VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202510-2283 CVE-2025-60565 D-Link DIR600L formSchedule function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSchedule. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formSchedule` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2147 CVE-2025-60564 D-Link DIR600L formSetLog function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetLog. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formSetLog` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2356 CVE-2025-60563 D-Link DIR600L formSetPortTr function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetPortTr. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formSetPortTr` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2087 CVE-2025-60562 D-Link DIR600L formWlSiteSurvey function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formWlSiteSurvey. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formWlSiteSurvey` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2252 CVE-2025-60561 D-Link DIR600L formSetEmail function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetEmail. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formSetEmail` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2148 CVE-2025-60559 D-Link DIR600L formSetDomainFilter function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetDomainFilter. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formSetDomainFilter` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2354 CVE-2025-60558 D-Link DIR600L formVirtualServ function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formVirtualServ. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formVirtualServ` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2090 CVE-2025-60557 D-Link DIR600L formSetEasy_Wizard function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetEasy_Wizard. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formSetEasy_Wizard` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2355 CVE-2025-60556 D-Link DIR600L formSetWizard1 function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWizard1. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formSetWizard1` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2280 CVE-2025-60555 D-Link DIR600L formSetWizardSelectMode function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWizardSelectMode. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formSetWizardSelectMode` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2282 CVE-2025-60554 D-Link DIR600L formSetEnableWizard function buffer overflow vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetEnableWizard. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formSetEnableWizard` function fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code or cause a denial-of-service attack
VAR-202510-2146 CVE-2025-60553 D-Link DIR600L formSetWAN_Wizard52 function buffer overflow vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWAN_Wizard52. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formSetWAN_Wizard52` function fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code or cause a denial-of-service attack
VAR-202510-2279 CVE-2025-60552 D-Link DIR600L formTcpipSetup function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formTcpipSetup. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formTcpipSetup` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2359 CVE-2025-60551 D-Link DIR600L formDeviceReboot function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the next_page parameter in the function formDeviceReboot. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `next_page` parameter in the `formDeviceReboot` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2192 CVE-2025-60550 D-Link DIR600L formEasySetTimezone function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formEasySetTimezone. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formEasySetTimezone` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2336 CVE-2025-60549 D-Link DIR600L formAutoDetecWAN_wizard4 function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAutoDetecWAN_wizard4. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formAutoDetecWAN_wizard4` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-2357 CVE-2025-60548 D-Link DIR600L formLanSetupRouterSettings function buffer overflow vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formLanSetupRouterSettings. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formLanSetupRouterSettings` function fails to properly validate the length of the input data. Attackers could exploit this vulnerability to execute arbitrary code or cause a denial-of-service attack
VAR-202510-2088 CVE-2025-60547 D-Link DIR600L formSetWAN_Wizard7 function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWAN_Wizard7. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formSetWAN_Wizard7` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack
VAR-202510-3393 CVE-2025-12176 An unidentified vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29088). CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Undocumented administrative accounts were getting created to facilitate access for applications running on board.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 are both network access controllers from Azure Access Technology, Inc., a US-based company. Attackers could exploit this vulnerability to gain unauthorized access
VAR-202510-2193 CVE-2025-60572 D-Link DIR600L formAdvNetwork function buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAdvNetwork. The D-Link DIR600L is a wireless router designed for home users, belonging to D-Link's "Cloud Router" series. It features an external antenna design, supports the 802.11n standard, and has a maximum wireless transmission rate of 150Mbps. The D-Link DIR600L contains a buffer overflow vulnerability. This vulnerability stems from the fact that the `curTime` parameter in the `formAdvNetwork` function fails to properly validate the length of the input data. Attackers can exploit this vulnerability to cause a denial-of-service attack