VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202511-2274 CVE-2025-13562 CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A vulnerability was identified in D-Link DIR-852 1.00. This issue affects some unknown processing of the file /gena.cgi. Such manipulation of the argument service leads to command injection. The attack can be executed remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.
VAR-202511-2355 CVE-2025-65226 Shenzhen Tenda Technology Co.,Ltd.  of  ac21  Classic buffer overflow vulnerability in firmware CVSS V2: 3.3
CVSS V3: 4.3
Severity: MEDIUM
Shenzhen Tenda Technology Co.,Ltd. of ac21 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. The Tenda AC21 is a dual-band gigabit wireless router from Tenda Technology, designed for high-speed home internet needs. It supports 802.11ac wave2 technology, with a dual-band concurrent speed of up to 2033Mbps, including 1733Mbps on the 5GHz band, meeting the demands of high-bandwidth applications such as 4K video and live streaming. The Tenda AC21 contains a buffer overflow vulnerability. This vulnerability stems from the fact that the deviceId parameter in the /goform/saveParentControlInfo file fails to properly validate the length of input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202511-2330 CVE-2025-65223 Tenda AC21 saveParentControlInfo file buffer overflow vulnerability CVSS V2: 3.3
CVSS V3: 4.3
Severity: MEDIUM
The Tenda AC21 is a dual-band gigabit wireless router from Tenda Technology, designed for high-speed home internet needs. It supports 802.11ac wave2 technology, with a dual-band concurrent speed of up to 2033Mbps, including 1733Mbps on the 5GHz band, meeting the demands of high-bandwidth applications such as 4K video and live streaming. The Tenda AC21 contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `urls` parameter in the `/goform/saveParentControlInfo` file fails to properly validate the length of input data. Attackers can exploit this vulnerability to cause a denial-of-service attack.
VAR-202511-2359 CVE-2025-65222 Shenzhen Tenda Technology Co.,Ltd.  of  ac21  Stack-based buffer overflow vulnerability in firmware CVSS V2: 3.3
CVSS V3: 4.3
Severity: MEDIUM
Shenzhen Tenda Technology Co.,Ltd. of ac21 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda AC21 is a dual-band gigabit wireless router from Tenda Technology, designed for high-speed home internet needs. It supports 802.11ac wave2 technology, with a dual-band concurrent speed of up to 2033Mbps, including 1733Mbps on the 5GHz band, meeting the demands of high-bandwidth applications such as 4K video and live streaming. This vulnerability stems from the fact that the rebootTime parameter in `/goform/SetSysAutoRebbotCfg` fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202511-2366 CVE-2025-65221 Tenda AC21 setPptpUserList buffer overflow vulnerability CVSS V2: 3.3
CVSS V3: 4.3
Severity: MEDIUM
Tenda AC21 V16.03.08.16 is vulnerable to Buffer Overflow via the list parameter of /goform/setPptpUserList. The Tenda AC21 is a dual-band gigabit wireless router from Tenda Technology, designed for high-speed home internet needs. It supports 802.11ac wave2 technology, with a dual-band concurrent speed of up to 2033Mbps, including 1733Mbps on the 5GHz band, meeting the demands of high-bandwidth applications such as 4K video and live streaming. This vulnerability stems from the fact that the `list` parameter in `/goform/setPptpUserList` fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202511-2296 CVE-2025-65220 Shenzhen Tenda Technology Co.,Ltd.  of  ac21  Stack-based buffer overflow vulnerability in firmware CVSS V2: 3.3
CVSS V3: 4.3
Severity: MEDIUM
Tenda AC21 V16.03.08.16 is vulnerable to Buffer Overflow in: /goform/SetVirtualServerCfg via the list parameter. Shenzhen Tenda Technology Co.,Ltd. of ac21 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda AC21 is a dual-band gigabit wireless router from Tenda Technology, designed for high-speed home internet needs. It supports 802.11ac wave2 technology, with a dual-band concurrent speed of up to 2033Mbps, including 1733Mbps on the 5GHz band, meeting the demands of high-bandwidth applications such as 4K video and live streaming. This vulnerability stems from the fact that the `list` parameter in `/goform/SetVirtualServerCfg` fails to properly validate the length of input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202511-2269 CVE-2025-13446 Tenda AC21 SetSysTimeCfg file stack buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been found in Tenda AC21 16.03.08.16. This vulnerability affects unknown code of the file /goform/SetSysTimeCfg. The manipulation of the argument timeZone/time leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The Tenda AC21 is a dual-band gigabit wireless router from Tenda Technology, designed for high-speed home internet needs. It supports 802.11ac wave2 technology, with a dual-band concurrent speed of up to 2033Mbps, including 1733Mbps on the 5GHz band, meeting the demands of high-bandwidth applications such as 4K video and live streaming. This vulnerability stems from the `/goform/SetSysTimeCfg` file, where the parameter `timeZone/time` fails to properly validate the length of input data. Attackers could exploit this vulnerability to execute arbitrary code or cause a denial-of-service attack
VAR-202511-2233 CVE-2025-13445 Shenzhen Tenda Technology Co.,Ltd.  of  ac21  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A flaw has been found in Tenda AC21 16.03.08.16. This affects an unknown part of the file /goform/SetIpMacBind. Executing manipulation of the argument list can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used. Shenzhen Tenda Technology Co.,Ltd. of ac21 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda AC21 is a dual-band gigabit wireless router from Tenda Technology, designed for high-speed home internet needs. It supports 802.11ac wave2 technology, with a dual-band concurrent speed of up to 2033Mbps, including 1733Mbps on the 5GHz band, meeting the demands of high-bandwidth applications such as 4K video and live streaming. This vulnerability stems from the `/goform/SetIpMacBind` file's parameter `list` failing to properly validate the length of input data. Attackers could exploit this vulnerability to execute arbitrary code or cause a denial-of-service attack
VAR-202511-2271 CVE-2025-13400 CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was detected in Tenda CH22 1.0.0.1. Affected is the function formWrlExtraGet of the file /goform/WrlExtraGet. Performing manipulation of the argument chkHz results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.
