VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202502-2084 No CVE Jiong Electronics (Shenzhen) Co., Ltd. TOTOLINK N210RE command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
TOTOLINK N210RE is a wireless router. Jiong Electronics (Shenzhen) Co., Ltd. TOTOLINK N210RE command execution vulnerability, attackers can exploit this vulnerability to execute arbitrary commands.
VAR-202502-2085 No CVE Beijing Netcom Technology Co., Ltd. NS-ASG application security gateway has a SQL injection vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
NS-ASG Application Security Gateway is an application security access product that integrates software and hardware, has excellent performance, and integrates IPSEC and SSL. Beijing Netcom Technology Co., Ltd.'s NS-ASG Application Security Gateway has a SQL injection vulnerability, which can be exploited by attackers to obtain sensitive information from the database.
VAR-202502-2086 No CVE RICOH IM 430 and RICOH IM C2000 have a command execution vulnerability CVSS V2: 8.5
CVSS V3: -
Severity: HIGH
RICOH IM 430 is a black and white laser multifunction printer. RICOH IM C2000 is a color digital multifunction printer. RICOH IM 430 and RICOH IM C2000 have command execution vulnerabilities. Attackers can exploit this vulnerability to execute printer commands and operate the printer, which may cause the printer to lose response, thus affecting the printing service.
VAR-202502-2290 No CVE Schneider Electric Schneider PLC M340 has a denial of service vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Schneider Electric is an expert in energy efficiency management and automation. Schneider Electric Schneider PLC M340 has a denial of service vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202502-2291 No CVE D-Link DWR-M961 has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
DWR-M961 is a router. D-Link DWR-M961 has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202502-2087 No CVE D-Link DWR-M961 has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
DWR-M961 is a router. D-Link DWR-M961 has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202502-0267 CVE-2024-51534 Dell's  data domain operating system  Past traversal vulnerability in CVSS V2: 6.2
CVSS V3: 7.1
Severity: HIGH
Dell PowerProtect DD versions prior to DDOS 8.3.0.0, 7.10.1.50, and 7.13.1.20 contain a path traversal vulnerability. A local low privileged could potentially exploit this vulnerability to gain unauthorized overwrite of OS files stored on the server filesystem. Exploitation could lead to denial of service. Dell's data domain operating system Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Dell PowerProtect DD is a series of data protection storage appliances from Dell, built on the Data Domain platform and designed specifically for enterprise users. Dell PowerProtect DD contains a path traversal vulnerability that could allow an attacker to illegally overwrite operating system files in the server file system, causing a denial of service
VAR-202501-3669 CVE-2025-0848 Shenzhen Tenda Technology Co.,Ltd.  of  A18  Buffer error vulnerability in firmware CVSS V2: 6.8
CVSS V3: 6.5
Severity: High
A vulnerability was found in Tenda A18 up to 15.13.07.09. It has been rated as critical. This issue affects the function SetCmdlineRun of the file /goform/SetCmdlineRun of the component HTTP POST Request Handler. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. of A18 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter wpapsk_crypto5g failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system and cause a denial of service
VAR-202501-3604 CVE-2025-20061 mySCADA myPRO Command Injection Remote Code Execution Vulnerability CVSS V2: -
CVSS V3: 9.8
Severity: Critical
mySCADA myPRO does not properly neutralize POST requests sent to a specific port with email information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system. Authentication is not required to exploit this vulnerability.The specific flaw exists within the web service, which listens on TCP port 34022 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call
VAR-202501-3603 CVE-2025-20014 mySCADA myPRO Command Injection Remote Code Execution Vulnerability CVSS V2: -
CVSS V3: 9.8
Severity: Critical
mySCADA myPRO does not properly neutralize POST requests sent to a specific port with version information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system. Authentication is not required to exploit this vulnerability.The specific flaw exists within the web service, which listens on TCP port 34022 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call
VAR-202501-4304 CVE-2024-48852 ABB FLXeon Log Information Disclosure Vulnerability CVSS V2: 9.7
CVSS V3: 9.4
Severity: Medium
Insertion of Sensitive Information into Log File vulnerability observed in FLEXON. Some information may be improperly disclosed through https access. This issue affects FLXEON through <= 9.3.4. ABB FLXeon is a series of controllers from Swiss company ABB
VAR-202501-4245 CVE-2024-48849 ABB FLXeon Security Bypass Vulnerability CVSS V2: 9.7
CVSS V3: 9.4
Severity: High
