VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202508-2361 CVE-2025-29522 D-Link Corporation  of  DSL-7740C  Command injection vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the ping function. The D-Link DSL-7740C is a modem manufactured by D-Link, a Chinese company. This vulnerability stems from the ping function's failure to properly sanitize special characters and commands during command construction. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202508-2563 CVE-2025-29521 D-Link Corporation  of  DSL-7740C  Firmware default credential usage vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Insecure default credentials for the Adminsitrator account of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows attackers to escalate privileges via a bruteforce attack. D-Link Corporation of DSL-7740C The firmware contains a vulnerability related to the use of default credentials.Information may be obtained. The D-Link DSL-7740C is a modem manufactured by D-Link, a Chinese company
VAR-202508-2450 CVE-2025-29520 D-Link Corporation  of  DSL-7740C  Access control vulnerabilities in firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Incorrect access control in the Maintenance module of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows authenticated attackers with low-level privileges to arbitrarily change the high-privileged account passwords and escalate privileges. D-Link Corporation of DSL-7740C Firmware contains an access control vulnerability.Information may be obtained. The D-Link DSL-7740C is a modem manufactured by D-Link, a Chinese company
VAR-202508-2362 CVE-2025-29519 D-Link Corporation  of  DSL-7740C  Command injection vulnerability in firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A command injection vulnerability in the EXE parameter of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows attackers to execute arbitrary commands via supplying a crafted GET request. D-Link Corporation of DSL-7740C Firmware contains a command injection vulnerability.Information may be tampered with. The D-Link DSL-7740C is a modem manufactured by D-Link, a Chinese company
VAR-202508-2377 CVE-2025-29517 D-Link Corporation  of  DSL-7740C  Command injection vulnerability in firmware CVSS V2: 8.3
CVSS V3: 6.8
Severity: MEDIUM
D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the traceroute6 function. (DoS) It may be in a state. The D-Link DSL-7740C is a modem manufactured by D-Link, a Chinese company
VAR-202508-2463 CVE-2025-29516 D-Link Corporation  of  DSL-7740C  Command injection vulnerability in firmware CVSS V2: 8.3
CVSS V3: 7.2
Severity: HIGH
D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the backup function. (DoS) It may be in a state. The D-Link DSL-7740C is a modem manufactured by D-Link, a Chinese company
VAR-202508-2398 CVE-2025-29515 D-Link Corporation  of  DSL-7740C  Access control vulnerabilities in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Incorrect access control in the DELT_file.xgi endpoint of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows attackers to modify arbitrary settings within the device's XML database, including the administrator’s password. D-Link Corporation of DSL-7740C Firmware contains an access control vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DSL-7740C is a modem manufactured by D-Link, a Chinese company. The D-Link DSL-7740C, version DSL7740C.V6.TR069.20211230, suffers from an access control vulnerability. This vulnerability stems from improper access control on the DELT_file.xgi endpoint
VAR-202508-2559 CVE-2025-29514 D-Link Corporation  of  DSL-7740C  Access control vulnerabilities in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Incorrect access control in the config.xgi function of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows attackers to download the configuration file via providing a crafted web request. D-Link Corporation of DSL-7740C Firmware contains an access control vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DSL-7740C is a modem manufactured by D-Link, a Chinese company. The D-Link DSL-7740C suffers from an access control vulnerability caused by improper access control in the config.xgi function. An attacker could exploit this vulnerability to download the configuration file
VAR-202508-2183 CVE-2025-9392 Linksys  of  RE6250  Buffer error vulnerabilities in firmware and other products from multiple vendors CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function qosClassifier of the file /goform/qosClassifier. Such manipulation of the argument dir/sFromPort/sToPort/dFromPort/dToPort/protocol/layer7/dscp/remark_dscp leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Linksys of RE6250 Firmware and other products from multiple vendors contain buffer error vulnerabilities and stack-based buffer overflow vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-2150 CVE-2025-9363 Linksys  of  RE6250  Buffer error vulnerabilities in firmware and other products from multiple vendors CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function portTriggerManageRule of the file /goform/portTriggerManageRule. The manipulation of the argument triggerRuleName/schedule leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Linksys of RE6250 Firmware and other products from multiple vendors contain buffer error vulnerabilities and stack-based buffer overflow vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-2127 CVE-2025-9362 Linksys  of  RE6250  Buffer error vulnerabilities in firmware and other products from multiple vendors CVSS V2: 6.5
CVSS V3: 6.3
Severity: Medium
