VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202509-1746 CVE-2025-10803 Shenzhen Tenda Technology Co.,Ltd.  of  ac23  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability has been found in Tenda AC23 up to 16.03.07.52. Affected by this vulnerability is the function sscanf of the file /goform/SetPptpServerCfg of the component HTTP POST Request Handler. Such manipulation of the argument startIp leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. of ac23 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. It offers dual-band concurrent transmission rates up to 2033 Mbps, with the 5 GHz band reaching up to 1733 Mbps. It is suitable for high-bandwidth applications such as 4K video and online live streaming. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202509-1748 CVE-2025-10792 D-Link Corporation  of  DIR-513  Buffer error vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security vulnerability has been detected in D-Link DIR-513 A1FW110. Affected is an unknown function of the file /goform/formWPS. Such manipulation of the argument webpage leads to buffer overflow. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-513 The firmware contains buffer error vulnerabilities, classic buffer overflow vulnerabilities, and out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-513 is a wireless router product from D-Link, a Chinese company. Detailed vulnerability details are currently unavailable
VAR-202509-1739 CVE-2025-10779 D-Link Corporation  of  DCS-935L  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was found in D-Link DCS-935L up to 1.13.01. The impacted element is the function sub_402280 of the file /HNAP1/. The manipulation of the argument HNAP_AUTH/SOAPAction results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DCS-935L An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DCS-935L is a router manufactured by D-Link, a Chinese company. This vulnerability stems from the failure of the HNAP_AUTH/SOAPAction parameter in the file /HNAP1/ to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service
VAR-202509-3067 CVE-2025-57296 Tenda AC6 formSetIptv function command injection vulnerability CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
Tenda AC6 router firmware 15.03.05.19 contains a command injection vulnerability in the formSetIptv function, which processes requests to the /goform/SetIPTVCfg web interface. When handling the list and vlanId parameters, the sub_ADBC0 helper function concatenates these user-supplied values into nvram set system commands using doSystemCmd, without validating or sanitizing special characters (e.g., ;, ", #). An unauthenticated or authenticated attacker can exploit this by submitting a crafted POST request, leading to arbitrary system command execution on the affected device. The Tenda AC6 is a dual-band wireless router from Tenda, supporting both 2.4GHz and 5GHz bands and achieving a maximum transfer rate of 1167Mbps. Detailed vulnerability details are currently unavailable
VAR-202509-3635 CVE-2025-57528 Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Firmware Input Validation Vulnerability CVSS V2: 7.3
CVSS V3: 7.7
Severity: HIGH
An issue was discovered in Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01 allowing attackers to cause a denial of service via the funcname, funcpara1, funcpara2 parameters to the formSetCfm function (uri path: SetCfm). Shenzhen Tenda Technology Co.,Ltd. of AC6 There is an input validation vulnerability in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda AC6 is a dual-band wireless router from Tenda, supporting both 2.4GHz and 5GHz bands and achieving a maximum transmission rate of 1167Mbps. The Tenda AC6 suffers from an improper input validation vulnerability caused by improper handling of the funcname, funcpara1, and funcpara2 parameters in the formSetCfm function. Detailed vulnerability details are currently unavailable
VAR-202509-4456 No CVE Advantech (China) Co., Ltd.'s ADAM-3600 has a logic defect vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The ADAM-3600 is an intelligent remote terminal device developed by Advantech for remote IoT applications. Advantech Technology (China) Co., Ltd.'s ADAM-3600 contains a logical flaw vulnerability that attackers could exploit to obtain sensitive information.
VAR-202509-4465 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd.'s AC20 has a denial-of-service vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The AC20 is a wireless router. The AC20 router developed by Shenzhen Jixiang Tengda Technology Co., Ltd. contains a denial-of-service vulnerability, which attackers can exploit to cause a denial-of-service attack.
VAR-202509-4546 No CVE Fujitsu (China) Co., Ltd. CX2550 M2 has a weak password vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The CX2550 M2 is a 2U rackmount server node designed for high-performance computing, managed services, and big data applications. It utilizes Intel® Xeon® E5-2600 v4 series processors and offers high-density computing and scalability. A weak password vulnerability exists in the Fujitsu (China) Co., Ltd. CX2550 M2 server, which attackers could exploit to obtain sensitive information.
