VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202510-4394 No CVE Mosa Technology (Shanghai) Co., Ltd.'s NPort 5150A has an unauthorized access vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The NPort 5150A is a device server. Mosa Technology (Shanghai) Co., Ltd.'s NPort 5150A contains an unauthorized access vulnerability that could be exploited by attackers to obtain sensitive information.
VAR-202510-2194 CVE-2025-62580 Delta Electronics ASDA-Soft PAR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
ASDA-Soft Stack-based Buffer Overflow Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics ASDA-Soft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Delta Electronics ASDA-Soft is an AC servo motor manufactured by Delta Electronics, a Chinese company
VAR-202510-2150 CVE-2025-62579 Delta Electronics ASDA-Soft PAR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
ASDA-Soft Stack-based Buffer Overflow Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics ASDA-Soft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Delta Electronics ASDA-Soft is an AC servo motor manufactured by Delta Electronics, a Chinese company
VAR-202510-2979 CVE-2025-11832 An unidentified vulnerability exists in Azure Access Technology BLU-IC2 and Azure Access Technology BLU-IC4 (CNVD-2025-29155). CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Allocation of Resources Without Limits or Throttling vulnerability in Azure Access Technology BLU-IC2, Azure Access Technology BLU-IC4 allows Flooding.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. Attackers could exploit this vulnerability to launch a flood attack
VAR-202510-4196 CVE-2025-20351 CVSS V2: -
CVSS V3: 6.1
Severity: MEDIUM
A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 running Cisco SIP Software could allow an unauthenticated, remote attacker to conduct XSS attacks against a user of the web UI. This vulnerability exists because the web UI of an affected device does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Note: To exploit this vulnerability, the phone must be registered to Cisco Unified Communications Manager and have Web Access enabled. Web Access is disabled by default.
VAR-202510-3182 CVE-2025-20350 CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 running Cisco SIP Software could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to a buffer overflow when an affected device processes HTTP packets. An attacker could exploit this vulnerability by sending crafted HTTP input to the device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Note: To exploit this vulnerability, the phone must be registered to Cisco Unified Communications Manager and have Web Access enabled. Web Access is disabled by default.
VAR-202510-2337 CVE-2025-61990 F5 BIG-IP TMM module denial of service vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: High
When using a multi-bladed platform with more than one blade, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. A denial of service vulnerability exists in the TMM module of the BIG-IP system. An attacker could exploit this vulnerability to launch a denial of service attack against the BIG-IP system, disrupting traffic and causing the TMM process to restart
VAR-202510-2218 CVE-2025-58071 F5 BIG-IP IPsec Denial of Service Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: High
When IPsec is configured on the BIG-IP system, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. A denial of service vulnerability exists in BIG-IP's IPsec module. An attacker could exploit this vulnerability to cause a denial of service on the BIG-IP system, disrupting traffic flow and restarting the TMM process
VAR-202510-2092 CVE-2025-61974 F5 BIG-IP SSL/TLS Profile Denial of Service Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: High
When a client SSL profile is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. The SSL/TLS module in BIG-IP contains a denial of service vulnerability. An attacker could exploit this vulnerability to degrade system performance, potentially leading to a denial of service
VAR-202510-0885 CVE-2025-61958 F5 BIG-IP iHealth tool permission bypass vulnerability CVSS V2: 9.4
CVSS V3: 8.7
Severity: High
A vulnerability exists in the iHealth command that may allow an authenticated attacker with at least a resource administrator role to bypass tmsh restrictions and gain access to a bash shell.   For BIG-IP systems running in Appliance mode, a successful exploit can allow the attacker to cross a security boundary.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. A privilege bypass vulnerability exists in BIG-IP's iHealth tool (a module of the TMOS Shell)
VAR-202510-1592 CVE-2025-60016 F5 BIG-IP SSL/TLS Denial of Service Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: High
When Diffie-Hellman (DH) group Elliptic Curve Cryptography (ECC) Brainpool curves are configured in an SSL profile's Cipher Rule or Cipher Group, and that profile is applied to a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. A denial of service vulnerability exists in the BIG-IP SSL/TLS module. Undisclosed traffic can cause the Traffic Management Microkernel (TMM) process to terminate. An attacker could exploit this vulnerability to launch a denial of service attack against the BIG-IP system
VAR-202510-1083 CVE-2025-59481 F5 BIG-IP Privilege Escalation Vulnerability CVSS V2: 9.4
