-2727 | CVE-2025-55763 | CivetWeb project of CivetWeb Stack-based buffer overflow vulnerability in | 
                                      
                                        CVSS V2: - CVSS V3: 7.5 Severity: HIGH  | 
                            Buffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or arbitrary code execution. CivetWeb project of CivetWeb Exists in a stack-based buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
                        
| VAR-202508-2393 | CVE-2025-9605 | Shenzhen Tenda Technology Co.,Ltd. of ac21 firmware and ac23 Buffer error vulnerability in firmware | 
                                      
                                        CVSS V2: 10.0 CVSS V3: 9.8 Severity: High  | 
                            A security vulnerability has been detected in Tenda AC21 and AC23 16.03.08.16. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. Such manipulation of the argument mac leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. Shenzhen Tenda Technology Co.,Ltd. of ac21 firmware and ac23 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
                        
| VAR-202508-2619 | CVE-2025-9603 | Telesquare of TLR-2005KSH Command injection vulnerability in firmware | 
                                      
                                        CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low  | 
                            A vulnerability was determined in Telesquare TLR-2005KSH 1.2.4. The affected element is an unknown function of the file /cgi-bin/internet.cgi?Command=lanCfg. Executing manipulation of the argument Hostname can lead to command injection. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. Telesquare of TLR-2005KSH Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
                        
| VAR-202508-3771 | No CVE | LanZhuo Digital Technology Co., Ltd.'s SupOS industrial operating system has an information leakage vulnerability | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            The SupOS industrial operating system, developed by LanZhuo Digital Technology Co., Ltd., directly addresses core manufacturing scenarios, addressing issues such as production equipment management, production control, production management, production safety, and business operations. It helps companies achieve the five key goals of safety, quality improvement, cost reduction, efficiency improvement, and environmental protection.
LanZhuo Digital Technology Co., Ltd.'s SupOS industrial operating system contains an information leakage vulnerability that could be exploited by attackers to obtain sensitive information.
                        
| VAR-202508-3772 | No CVE | Toshiba Corporation. e-STUDIO478S has an unauthorized access vulnerability | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            The e-STUDIO478S is a printer.
Toshiba Corporation. The e-STUDIO478S has an unauthorized access vulnerability that could allow an attacker to obtain sensitive information.
                        
| VAR-202508-2427 | CVE-2025-9577 | TOTOLINK of x2000r Firmware vulnerabilities | 
                                      
                                        CVSS V2: 1.0 CVSS V3: 2.5 Severity: Low  | 
                            A security flaw has been discovered in TOTOLINK X2000R up to 2.0.0. The affected element is an unknown function of the file /etc/shadow.sample of the component Administrative Interface. The manipulation results in use of default credentials. Attacking locally is a requirement. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit has been released to the public and may be exploited. TOTOLINK of x2000r There are unspecified vulnerabilities in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK X2000R is a WiFi 6 router released by China's TOTOLINK Electronics. It supports Gigabit networking and Easy Mesh functionality, enabling multi-device connectivity and wireless expansion. Detailed vulnerability details are currently unavailable