VARIoT IoT vulnerabilities database
| VAR-202509-1746 | CVE-2025-10803 | Shenzhen Tenda Technology Co.,Ltd. of ac23 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been found in Tenda AC23 up to 16.03.07.52. Affected by this vulnerability is the function sscanf of the file /goform/SetPptpServerCfg of the component HTTP POST Request Handler. Such manipulation of the argument startIp leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. of ac23 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. It offers dual-band concurrent transmission rates up to 2033 Mbps, with the 5 GHz band reaching up to 1733 Mbps. It is suitable for high-bandwidth applications such as 4K video and online live streaming. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202509-1748 | CVE-2025-10792 | D-Link Corporation of DIR-513 Buffer error vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A security vulnerability has been detected in D-Link DIR-513 A1FW110. Affected is an unknown function of the file /goform/formWPS. Such manipulation of the argument webpage leads to buffer overflow. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-513 The firmware contains buffer error vulnerabilities, classic buffer overflow vulnerabilities, and out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-513 is a wireless router product from D-Link, a Chinese company. Detailed vulnerability details are currently unavailable
| VAR-202509-1739 | CVE-2025-10779 | D-Link Corporation of DCS-935L Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in D-Link DCS-935L up to 1.13.01. The impacted element is the function sub_402280 of the file /HNAP1/. The manipulation of the argument HNAP_AUTH/SOAPAction results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DCS-935L An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DCS-935L is a router manufactured by D-Link, a Chinese company. This vulnerability stems from the failure of the HNAP_AUTH/SOAPAction parameter in the file /HNAP1/ to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service
| VAR-202509-3067 | CVE-2025-57296 | Tenda AC6 formSetIptv function command injection vulnerability |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
Tenda AC6 router firmware 15.03.05.19 contains a command injection vulnerability in the formSetIptv function, which processes requests to the /goform/SetIPTVCfg web interface. When handling the list and vlanId parameters, the sub_ADBC0 helper function concatenates these user-supplied values into nvram set system commands using doSystemCmd, without validating or sanitizing special characters (e.g., ;, ", #). An unauthenticated or authenticated attacker can exploit this by submitting a crafted POST request, leading to arbitrary system command execution on the affected device. The Tenda AC6 is a dual-band wireless router from Tenda, supporting both 2.4GHz and 5GHz bands and achieving a maximum transfer rate of 1167Mbps. Detailed vulnerability details are currently unavailable
| VAR-202509-3635 | CVE-2025-57528 | Shenzhen Tenda Technology Co.,Ltd. of AC6 Firmware Input Validation Vulnerability |
CVSS V2: 7.3 CVSS V3: 7.7 Severity: HIGH |
An issue was discovered in Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01 allowing attackers to cause a denial of service via the funcname, funcpara1, funcpara2 parameters to the formSetCfm function (uri path: SetCfm). Shenzhen Tenda Technology Co.,Ltd. of AC6 There is an input validation vulnerability in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda AC6 is a dual-band wireless router from Tenda, supporting both 2.4GHz and 5GHz bands and achieving a maximum transmission rate of 1167Mbps.
The Tenda AC6 suffers from an improper input validation vulnerability caused by improper handling of the funcname, funcpara1, and funcpara2 parameters in the formSetCfm function. Detailed vulnerability details are currently unavailable
| VAR-202509-4456 | No CVE | Advantech (China) Co., Ltd.'s ADAM-3600 has a logic defect vulnerability. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The ADAM-3600 is an intelligent remote terminal device developed by Advantech for remote IoT applications.
Advantech Technology (China) Co., Ltd.'s ADAM-3600 contains a logical flaw vulnerability that attackers could exploit to obtain sensitive information.
| VAR-202509-4465 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd.'s AC20 has a denial-of-service vulnerability. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The AC20 is a wireless router.
The AC20 router developed by Shenzhen Jixiang Tengda Technology Co., Ltd. contains a denial-of-service vulnerability, which attackers can exploit to cause a denial-of-service attack.
| VAR-202509-4546 | No CVE | Fujitsu (China) Co., Ltd. CX2550 M2 has a weak password vulnerability. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The CX2550 M2 is a 2U rackmount server node designed for high-performance computing, managed services, and big data applications. It utilizes Intel® Xeon® E5-2600 v4 series processors and offers high-density computing and scalability.
A weak password vulnerability exists in the Fujitsu (China) Co., Ltd. CX2550 M2 server, which attackers could exploit to obtain sensitive information.
| VAR-202509-1655 | CVE-2025-10689 | D-Link Corporation of DIR-645 Injection Vulnerability in Firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability was identified in D-Link DIR-645 105B01. This issue affects the function soapcgi_main of the file /soap.cgi. Such manipulation of the argument service leads to command injection. The attack can be launched remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer. (DoS) It may be in a state. The D-Link DIR-645 is a gigabit wireless router launched by D-Link in 2012, designed primarily for home and small- to medium-sized businesses.
The D-Link DIR-645 suffers from a command injection vulnerability caused by the "service" parameter in the file "/soap.cgi" failing to properly sanitize special characters and commands when constructing commands. Detailed vulnerability details are currently unavailable
| VAR-202509-1560 | CVE-2025-10666 | D-Link Corporation of DIR-825 Classic buffer overflow vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A security flaw has been discovered in D-Link DIR-825 up to 2.10. Affected by this vulnerability is the function sub_4106d4 of the file apply.cgi. The manipulation of the argument countdown_time results in buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be exploited. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-825 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-825 is a dual-band wireless router designed for small and medium-sized enterprises (SMEs) and SOHO environments. It supports both 2.4GHz and 5GHz bands, meeting the needs of multi-device HD video transmission. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
| VAR-202509-1835 | CVE-2025-10634 | D-Link Corporation of DIR-823X Injection Vulnerability in Firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. D-Link Corporation of DIR-823X The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-823X is a wireless router from D-Link, a Chinese company. An attacker could exploit this vulnerability to execute arbitrary commands
| VAR-202509-1573 | CVE-2025-10629 | D-Link Corporation of DIR-852 Command injection vulnerability in firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability was determined in D-Link DIR-852 1.00CN B09. This issue affects the function ssdpcgi_main of the file htodcs/cgibin of the component Simple Service Discovery Protocol Service. Executing manipulation of the argument ST can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-852 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202509-1629 | CVE-2025-10628 | D-Link Corporation of DIR-852 Command injection vulnerability in firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability was found in D-Link DIR-852 1.00CN B09. This vulnerability affects unknown code of the file /htdocs/cgibin/hedwig.cgi of the component Web Management Interface. Performing manipulation results in command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-852 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202509-4454 | No CVE | A binary vulnerability exists in AC18 of Shenzhen Jixiang Tengda Technology Co., Ltd. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The AC18 is a dual-band wireless router.
The AC18 router developed by Shenzhen Jixiang Tengda Technology Co., Ltd. contains a binary vulnerability that attackers could exploit to cause a denial-of-service attack.
| VAR-202509-4508 | No CVE | The Canon MF220 Series from Canon (China) Co., Ltd. has a weak password vulnerability. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Canon MF220 Series is a 4-in-1 multifunction laser printer.
Canon (China) Co., Ltd.'s Canon MF220 Series printer has a weak password vulnerability that attackers could exploit to obtain sensitive information.
| VAR-202509-4526 | No CVE | WAGO Electronics (Tianjin) Co., Ltd. has an unauthorized access vulnerability in port 750-880. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The 750-880 is a third-generation programmable fieldbus controller with Ethernet communication, SD card expansion, and industrial protocol support capabilities, primarily used in industrial automation control.
WAGO Electronics (Tianjin) Co., Ltd.'s 750-880 model contains an unauthorized access vulnerability, which attackers could exploit to obtain sensitive information.
| VAR-202509-4521 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd.'s AC21 has a binary vulnerability. |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
The AC21 is a router product.
The AC21 router produced by Shenzhen Jixiang Tengda Technology Co., Ltd. contains a binary vulnerability that attackers could exploit to cause a denial-of-service attack.
| VAR-202509-4545 | No CVE | Lexmark International Inc.'s Lexmark CX921de contains an unauthorized access vulnerability. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Lexmark CX921de is a color laser printer designed for the commercial market.
A vulnerability exists in the Lexmark International Inc. Lexmark CX921de printer that could be exploited by an attacker to obtain sensitive information.
| VAR-202509-4540 | No CVE | WAGO Electronics (Tianjin) Co., Ltd.'s WAGO 750-890 has a weak password vulnerability. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The WAGO 750-890 is a Modbus TCP controller suitable for industrial automation systems and supports the Modbus communication protocol.
WAGO Electronics (Tianjin) Co., Ltd.'s WAGO 750-890 has a weak password vulnerability that attackers could exploit to obtain sensitive information.
| VAR-202509-4466 | No CVE | WAGO 750-881, manufactured by WAGO Electronics (Tianjin) Co., Ltd., contains an unauthorized access vulnerability. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The WAGO 750-881 is an Ethernet switch module primarily used in industrial automation control scenarios. It supports the TCP/IP protocol and is compatible with the 750 series devices.
WAGO Electronics (Tianjin) Co., Ltd.'s WAGO 750-881 contains an unauthorized access vulnerability, which attackers could exploit to obtain sensitive information.