A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The impacted element is the function urlFilterManageRule of the file /goform/urlFilterManageRule. Executing manipulation of the argument urlFilterRuleName/scheduleUrl/addURLFilter can lead to stack-based buffer overflow. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way. Linksys of RE6250 Firmware and other products from multiple vendors contain buffer error vulnerabilities and stack-based buffer overflow vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-2236 CVE-2025-9361 Linksys  of  RE6250  Buffer error vulnerabilities in firmware and other products from multiple vendors CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The affected element is the function ipRangeBlockManageRule of the file /goform/ipRangeBlockManageRule. Performing manipulation of the argument ipRangeBlockRuleName/scheduleIp/ipRangeBlockRuleIpAddr results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Linksys of RE6250 Firmware and other products from multiple vendors contain buffer error vulnerabilities and stack-based buffer overflow vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-2146 CVE-2025-9360 Linksys  of  RE6250  Buffer error vulnerabilities in firmware and other products from multiple vendors CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Impacted is the function accessControlAdd of the file /goform/accessControlAdd. Such manipulation of the argument ruleName/schedule leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Linksys of RE6250 Firmware and other products from multiple vendors contain buffer error vulnerabilities and stack-based buffer overflow vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-2258 CVE-2025-9359 Belkin International, Inc.  of  re6500  Buffer error vulnerabilities in firmware and other products from multiple vendors CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. This manipulation of the argument ssidhex/pwd causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way. Belkin International, Inc. of re6500 Firmware and other products from multiple vendors contain buffer error vulnerabilities and stack-based buffer overflow vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-2201 CVE-2025-9358 Linksys  of  RE6250  Buffer error vulnerabilities in firmware and other products from multiple vendors CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security flaw has been discovered in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function setSysAdm of the file /goform/setSysAdm. The manipulation of the argument admpasshint results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way. Linksys of RE6250 Firmware and other products from multiple vendors contain buffer error vulnerabilities and stack-based buffer overflow vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-2237 CVE-2025-9357 Linksys  of  RE6250  Buffer error vulnerabilities in firmware and other products from multiple vendors CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function langSwitchByBBS of the file /goform/langSwitchByBBS. The manipulation of the argument langSelectionOnly leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. Linksys of RE6250 Firmware and other products from multiple vendors contain buffer error vulnerabilities and stack-based buffer overflow vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-2115 CVE-2025-9356 Linksys  of  RE6250  Buffer error vulnerabilities in firmware and other products from multiple vendors CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function inboundFilterAdd of the file /goform/inboundFilterAdd. Executing manipulation of the argument ruleName can lead to stack-based buffer overflow. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. Linksys of RE6250 Firmware and other products from multiple vendors contain buffer error vulnerabilities and stack-based buffer overflow vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-2259 CVE-2025-9355 Linksys  of  RE6250  Buffer error vulnerabilities in firmware and other products from multiple vendors CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this vulnerability is the function scheduleAdd of the file /goform/scheduleAdd. Performing manipulation of the argument ruleName results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. Linksys of RE6250 Firmware and other products from multiple vendors contain buffer error vulnerabilities and stack-based buffer overflow vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-2757 CVE-2025-55581 D-Link Corporation  of  DCS-825L  Privilege management vulnerability in firmware CVSS V2: -
CVSS V3: 7.3
Severity: HIGH
D-Link DCS-825L firmware version 1.08.01 and possibly prior versions contain an insecure implementation in the mydlink-watch-dog.sh script. The script monitors and respawns the `dcp` and `signalc` binaries without validating their integrity, origin, or permissions. An attacker with filesystem access (e.g., via UART or firmware modification) may replace these binaries to achieve persistent arbitrary code execution with root privileges. The issue stems from improper handling of executable trust and absence of integrity checks in the watchdog logic. D-Link Corporation of DCS-825L The firmware contains vulnerabilities related to privilege management, lack of authentication for critical functions, and insufficient integrity verification of downloaded code.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-2311 CVE-2025-55611 D-Link Systems, Inc.  of  DIR-619L  Out-of-bounds write vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formLanguageChange function via the nextPage parameter. D-Link Systems, Inc. of DIR-619L An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. The D-Link DIR-619L is a home wireless router from D-Link, designed for home and small office environments. It utilizes the IEEE 802.11n wireless standard and offers a maximum transmission rate of 300Mbps. This vulnerability stems from the failure of the nextPage parameter in the formLanguageChange function to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service