VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202505-0171 CVE-2024-57233 of netgear  RAX50  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
NETGEAR RAX5 (AX1600 WiFi Router) v1.0.2.26 was discovered to contain a command injection vulnerability via the iface parameter in the vif_disable function. of netgear RAX50 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR RAX5 is a wireless router from NETGEAR. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202505-0242 CVE-2024-57232 of netgear  RAX50  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_wps_gen_pincode function. of netgear RAX50 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR RAX5 is a wireless router from NETGEAR. An attacker can exploit this vulnerability to execute arbitrary commands
VAR-202505-0152 CVE-2024-57231 of netgear  RAX50  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_do_enr_pbc_wps function. of netgear RAX50 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR RAX5 is a wireless router from NETGEAR. An attacker can exploit this vulnerability to execute arbitrary commands
VAR-202505-0243 CVE-2024-57230 of netgear  RAX50  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_do_enr_pin_wps function. of netgear RAX50 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR RAX5 is a wireless router from NETGEAR. The vulnerability is caused by improper processing of the ifname parameter in the apcli_do_enr_pin_wps function. Attackers can exploit this vulnerability to launch attacks, causing the system to be damaged or controlled
VAR-202505-0151 CVE-2024-57229 of netgear  RAX50  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection vulnerability via the devname parameter in the reset_wifi function. of netgear RAX50 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR RAX5 is a wireless router from NETGEAR. An attacker can exploit this vulnerability to execute arbitrary commands
VAR-202505-0256 CVE-2025-45042 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC9 v15.03.05.14 was discovered to contain a command injection vulnerability via the Telnet function. Shenzhen Tenda Technology Co.,Ltd. of AC9 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. No detailed vulnerability details are currently provided
VAR-202505-0066 CVE-2025-4271 TOTOLINK  of  A720R  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability was found in TOTOLINK A720R 4.1.5cu.374. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument topicurl with the input showSyslog leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A720R There are unspecified vulnerabilities in the firmware.Information may be obtained. TOTOLINK A720R is a wireless router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to cause information leakage
VAR-202505-0056 CVE-2025-4270 TOTOLINK  of  A720R  Firmware vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability was found in TOTOLINK A720R 4.1.5cu.374. It has been classified as problematic. Affected is an unknown function of the file /cgi-bin/cstecgi.cgi of the component Config Handler. The manipulation of the argument topicurl with the input getInitCfg/getSysStatusCfg leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A720R There are unspecified vulnerabilities in the firmware.Information may be obtained. TOTOLINK A720R is a wireless router from China's TOTOLINK Electronics. TOTOLINK A720R has an access control error vulnerability, which is caused by improper processing of the parameter topicurl in the file /cgi-bin/cstecgi.cgi. Attackers can exploit this vulnerability to cause information leakage
VAR-202505-0088 CVE-2025-4269 TOTOLINK  of  A720R  Firmware vulnerabilities CVSS V2: 6.4
CVSS V3: 6.5
Severity: Medium
A vulnerability was found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi of the component Log Handler. The manipulation of the argument topicurl with the input clearDiagnosisLog/clearSyslog/clearTracerouteLog leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A720R There are unspecified vulnerabilities in the firmware.Information may be tampered with. TOTOLINK A720R is a wireless router from China's TOTOLINK Electronics. No detailed vulnerability details are currently provided
VAR-202505-0032 CVE-2025-4268 TOTOLINK  of  A720R  Authentication vulnerability in firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: Medium
A vulnerability has been found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument topicurl with the input RebootSystem leads to missing authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A720R The firmware contains vulnerabilities related to authentication and lack of authentication for critical functions.Service operation interruption (DoS) It may be in a state. TOTOLINK A720R is a wireless router of China's TOTOLINK Electronics. TOTOLINK A720R has an improper authentication vulnerability, which is caused by improper processing of the parameter topicurl in the file /cgi-bin/cstecgi.cgi. No detailed vulnerability details are provided at present
VAR-202505-0145 CVE-2025-20670 Certificate validation vulnerability in multiple MediaTek products CVSS V2: -
CVSS V3: 5.7
Severity: MEDIUM
In Modem, there is a possible permission bypass due to improper certificate validation. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with User execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01334347; Issue ID: MSV-2772. media tech's nr16 , NR17 , NR17R Exists in a certificate validation vulnerability.Information may be obtained
VAR-202505-0190 CVE-2025-20667 Encryption vulnerability in multiple MediaTek products CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741. LR12A , LR13 , NR15 There are vulnerabilities in the encryption strength of multiple MediaTek products, including:Information may be obtained
VAR-202505-0239 CVE-2025-20666 media tech's  NR15  Reachable Assertiveness Vulnerability in CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00650610; Issue ID: MSV-2933. media tech's NR15 Exists in a reachable assertiveness vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202505-0988 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. AC6 has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
AC6 is an 11ac dual-band wireless router designed for 100M fiber homes. AC6 of Shenzhen Jixiang Tengda Technology Co., Ltd. has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202505-1096 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR800G has an arbitrary file write vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
NBR800G is a router for Internet behavior management. Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR800G has an arbitrary file write vulnerability, which can be exploited by attackers to obtain server permissions.
VAR-202505-1239 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. AC6 has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
AC6 is an 11ac dual-band wireless router designed for 100M fiber homes. AC6 of Shenzhen Jixiang Tengda Technology Co., Ltd. has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202505-0385 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. AG515 has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
AG515 is a high-performance gateway device suitable for small and medium-sized enterprises and large office environments. AG515 of Beijing Xingwang Ruijie Network Technology Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202505-0732 No CVE NUUO Network Video Recorder has a logic flaw vulnerability CVSS V2: 3.6
CVSS V3: -
Severity: LOW
NUUO is a company specializing in the production of Network Video Recorders (NVRs). NUUO Network Video Recorder has a logic flaw vulnerability that can be exploited by attackers to modify account passwords without authorization.
VAR-202505-0384 No CVE Brother (China) Commercial Co., Ltd. Brother DCP-L2540DW series has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Brother DCP-L2540DW is a multi-function laser/LED printer. Brother (China) Commercial Co., Ltd. Brother DCP-L2540DW series has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202505-1496 No CVE Advantech WebAccess has a file upload vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Advantech WebAccess is an HMI/SCADA monitoring software completely based on IE browser. Advantech WebAccess of Advantech Technology (China) Co., Ltd. has a file upload vulnerability, which can be exploited by attackers to gain control of the server.