VAR-202511-1634 CVE-2025-58692 CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
An improper neutralization of special elements used in an SQL Command ("SQL Injection") vulnerability [CWE-89] in Fortinet FortiVoice 7.2.0 through 7.2.2, FortiVoice 7.0.0 through 7.0.7 allows an authenticated attacker to execute unauthorized code or commands via specifically crafted HTTP or HTTPS requests.
VAR-202511-1341 CVE-2025-46776 Fortinet FortiExtender buffer overflow vulnerability CVSS V2: 6.2
CVSS V3: 6.4
Severity: MEDIUM
A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to execute arbitrary code or commands via crafted CLI commands. The Fortinet FortiExtender is a wireless WAN (Wide Area Network) extender device manufactured by Fortinet Systems, Inc. The Fortinet FortiExtender contains a buffer overflow vulnerability stemming from unchecked input size buffer copying
VAR-202511-1242 CVE-2025-46775 CVSS V2: -
CVSS V3: 5.5
Severity: MEDIUM
A debug messages revealing unnecessary information vulnerability in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to obtain administrator credentials via debug log commands.
VAR-202511-1445 CVE-2025-46215 CVSS V2: -
CVSS V3: 5.3
Severity: MEDIUM
An Improper Isolation or Compartmentalization vulnerability [CWE-653] in Fortinet FortiSandbox 5.0.0 through 5.0.1, FortiSandbox 4.4.0 through 4.4.7, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions may allow an unauthenticated attacker to evade the sandboxing scan via a crafted file.
VAR-202511-0195 CVE-2025-13288 Shenzhen Tenda Technology Co.,Ltd.  of  ch22  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security vulnerability has been detected in Tenda CH22 1.0.0.1. This impacts the function fromPptpUserSetting of the file /goform/PPTPUserSetting. The manipulation of the argument delno leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. Shenzhen Tenda Technology Co.,Ltd. of ch22 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202511-0293 CVE-2025-13191 D-Link Corporation  of  DIR-816L  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was determined in D-Link DIR-816L 2_06_b09_beta. This issue affects the function soapcgi_main of the file /soap.cgi. This manipulation causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-816L The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The DIR-816L is a wireless router product manufactured by D-Link. This vulnerability stems from the fact that the soapcgi_main function in the /soap.cgi file does not perform effective boundary checks on input data. An attacker could exploit this vulnerability to trigger a stack overflow by remotely sending specially crafted data, thereby executing arbitrary code or causing service crashes
VAR-202511-0322 CVE-2025-13190 D-Link DIR-816L buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in D-Link DIR-816L 2_06_b09_beta. This vulnerability affects the function scandir_main of the file /portal/__ajax_exporer.sgi. The manipulation of the argument en results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. The DIR-816L is a wireless router product manufactured by D-Link. Version 2_06_b09_beta of the D-Link DIR-816L contains a stack buffer overflow vulnerability. This vulnerability stems from a failure to properly validate the input length when manipulating the `en` parameter of the `scandir_main` function in the `/portal/__ajax_exporer.sgi` file. An attacker could exploit this vulnerability to trigger a stack overflow by remotely sending specially crafted data, thereby executing arbitrary code or causing service interruption
VAR-202511-0262 CVE-2025-13189 D-Link DIR-816L buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been found in D-Link DIR-816L 2_06_b09_beta. This affects the function genacgi_main of the file gena.cgi. The manipulation of the argument SERVER_ID/HTTP_SID leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. The DIR-816L is a wireless router device from D-Link. An attacker could exploit this vulnerability to remotely manipulate the parameters, triggering a stack overflow that could then execute arbitrary code or cause service crashes
VAR-202511-0038 CVE-2025-13188 CVSS V2: 10.0
CVSS V3: 9.8
Severity: High
A vulnerability was detected in D-Link DIR-816L 2_06_b09_beta. Affected by this vulnerability is the function authenticationcgi_main of the file /authentication.cgi. Performing manipulation of the argument Password results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
VAR-202511-1177 CVE-2025-60679 D-Link Corporation  of  DIR-816  Stack-based buffer overflow vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
A stack buffer overflow vulnerability exists in the D-Link DIR-816A2 router firmware DIR-816A2_FWv1.10CNB05_R1B011D88210.img in the upload.cgi module, which handles firmware version information. The vulnerability occurs because /proc/version is read into a 512-byte buffer and then concatenated using sprintf() into another 512-byte buffer containing a 29-byte constant. Input exceeding 481 bytes triggers a stack buffer overflow, allowing an attacker who can control /proc/version content to potentially execute arbitrary code on the device. (DoS) It may be in a state
VAR-202511-2179 CVE-2025-46370 Dell's  Alienware Command Center  Process control vulnerabilities in CVSS V2: -
CVSS V3: 3.3
Severity: LOW
Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contain a Process Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information Disclosure