VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202510-4098 CVE-2025-12476 Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 information disclosure vulnerabilities (CNVD-2025-29078) CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Resource Lacking AuthN.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a security vulnerability stemming from a lack of authentication. Attackers could exploit this vulnerability to obtain sensitive information
VAR-202510-4200 CVE-2025-12425 Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 privilege escalation vulnerabilities CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
Local Privilege Escalation.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a privilege escalation vulnerability caused by improper privilege management. An attacker could exploit this vulnerability to achieve local privilege escalation
VAR-202510-3388 CVE-2025-12424 Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 privilege escalation vulnerabilities (CNVD-2025-29084) CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Privilege Escalation through SUID-bit Binary.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a privilege escalation vulnerability caused by improper privilege management in the SUID bit binary. An attacker could exploit this vulnerability to gain elevated privileges on the system
VAR-202510-3902 CVE-2025-12423 Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 Denial-of-Service Vulnerabilities (CNVD-2025-29082) CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Protocol manipulation might lead to denial of service.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 . Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a denial-of-service vulnerability caused by an uncaught exception during protocol operation. An attacker could exploit this vulnerability to cause a denial-of-service attack
VAR-202510-4375 CVE-2025-12422 Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 privilege escalation vulnerabilities (CNVD-2025-29083) CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Vulnerable Upgrade Feature (Arbitrary File Write) may lead to obtaining super user permissions on board.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a privilege escalation vulnerability caused by an arbitrary file write flaw in the escalation feature. An attacker could exploit this vulnerability to gain escalated privileges on the system
VAR-202510-2217 CVE-2025-12322 Tenda CH22 buffer overflow vulnerability fromNatStaticSetting function CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A flaw has been found in Tenda CH22 1.0.0.1. Affected by this issue is the function fromNatStaticSetting of the file /goform/NatStaticSetting. Executing manipulation of the argument page can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. Version 1.0.0.1 of the Tenda CH22 contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `page` parameter of the function `fromNatStaticSetting` in the file `/goform/NatStaticSetting` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2966 CVE-2025-12365 Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 information disclosure vulnerabilities (CNVD-2025-29150) CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Error Messages Wrapped In HTTP Header.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain an information disclosure vulnerability caused by an error message wrapped in the HTTP header. An attacker could exploit this vulnerability to obtain sensitive information
VAR-202510-4374 CVE-2025-12364 An unidentified vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29151). CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Weak Password Policy.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain a security vulnerability stemming from a weak password policy. Detailed vulnerability information is not currently available
VAR-202510-3719 CVE-2025-12363 Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 information disclosure vulnerabilities (CNVD-2025-29149) CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Email Password Disclosure.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Both Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 contain an information disclosure vulnerability caused by improper authorization verification. An attacker could exploit this vulnerability to obtain email password information
VAR-202510-2330 CVE-2025-12274 Tenda CH22 buffer overflow vulnerability in the fromP2pListFilter function CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security vulnerability has been detected in Tenda CH22 1.0.0.1. Affected by this vulnerability is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. This vulnerability stems from the fact that the `page` parameter of the function `fromP2pListFilter` in the file `/goform/P2pListFilter` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2277 CVE-2025-12273 Tenda CH22 formwebExcptypemanFilter function buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A weakness has been identified in Tenda CH22 1.0.0.1. Affected is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing manipulation of the argument page can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. Version 1.0.0.1 of the Tenda CH22 contains a buffer overflow vulnerability. This vulnerability stems from the fact that the parameter `page` in the file `/goform/webExcptypemanFilter` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2345 CVE-2025-12272 Tenda CH22 formaddressNat function buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security flaw has been discovered in Tenda CH22 1.0.0.1. This impacts the function fromAddressNat of the file /goform/addressNat. Performing manipulation of the argument page results in buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be exploited. