VARIoT IoT vulnerabilities database
| VAR-202505-1241 | No CVE | Samsung (China) Investment Co., Ltd. M2085FW has a command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The M2085FW is a black and white laser multifunction printer with printing, copying, scanning and faxing functions.
Samsung (China) Investment Co., Ltd. SANSUNG has a command execution vulnerability that can be exploited by attackers to execute arbitrary commands.
| VAR-202505-1240 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. FH451 has a binary vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
FH451 is a router produced by Tenda Company, with a maximum transmission rate of 450Mbps and supports WDS wireless bridging.
Shenzhen Jixiang Tenda Technology Co., Ltd. FH451 has a binary vulnerability, which can be exploited by attackers to cause denial of service.
| VAR-202505-0502 | No CVE | Zhejiang Dahua Technology Co., Ltd. DSS has a SQL injection vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Zhejiang Dahua Technology Co., Ltd. is a global leading video-centric smart IoT solution provider and operation service provider.
There is a SQL injection vulnerability in the DSS of Zhejiang Dahua Technology Co., Ltd., which can be exploited by attackers to obtain sensitive information in the database.
| VAR-202505-1497 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. FH451 has a binary vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
FH451 is a router produced by Tenda Company, with a maximum transmission rate of 450Mbps and supports WDS wireless bridging.
Shenzhen Jixiang Tenda Technology Co., Ltd. FH451 has a binary vulnerability, which can be exploited by attackers to cause denial of service.
| VAR-202505-0733 | No CVE | Samsung (China) Investment Co., Ltd. C430W has a command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
C430W is a laser printer.
Samsung (China) Investment Co., Ltd. C430W has a command execution vulnerability, which can be exploited by attackers to execute arbitrary commands.
| VAR-202505-0386 | No CVE | D-Link DI-8100 has binary vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
D-Link DI-8100 is a broadband router designed by D-Link for small and medium-sized network environments, supporting up to 4 Internet ports and up to 4 LAN ports.
D-Link DI-8100 has a binary vulnerability that can be exploited by attackers to cause a denial of service.
| VAR-202505-0387 | No CVE | Zhuhai Pantum Printing Technology Co., Ltd. has a number of printers with logical flaws. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
M6700DW is a black and white laser multifunction printer. P2500NW is a black and white laser single-function printer. BM5100ADW is a black and white laser multifunction printer. CM1100DW is a color laser multifunction printer.
Many printer products of Zhuhai Pantum Printing Technology Co., Ltd. have a logic defect vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202505-0734 | No CVE | Sony SNC-RX570N has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
SNC-RX570N is a network camera.
Sony SNC-RX570N has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202505-0989 | No CVE | D-Link DWR-M961 has a stack overflow vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
DWR-M961 is a router.
D-Link DWR-M961 has a stack overflow vulnerability, which can be exploited by attackers to cause the program to crash.
| VAR-202505-1003 | CVE-2025-45800 | TOTOLINK of a950rg Command injection vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TOTOLINK A950RG V4.1.2cu.5204_B20210112 contains a command execution vulnerability in the setDeviceName interface of the /lib/cste_modules/global.so library, specifically in the processing of the deviceMac parameter. TOTOLINK of a950rg Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A950RG is a super-generation Giga wireless router from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to execute arbitrary commands
| VAR-202505-0752 | CVE-2025-44877 | Shenzhen Tenda Technology Co.,Ltd. of AC9 Command injection vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda AC9 V15.03.06.42_multi was found to contain a command injection vulnerability in the formSetSambaConf function via the usbname parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of AC9 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202505-0643 | CVE-2025-44872 | Shenzhen Tenda Technology Co.,Ltd. of AC9 Command injection vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda AC9 V15.03.06.42_multi was found to contain a command injection vulnerability in the formsetUsbUnload function via the deviceName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of AC9 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202505-1258 | CVE-2025-44868 | WAVLINK of WL-WN530H4 Command injection vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Wavlink WL-WN530H4 20220801 was found to contain a command injection vulnerability in the ping_test function of the adm.cgi via the pingIp parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. WAVLINK of WL-WN530H4 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK WL-WN530H4 is a high-performance USB wireless network card from WAVLINK, China, that supports 802.11ac dual-band Wi-Fi
| VAR-202505-1362 | CVE-2025-46635 | Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro Access control vulnerabilities in firmware |
CVSS V2: 7.5 CVSS V3: 7.1 Severity: HIGH |
An issue was discovered on Tenda RX2 Pro 16.03.30.14 devices. Improper network isolation between the guest Wi-Fi network and other network interfaces on the router allows an attacker (who is authenticated to the guest Wi-Fi) to access resources on the router and/or resources and devices on other networks hosted by the router by configuring a static IP address (within the non-guest subnet) on their host. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro Firmware contains an access control vulnerability.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda.
Tenda RX2 Pro 16.03.30.14 version has a security bypass vulnerability that can be exploited by attackers to access routers and other network resources
| VAR-202505-1101 | CVE-2025-46634 | Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro Vulnerability related to plaintext storage of important information in firmware |
CVSS V2: 8.5 CVSS V3: 8.2 Severity: HIGH |
Cleartext transmission of sensitive information in the web management portal of the Tenda RX2 Pro 16.03.30.14 may allow an unauthenticated attacker to authenticate to the web management portal by collecting credentials from observed/collected traffic. It implements encryption, but not until after the user has transmitted the hash of their password in cleartext. The hash can be replayed to authenticate. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro The firmware contains a vulnerability related to plaintext storage of sensitive information.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda.
Tenda RX2 Pro has an information leakage vulnerability that can be exploited by attackers to collect credentials for authentication
| VAR-202505-1102 | CVE-2025-46633 | Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro Vulnerability related to plaintext storage of important information in firmware |
CVSS V2: 8.5 CVSS V3: 8.2 Severity: HIGH |
Cleartext transmission of sensitive information in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an attacker to decrypt traffic between the client and server by collecting the symmetric AES key from collected and/or observed traffic. The AES key in sent in cleartext in response to successful authentication. The IV is always EU5H62G9ICGRNI43. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro The firmware contains a vulnerability related to plaintext storage of sensitive information.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda. Attackers can exploit this vulnerability to decrypt traffic between the client and the server
| VAR-202505-0993 | CVE-2025-46632 | Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro Vulnerability in firmware regarding reuse of cryptographic nonce and key pairs |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
Initialization vector (IV) reuse in the web management portal of the Tenda RX2 Pro 16.03.30.14 may allow an attacker to discern information about or more easily decrypt encrypted messages between client and server. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro The firmware contains a vulnerability related to the reuse of cryptographic nonce and key pairs.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda.
Tenda RX2 Pro 16.03.30.14 version has an information leakage vulnerability, which can lead to decryption of encrypted messages by attackers
| VAR-202505-1505 | CVE-2025-46631 | Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro Authentication vulnerability in firmware |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
Improper access controls in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to enable telnet access to the router's OS by sending a /goform/telnet web request. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro An authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda
| VAR-202505-0994 | CVE-2025-46630 | Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro Authentication vulnerability in firmware |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
Improper access controls in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to enable 'ate' (a remote system management binary) by sending a /goform/ate web request. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro An authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda
| VAR-202505-1103 | CVE-2025-46629 | Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro Access control vulnerabilities in firmware |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
Lack of access controls in the 'ate' management binary of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to perform unauthorized configuration changes for any router where 'ate' has been enabled by sending a crafted UDP packet. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro Firmware contains an access control vulnerability.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda. Attackers can exploit this vulnerability to cause unauthorized configuration changes