CVSS V3: 8.7
Severity: High
A vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with at least resource administrator role to execute arbitrary system commands with higher privileges.   A successful exploit can allow the attacker to cross a security boundary.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. A privilege escalation vulnerability exists in BIG-IP's iControl REST and TMOS Shell (tmsh) modules
VAR-202510-2219 CVE-2025-58424 F5 BIG-IP TMM data tampering vulnerability CVSS V2: 2.6
CVSS V3: 5.3
Severity: Medium
On BIG-IP systems, undisclosed traffic can cause data corruption and unauthorized data modification in protocols which do not have message integrity protection.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. The TMM module in BIG-IP contains a data tampering vulnerability
VAR-202510-0756 CVE-2025-58096 F5 BIG-IP TMM Denial of Service Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: High
When the database variable tm.tcpudptxchecksum is configured as non-default value Software-only on a BIG-IP system, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. A denial of service vulnerability exists in the Traffic Management Microkernel (TMM) module of BIG-IP. An attacker could exploit this vulnerability to launch a denial of service (DoS) attack against the BIG-IP system
VAR-202510-1106 CVE-2025-55036 F5 BIG-IP SSL Orchestrator Memory Corruption Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: High
When BIG-IP SSL Orchestrator explicit forward proxy is configured on a virtual server and the proxy connect feature is enabled, undisclosed traffic may cause memory corruption.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. An attacker could exploit this vulnerability to cause system performance degradation, ultimately forcing or manually restarting the Traffic Management Microkernel (TMM) process, resulting in a denial of service (DoS)
VAR-202510-1108 CVE-2025-54805 F5 BIG-IP Next TMM Memory Resource Management Vulnerability CVSS V2: 6.8
CVSS V3: 6.5
Severity: Medium
When an iRule is configured on a virtual server via the declarative API, upon re-instantiation, the cleanup process can cause an increase in the Traffic Management Microkernel (TMM) memory resource utilization.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. The TMM module in BIG-IP Next contains a memory resource management vulnerability. An attacker could exploit this vulnerability to degrade system performance and potentially cause a denial of service
VAR-202510-0946 CVE-2025-53856 F5 BIG-IP ePVA Denial of Service Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: High
When a virtual server, network address translation (NAT) object, or secure network address translation (SNAT) object uses the embedded Packet Velocity Acceleration (ePVA) feature, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.   To determine which BIG-IP platforms have an ePVA chip refer to K12837: Overview of the ePVA feature https://my.f5.com/manage/s/article/K12837 .   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. A denial of service vulnerability exists in BIG-IP's ePVA module. An attacker could exploit this vulnerability to cause a denial of service on the BIG-IP system
VAR-202510-3116 CVE-2025-55315 CVSS V2: -
CVSS V3: 9.9
Severity: CRITICAL
Inconsistent interpretation of http requests ('http request/response smuggling') in ASP.NET Core allows an authorized attacker to bypass a security feature over a network.
VAR-202510-0661 CVE-2024-47569 CVSS V2: -
CVSS V3: 4.3
Severity: MEDIUM
A insertion of sensitive information into sent data vulnerability in Fortinet FortiMail 7.4.0 through 7.4.2, FortiMail 7.2.0 through 7.2.6, FortiMail 7.0 all versions, FortiManager 7.6.0 through 7.6.1, FortiManager 7.4.1 through 7.4.3, FortiManager Cloud 7.4.1 through 7.4.3, FortiNDR 7.6.0 through 7.6.1, FortiNDR 7.4.0 through 7.4.8, FortiNDR 7.2 all versions, FortiNDR 7.1 all versions, FortiNDR 7.0 all versions, FortiNDR 1.5 all versions, FortiOS 7.6.0, FortiOS 7.4.0 through 7.4.4, FortiOS 7.2.0 through 7.2.8, FortiOS 7.0.0 through 7.0.15, FortiOS 6.4.0 through 6.4.15, FortiOS 6.2 all versions, FortiOS 6.0 all versions, FortiPAM 1.3 all versions, FortiPAM 1.2 all versions, FortiPAM 1.1 all versions, FortiPAM 1.0 all versions, FortiProxy 7.4.0 through 7.4.4, FortiProxy 7.2.0 through 7.2.10, FortiProxy 7.0 all versions, FortiProxy 2.0 all versions, FortiProxy 1.2 all versions, FortiProxy 1.1 all versions, FortiProxy 1.0 all versions, FortiRecorder 7.2.0 through 7.2.1, FortiRecorder 7.0.0 through 7.0.4, FortiTester 7.4.0 through 7.4.2, FortiTester 7.3 all versions, FortiTester 7.2 all versions, FortiTester 7.1 all versions, FortiTester 7.0 all versions, FortiTester 4.2 all versions, FortiVoice 7.0.0 through 7.0.4, FortiVoice 6.4.0 through 6.4.9, FortiVoice 6.0.7 through 6.0.12, FortiWeb 7.6.0, FortiWeb 7.4.0 through 7.4.4, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions, FortiWeb 6.4 all versions allows attacker to disclose sensitive information via specially crafted packets.
VAR-202510-1123 CVE-2025-47856 CVSS V2: -
CVSS V3: 7.2
Severity: HIGH
Two improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiVoice version 7.2.0, 7.0.0 through 7.0.6 and before 6.4.10 allows a privileged attacker to execute arbitrary code or commands via crafted HTTP/HTTPS or CLI requests.