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. The Tenda CH22 contains a buffer overflow vulnerability. This vulnerability stems from the fact that the parameter `page` in the file `/goform/addressNat` fails to properly validate the length of input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2132 CVE-2025-12271 Tenda CH22 formRouteStatic function buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was identified in Tenda CH22 1.0.0.1. This affects the function fromRouteStatic of the file /goform/RouteStatic. Such manipulation of the argument page leads to buffer overflow. The attack can be launched remotely. The exploit is publicly available and might be used. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. This vulnerability stems from the fact that the parameter `page` in the file `/goform/RouteStatic` fails to properly validate the length of input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2333 CVE-2025-12265 Tenda CH22 fromVirtualSer function buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A weakness has been identified in Tenda CH22 1.0.0.1. Affected by this issue is the function fromVirtualSer of the file /goform/VirtualSer. This manipulation of the argument page causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. The Tenda CH22 is a network device manufactured by Tenda, a Chinese company. This vulnerability stems from the fact that the `page` parameter of the function `fromVirtualSer` in the file `/goform/VirtualSer` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2091 CVE-2025-46583 ZTE MC889A Pro Denial-of-Service Vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
There is a Denial of Service(DoS)vulnerability in the ZTE MC889A Pro product. Due to insufficient validation of the input parameters of the Short Message Service interface, allowing an attacker to exploit it to carry out a DoS attack. The ZTE MC889A Pro is a router manufactured by ZTE Corporation, a Chinese company. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2239 CVE-2025-12260 TOTOLINK A3300R enable parameter buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been found in TOTOLINK A3300R 17.0.0cu.557_B20221024. The impacted element is the function setSyslogCfg of the file /cgi-bin/cstecgi.cgi of the component POST Parameter Handler. Such manipulation of the argument enable leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The TOTOLINK A3300R is a wireless router manufactured by TOTOLINK, a Chinese company. Version 17.0.0cu.557_B20221024 of the TOTOLINK A3300R contains a buffer overflow vulnerability. This vulnerability stems from the fact that the parameter `enable` in the file `/cgi-bin/cstecgi.cgi` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2269 CVE-2025-12259 TOTOLINK A3300R setScheduleCfg function stack buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A flaw has been found in TOTOLINK A3300R 17.0.0cu.557_B20221024. The affected element is the function setScheduleCfg of the file /cgi-bin/cstecgi.cgi of the component POST Parameter Handler. This manipulation of the argument recHour causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used. The TOTOLINK A3300R is a dual-band wireless router manufactured by TOTOLINK Electronics Co., Ltd. in China, primarily used in home and small network environments. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2079 CVE-2025-12258 TOTOLINK A3300R setOpModeCfg function stack buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was detected in TOTOLINK A3300R 17.0.0cu.557_B20221024. Impacted is the function setOpModeCfg of the file /cgi-bin/cstecgi.cg of the component POST Parameter Handler. The manipulation of the argument opmode results in stack-based buffer overflow. The attack may be performed from remote. The TOTOLINK A3300R is a dual-band wireless router manufactured by TOTOLINK Electronics Co., Ltd. in China, primarily used in home and small network environments. This vulnerability stems from the fact that the `opmode` parameter in the `setOpModeCfg` function within the file `/cgi-bin/cstecgi.cg` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code or cause a denial-of-service attack on the system
VAR-202510-2186 CVE-2025-12241 TOTOLINK A3300R lang parameter buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was detected in TOTOLINK A3300R 17.0.0cu.557_B20221024. This impacts the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi of the component POST Parameter Handler. The manipulation of the argument lang results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used. The TOTOLINK A3300R is a wireless router manufactured by TOTOLINK, a Chinese company. Version 17.0.0cu.557_B20221024 of the TOTOLINK A3300R contains a buffer overflow vulnerability. This vulnerability stems from the fact that the parameter `lang` in the file `/cgi-bin/cstecgi.cgi` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack
VAR-202510-2241 CVE-2025-12240 TOTOLINK A3300R cstecgi.cgi file buffer overflow vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security vulnerability has been detected in TOTOLINK A3300R 17.0.0cu.557_B20221024. This affects the function setDmzCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ip leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The TOTOLINK A3300R is a dual-band wireless router manufactured by TOTOLINK Electronics Co., Ltd. in China, primarily used in home and small network environments. This vulnerability stems from the fact that the parameter `ip` in the function `setDmzCfg` in the file `/cgi-bin/cstecgi.cgi` fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack