VARIoT IoT vulnerabilities database
| VAR-202510-0661 | CVE-2024-47569 |
CVSS V2: - CVSS V3: 4.3 Severity: MEDIUM |
A insertion of sensitive information into sent data in Fortinet FortiManager Cloud 7.4.1 through 7.4.3, FortiVoice 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.7 through 6.0.12, FortiMail 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.9, FortiOS 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, 6.2.0 through 6.2.17, 6.0.0 through 6.0.18, FortiWeb 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11, 6.4.0 through 6.4.3, FortiRecorder 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiNDR 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.5, 7.1.0 through 7.1.1, 7.0.0 through 7.0.7, 1.5.0 through 1.5.3, FortiPAM 1.3.0 through 1.3.1, 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiTester 7.4.0 through 7.4.2, 7.3.0 through 7.3.2, 7.2.0 through 7.2.3, 7.1.0 through 7.1.1, 7.0.0, 4.2.0 through 4.2.1, FortiProxy 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.21, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiManager 7.6.0 through 7.6.1, 7.4.1 through 7.4.3 allows attacker to disclose sensitive information via specially crafted packets.
| VAR-202510-1123 | CVE-2025-47856 |
CVSS V2: - CVSS V3: 7.2 Severity: HIGH |
Two improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiVoice version 7.2.0, 7.0.0 through 7.0.6 and before 6.4.10 allows a privileged attacker to execute arbitrary code or commands via crafted HTTP/HTTPS or CLI requests.
| VAR-202510-0874 | CVE-2025-9178 | Rockwell Automation 1715-AENTR EtherNet/IP Adapter Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: High |
A denial-of-service security issue exists in the affected product and version. The security issue is caused through CIP communication using crafted payloads. The security issue could result in no CIP communication with 1715 EtherNet/IP Adapter.A restart is required to recover. The Rockwell Automation 1715-AENTR EtherNet/IP Adapter is a redundant Ethernet adapter module from Rockwell Automation.
The Rockwell Automation 1715-AENTR EtherNet/IP Adapter has a denial of service vulnerability due to improper processing of specially crafted payloads in CIP communications. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202510-2220 | CVE-2025-9177 | Rockwell Automation 1715-AENTR EtherNet/IP Adapter Denial of Service Vulnerability (CNVD-2025-24581) |
CVSS V2: 7.8 CVSS V3: - Severity: High |
A denial-of-service security issue exists in the affected product and version. The security issue stems from a high number of requests sent to the web server. This could result in a web server crash however; this does not impact I/O control or communication . A power cycle is required to recover and utilize the webpage. The Rockwell Automation 1715-AENTR EtherNet/IP Adapter is a redundant Ethernet adapter module manufactured by Rockwell Automation.
The Rockwell Automation 1715-AENTR EtherNet/IP Adapter contains a denial of service vulnerability that could allow an attacker to crash the web server
| VAR-202510-2627 | CVE-2025-9068 |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
A security issue exists within the Rockwell Automation Driver Package x64 Microsoft Installer File (MSI) repair functionality, installed with FTLinx. Authenticated attackers with valid Windows Users credentials can initiate a repair and hijack the resulting console window for vbpinstall.exe. This allows the launching of a command prompt running with SYSTEM-level privileges, allowing full access to all files, processes, and system resources.
| VAR-202510-1221 | CVE-2025-9067 |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
A security issue exists within the x86 Microsoft Installer File (MSI), installed with FTLinx. Authenticated attackers with valid Windows user credentials can initiate a repair and hijack the resulting console window. This allows the launching of a command prompt running with SYSTEM-level privileges, allowing full access to all files, processes, and system resources.
| VAR-202510-1230 | CVE-2025-7330 | Rockwell Automation Comms-1783-NATR Cross-Site Request Forgery Vulnerability |
CVSS V2: 7.1 CVSS V3: 6.5 Severity: MEDIUM |
A cross-site request forgery security issue exists in the product and version listed. The vulnerability stems from missing CSRF checks on the impacted form. This allows for unintended configuration modification if an attacker can convince a logged in admin to visit a crafted link. The Rockwell Automation Comms-1783-NATR is an industrial Ethernet address translation device from Rockwell Automation
| VAR-202510-0712 | CVE-2025-7329 | Rockwell Automation Comms-1783-NATR Cross-Site Scripting Vulnerability |
CVSS V2: 8.3 CVSS V3: 4.8 Severity: MEDIUM |
A Stored Cross-Site Scripting security issue exists in the affected product that could potentially allow a malicious user to view and modify sensitive data or make the webpage unavailable. The vulnerability stems from missing special character filtering and encoding. Successful exploitation requires an attacker to be able to update configuration fields behind admin login. The Rockwell Automation Comms-1783-NATR is an industrial Ethernet address translation device from Rockwell Automation.
The Rockwell Automation Comms-1783-NATR suffers from a cross-site scripting vulnerability caused by improper validation of user-supplied input
| VAR-202510-1054 | CVE-2025-7328 | Rockwell Automation Comm-1783-NATR has an unspecified vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Multiple Broken Authentication security issues exist in the affected product. The security issues are due to missing authentication checks on critical functions. These could result in potential denial-of-service, admin account takeover, or NAT rule modifications. Devices would no longer be able to communicate through NATR as a result of denial-of-service or NAT rule modifications. NAT rule modification could also result in device communication to incorrect endpoints. Admin account takeover could allow modification of configuration and require physical access to restore. The Rockwell Automation Comms-1783-NATR is an industrial Ethernet address translation device from Rockwell Automation
| VAR-202510-1896 | CVE-2025-9437 | Rockwell Automation ArmorStart AOP Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: High |
A security issue exists within the Studio 5000 Logix Designer add-on profile (AOP) for the ArmorStart Classic distributed motor controller, resulting in denial-of-service. This vulnerability is possible due to the input of invalid values into Component Object Model (COM) methods. Rockwell Automation ArmorStart AOP is a distributed motor controller from Rockwell Automation. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202510-0483 | CVE-2025-40774 | Siemens' SiPass integrated Vulnerability in storing passwords in a recoverable format in |
CVSS V2: - CVSS V3: 4.4 Severity: Medium |
A vulnerability has been identified in SiPass integrated (All versions < V3.0). Affected server applications store user passwords encrypted in its database. Decryption keys are accessible to users with administrative privileges, allowing them to recover passwords.
Successful exploitation of this vulnerability allows an attacker to obtain and use valid user passwords. This can lead to unauthorized access to user accounts, data breaches, and potential system compromise. Siemens' SiPass integrated contains a vulnerability related to storing passwords in a recoverable format.Information may be obtained
| VAR-202510-0484 | CVE-2025-40773 | Siemens' SiPass integrated Vulnerability in user-controlled key authentication evasion in |
CVSS V2: - CVSS V3: 3.5 Severity: Medium |
A vulnerability has been identified in SiPass integrated (All versions < V3.0). Affected server applications contains a broken access control vulnerability. The authorization mechanism lacks sufficient server-side checks, allowing an attacker to execute a specific API request.
Successful exploitation allows an attacker to potentially manipulate data belonging to other users. Siemens' SiPass integrated Exists in a user-controlled key authentication evasion vulnerability.Information may be tampered with
| VAR-202510-0482 | CVE-2025-40772 | Siemens' SiPass integrated Cross-site scripting vulnerability in |
CVSS V2: - CVSS V3: 7.4 Severity: High |
A vulnerability has been identified in SiPass integrated (All versions < V3.0). Affected server applications are vulnerable to stored Cross-Site Scripting (XSS), allowing an attacker to inject malicious code that can be executed by other users when they visit the affected page.
Successful exploitation allows an attacker to impersonate other users within the application and steal their session data. This could enable unauthorized access to accounts and potentially lead to privilege escalation. Siemens' SiPass integrated Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
| VAR-202510-0440 | CVE-2025-11665 | D-Link DAP-2695 Operating System Command Injection Vulnerability |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: Medium |
A vulnerability was detected in D-Link DAP-2695 2.00RC131. This affects the function fwupdater_main of the file rgbin of the component Firmware Update Handler. Performing manipulation results in os command injection. The attack may be initiated remotely. This vulnerability only affects products that are no longer supported by the maintainer. The D-Link DAP-2695 is a high-performance dual-band wireless access point from D-Link (China). An attacker could exploit this vulnerability to execute arbitrary commands
| VAR-202510-3025 | No CVE | Mosa Technology (Shanghai) Co., Ltd.'s NPort IA5250AI has an unauthorized access vulnerability. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The NPort IA5250AI is an industrial-grade serial port device networking server.
Mosa Technology (Shanghai) Co., Ltd.'s NPort IA5250AI contains an unauthorized access vulnerability, which attackers could exploit to obtain sensitive information.
| VAR-202510-1041 | No CVE | D-Link DI-8003G has a command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The DI-8003G is a full-network 4G router that supports dual SIM cards, VPN, and load balancing, providing a stable mobile network for unmanned sites.
The D-Link DI-8003G has a command execution vulnerability that could allow an attacker to gain server privileges.
| VAR-202510-0407 | CVE-2025-11586 | Tenda AC7 /goform/setNotUpgrade file buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was determined in Tenda AC7 15.03.06.44. This affects an unknown function of the file /goform/setNotUpgrade. This manipulation of the argument newVersion causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. The Tenda AC7 is a wireless router from the Chinese company Tenda. This vulnerability stems from the failure of the newVersion parameter in the /goform/setNotUpgrade file to properly validate the length of the input data. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202510-1837 | CVE-2025-21055 | SAMSUNG Mobile devices have an unspecified vulnerability (CNVD-2025-24783) |
CVSS V2: 5.0 CVSS V3: 4.3 Severity: MEDIUM |
Out-of-bounds read and write in libimagecodec.quram.so prior to SMR Oct-2025 Release 1 allows remote attackers to access out-of-bounds memory. SAMSUNG Mobile devices are a series of mobile devices manufactured by the South Korean company Samsung, including smartphones and tablets
| VAR-202510-1671 | CVE-2025-21052 | SAMSUNG Mobile devices have an unspecified vulnerability (CNVD-2025-24784) |
CVSS V2: 2.1 CVSS V3: 4.0 Severity: MEDIUM |
Out-of-bounds write under specific condition in the pre-processing of JPEG decoding in libpadm.so prior to SMR Oct-2025 Release 1 allows local attackers to cause memory corruption. SAMSUNG Mobile devices are a series of mobile devices manufactured by the South Korean company Samsung, including smartphones and tablets
| VAR-202510-0313 | CVE-2025-11550 | Tenda W12 NullPointer Dereference Vulnerability |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: Medium |
A vulnerability was found in Tenda W12 3.0.0.6(3948). The impacted element is the function wifiScheduledSet of the file /goform/modules of the component HTTP Request Handler. The manipulation of the argument wifiScheduledSet results in null pointer dereference. The attack may be performed from remote. The exploit has been made public and could be used. The Tenda W12 is a dual-band gigabit wireless panel access point (AP) launched by Tenda Technology, designed for scenarios such as hotels, villas, and large apartments. It supports the IEEE 802.11ac protocol and Wave2 standard, and boasts a dual-band concurrent speed of 1167Mbps. Detailed vulnerability information is currently unavailable