VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202505-1241 No CVE Samsung (China) Investment Co., Ltd. M2085FW has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
The M2085FW is a black and white laser multifunction printer with printing, copying, scanning and faxing functions. Samsung (China) Investment Co., Ltd. SANSUNG has a command execution vulnerability that can be exploited by attackers to execute arbitrary commands.
VAR-202505-1240 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. FH451 has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
FH451 is a router produced by Tenda Company, with a maximum transmission rate of 450Mbps and supports WDS wireless bridging. Shenzhen Jixiang Tenda Technology Co., Ltd. FH451 has a binary vulnerability, which can be exploited by attackers to cause denial of service.
VAR-202505-0502 No CVE Zhejiang Dahua Technology Co., Ltd. DSS has a SQL injection vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Zhejiang Dahua Technology Co., Ltd. is a global leading video-centric smart IoT solution provider and operation service provider. There is a SQL injection vulnerability in the DSS of Zhejiang Dahua Technology Co., Ltd., which can be exploited by attackers to obtain sensitive information in the database.
VAR-202505-1497 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. FH451 has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
FH451 is a router produced by Tenda Company, with a maximum transmission rate of 450Mbps and supports WDS wireless bridging. Shenzhen Jixiang Tenda Technology Co., Ltd. FH451 has a binary vulnerability, which can be exploited by attackers to cause denial of service.
VAR-202505-0733 No CVE Samsung (China) Investment Co., Ltd. C430W has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
C430W is a laser printer. Samsung (China) Investment Co., Ltd. C430W has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
VAR-202505-0386 No CVE D-Link DI-8100 has binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
D-Link DI-8100 is a broadband router designed by D-Link for small and medium-sized network environments, supporting up to 4 Internet ports and up to 4 LAN ports. D-Link DI-8100 has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202505-0387 No CVE Zhuhai Pantum Printing Technology Co., Ltd. has a number of printers with logical flaws. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
M6700DW is a black and white laser multifunction printer. P2500NW is a black and white laser single-function printer. BM5100ADW is a black and white laser multifunction printer. CM1100DW is a color laser multifunction printer. ‌ Many printer products of Zhuhai Pantum Printing Technology Co., Ltd. have a logic defect vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202505-0734 No CVE Sony SNC-RX570N has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
SNC-RX570N is a network camera. Sony SNC-RX570N has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202505-0989 No CVE D-Link DWR-M961 has a stack overflow vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
DWR-M961 is a router. D-Link DWR-M961 has a stack overflow vulnerability, which can be exploited by attackers to cause the program to crash.
VAR-202505-1003 CVE-2025-45800 TOTOLINK  of  a950rg  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A950RG V4.1.2cu.5204_B20210112 contains a command execution vulnerability in the setDeviceName interface of the /lib/cste_modules/global.so library, specifically in the processing of the deviceMac parameter. TOTOLINK of a950rg Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A950RG is a super-generation Giga wireless router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202505-0752 CVE-2025-44877 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC9 V15.03.06.42_multi was found to contain a command injection vulnerability in the formSetSambaConf function via the usbname parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of AC9 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202505-0643 CVE-2025-44872 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Tenda AC9 V15.03.06.42_multi was found to contain a command injection vulnerability in the formsetUsbUnload function via the deviceName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of AC9 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202505-1258 CVE-2025-44868 WAVLINK  of  WL-WN530H4  Command injection vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Wavlink WL-WN530H4 20220801 was found to contain a command injection vulnerability in the ping_test function of the adm.cgi via the pingIp parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. WAVLINK of WL-WN530H4 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK WL-WN530H4 is a high-performance USB wireless network card from WAVLINK, China, that supports 802.11ac dual-band Wi-Fi
VAR-202505-1362 CVE-2025-46635 Shenzhen Tenda Technology Co.,Ltd.  of  RX2 Pro  Access control vulnerabilities in firmware CVSS V2: 7.5
CVSS V3: 7.1
Severity: HIGH
An issue was discovered on Tenda RX2 Pro 16.03.30.14 devices. Improper network isolation between the guest Wi-Fi network and other network interfaces on the router allows an attacker (who is authenticated to the guest Wi-Fi) to access resources on the router and/or resources and devices on other networks hosted by the router by configuring a static IP address (within the non-guest subnet) on their host. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro Firmware contains an access control vulnerability.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda. Tenda RX2 Pro 16.03.30.14 version has a security bypass vulnerability that can be exploited by attackers to access routers and other network resources
VAR-202505-1101 CVE-2025-46634 Shenzhen Tenda Technology Co.,Ltd.  of  RX2 Pro  Vulnerability related to plaintext storage of important information in firmware CVSS V2: 8.5
CVSS V3: 8.2
Severity: HIGH
Cleartext transmission of sensitive information in the web management portal of the Tenda RX2 Pro 16.03.30.14 may allow an unauthenticated attacker to authenticate to the web management portal by collecting credentials from observed/collected traffic. It implements encryption, but not until after the user has transmitted the hash of their password in cleartext. The hash can be replayed to authenticate. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro The firmware contains a vulnerability related to plaintext storage of sensitive information.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda. Tenda RX2 Pro has an information leakage vulnerability that can be exploited by attackers to collect credentials for authentication
VAR-202505-1102 CVE-2025-46633 Shenzhen Tenda Technology Co.,Ltd.  of  RX2 Pro  Vulnerability related to plaintext storage of important information in firmware CVSS V2: 8.5
CVSS V3: 8.2
Severity: HIGH
Cleartext transmission of sensitive information in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an attacker to decrypt traffic between the client and server by collecting the symmetric AES key from collected and/or observed traffic. The AES key in sent in cleartext in response to successful authentication. The IV is always EU5H62G9ICGRNI43. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro The firmware contains a vulnerability related to plaintext storage of sensitive information.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda. Attackers can exploit this vulnerability to decrypt traffic between the client and the server
VAR-202505-0993 CVE-2025-46632 Shenzhen Tenda Technology Co.,Ltd.  of  RX2 Pro  Vulnerability in firmware regarding reuse of cryptographic nonce and key pairs CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
Initialization vector (IV) reuse in the web management portal of the Tenda RX2 Pro 16.03.30.14 may allow an attacker to discern information about or more easily decrypt encrypted messages between client and server. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro The firmware contains a vulnerability related to the reuse of cryptographic nonce and key pairs.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda. Tenda RX2 Pro 16.03.30.14 version has an information leakage vulnerability, which can lead to decryption of encrypted messages by attackers
VAR-202505-1505 CVE-2025-46631 Shenzhen Tenda Technology Co.,Ltd.  of  RX2 Pro  Authentication vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
Improper access controls in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to enable telnet access to the router's OS by sending a /goform/telnet web request. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro An authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda
VAR-202505-0994 CVE-2025-46630 Shenzhen Tenda Technology Co.,Ltd.  of  RX2 Pro  Authentication vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
Improper access controls in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to enable 'ate' (a remote system management binary) by sending a /goform/ate web request. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro An authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda
VAR-202505-1103 CVE-2025-46629 Shenzhen Tenda Technology Co.,Ltd.  of  RX2 Pro  Access control vulnerabilities in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
Lack of access controls in the 'ate' management binary of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to perform unauthorized configuration changes for any router where 'ate' has been enabled by sending a crafted UDP packet. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro Firmware contains an access control vulnerability.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda. Attackers can exploit this vulnerability to cause unauthorized configuration changes