Missing Origin Validation in WebSockets vulnerability in FLXEON. Session management was not sufficient to prevent unauthorized HTTPS requests.  This issue affects FLXEON: through <= 9.3.4. ABB FLXeon is a series of controllers from Swiss company ABB. No detailed vulnerability details are available at this time
VAR-202501-3666 CVE-2025-24085 Freed memory usage vulnerability in multiple Apple products CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2. iPadOS , iOS , macOS Multiple Apple products contain a freed memory usage vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. VisionOS is an AR glasses system released by Apple at the 2023 Apple Worldwide Developers Conference on June 6, 2023. Apple Vision Pro will be equipped with this system for the first time. tvOS is a TV operating system developed by Apple based on iOS. watchOS is a watch operating system developed by Apple based on iOS for use on Apple Watch. iPadOS‌ is a mobile operating system developed by Apple for iPad devices. It is developed based on iOS and is optimized specifically for iPad. macOS is an operating system developed by Apple that runs on Macintosh computers. ‌ Many Apple products have a memory release and reuse vulnerability, which attackers can exploit to elevate privileges
VAR-202501-3672 CVE-2025-0730 TP-LINK Technologies  of  TL-SG108E  in the firmware  GET  Vulnerability regarding information leakage from query string in request CVSS V2: 2.6
CVSS V3: 3.7
Severity: Medium
A vulnerability classified as problematic has been found in TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304. Affected is an unknown function of the file /usr_account_set.cgi of the component HTTP GET Request Handler. The manipulation of the argument username/password leads to use of get request method with sensitive query strings. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.0 Build 20250124 Rel. 54920(Beta) is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early. They reacted very professional and provided a pre-fix version for their customers. TP-LINK Technologies of TL-SG108E The firmware has GET There is a vulnerability related to information leakage from the query string in the request.Information may be obtained
VAR-202501-4110 CVE-2024-57595 D-Link DIR-825 Command Injection Vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
DLINK DIR-825 REVB 2.03 devices have an OS command injection vulnerability in the CGl interface apc_client_pin.cgi, which allows remote attackers to execute arbitrary commands via the parameter "wps_pin" passed to the apc_client_pin.cgi binary through a POST request. D-Link DIR-825 is a router from D-Link. There is a command injection vulnerability in DLINK DIR-825 REVB 2.03 version. The vulnerability is caused by the failure to properly filter special characters and commands in the CGl interface apc_client_pin.cgi
VAR-202501-3954 CVE-2024-57590 TRENDnet  of  TEW-632BRP  Command injection vulnerability in firmware CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
TRENDnet TEW-632BRP v1.010B31 devices have an OS command injection vulnerability in the CGl interface "ntp_sync.cgi",which allows remote attackers to execute arbitrary commands via parameter "ntp_server" passed to the "ntp_sync.cgi" binary through a POST request. TRENDnet of TEW-632BRP Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202501-3406 CVE-2024-50698 SUNGROW  of  WiNet-S  Heap-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
SunGrow WiNet-SV200.001.00.P027 and earlier versions is vulnerable to heap-based buffer overflow due to bounds checks of the MQTT message content. SUNGROW of WiNet-S A heap-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SunGrow WiNet-S is a LAN communication module from SunGrow, a Chinese company
VAR-202501-2797 CVE-2024-50697 SUNGROW  of  WiNet-S  Classic buffer overflow vulnerability in firmware CVSS V2: 7.6
CVSS V3: 8.1
Severity: HIGH
In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when decrypting MQTT messages, the code that parses specific TLV fields does not have sufficient bounds checks. This may result in a stack-based buffer overflow. SUNGROW of WiNet-S Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SunGrow WiNet-S is a LAN communication module from SunGrow, a Chinese company. An attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-2184 CVE-2024-50695 SUNGROW  of  WiNet-S  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
SunGrow WiNet-SV200.001.00.P027 and earlier versions is vulnerable to stack-based buffer overflow when parsing MQTT messages, due to missing MQTT topic bounds checks. SUNGROW of WiNet-S A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SunGrow WiNet-S is a LAN communication module from SunGrow, a Chinese company
VAR-202501-4123 CVE-2024-50694 SUNGROW  of  WiNet-S  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when copying the timestamp read from an MQTT message, the underlying code does not check the bounds of the buffer that is used to store the message. This may lead to a stack-based buffer overflow. SUNGROW of WiNet-S A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SunGrow WiNet-S is a LAN communication module from SunGrow, a Chinese company. An attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service