VAR-202509-1655 CVE-2025-10689 D-Link Corporation  of  DIR-645  Injection Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was identified in D-Link DIR-645 105B01. This issue affects the function soapcgi_main of the file /soap.cgi. Such manipulation of the argument service leads to command injection. The attack can be launched remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer. (DoS) It may be in a state. The D-Link DIR-645 is a gigabit wireless router launched by D-Link in 2012, designed primarily for home and small- to medium-sized businesses. The D-Link DIR-645 suffers from a command injection vulnerability caused by the "service" parameter in the file "/soap.cgi" failing to properly sanitize special characters and commands when constructing commands. Detailed vulnerability details are currently unavailable
VAR-202509-1560 CVE-2025-10666 D-Link Corporation  of  DIR-825  Classic buffer overflow vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A security flaw has been discovered in D-Link DIR-825 up to 2.10. Affected by this vulnerability is the function sub_4106d4 of the file apply.cgi. The manipulation of the argument countdown_time results in buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be exploited. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-825 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-825 is a dual-band wireless router designed for small and medium-sized enterprises (SMEs) and SOHO environments. It supports both 2.4GHz and 5GHz bands, meeting the needs of multi-device HD video transmission. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202509-1835 CVE-2025-10634 D-Link Corporation  of  DIR-823X  Injection Vulnerability in Firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. D-Link Corporation of DIR-823X The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DIR-823X is a wireless router from D-Link, a Chinese company. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202509-1573 CVE-2025-10629 D-Link Corporation  of  DIR-852  Command injection vulnerability in firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was determined in D-Link DIR-852 1.00CN B09. This issue affects the function ssdpcgi_main of the file htodcs/cgibin of the component Simple Service Discovery Protocol Service. Executing manipulation of the argument ST can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-852 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202509-1629 CVE-2025-10628 D-Link Corporation  of  DIR-852  Command injection vulnerability in firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was found in D-Link DIR-852 1.00CN B09. This vulnerability affects unknown code of the file /htdocs/cgibin/hedwig.cgi of the component Web Management Interface. Performing manipulation results in command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-852 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202509-4454 No CVE A binary vulnerability exists in AC18 of Shenzhen Jixiang Tengda Technology Co., Ltd. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The AC18 is a dual-band wireless router. The AC18 router developed by Shenzhen Jixiang Tengda Technology Co., Ltd. contains a binary vulnerability that attackers could exploit to cause a denial-of-service attack.
VAR-202509-4508 No CVE The Canon MF220 Series from Canon (China) Co., Ltd. has a weak password vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Canon MF220 Series is a 4-in-1 multifunction laser printer. Canon (China) Co., Ltd.'s Canon MF220 Series printer has a weak password vulnerability that attackers could exploit to obtain sensitive information.
VAR-202509-4526 No CVE WAGO Electronics (Tianjin) Co., Ltd. has an unauthorized access vulnerability in port 750-880. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The 750-880 is a third-generation programmable fieldbus controller with Ethernet communication, SD card expansion, and industrial protocol support capabilities, primarily used in industrial automation control. WAGO Electronics (Tianjin) Co., Ltd.'s 750-880 model contains an unauthorized access vulnerability, which attackers could exploit to obtain sensitive information.
VAR-202509-4521 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd.'s AC21 has a binary vulnerability. CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
The AC21 is a router product. The AC21 router produced by Shenzhen Jixiang Tengda Technology Co., Ltd. contains a binary vulnerability that attackers could exploit to cause a denial-of-service attack.
VAR-202509-4545 No CVE Lexmark International Inc.'s Lexmark CX921de contains an unauthorized access vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Lexmark CX921de is a color laser printer designed for the commercial market. A vulnerability exists in the Lexmark International Inc. Lexmark CX921de printer that could be exploited by an attacker to obtain sensitive information.
VAR-202509-4540 No CVE WAGO Electronics (Tianjin) Co., Ltd.'s WAGO 750-890 has a weak password vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The WAGO 750-890 is a Modbus TCP controller suitable for industrial automation systems and supports the Modbus communication protocol. WAGO Electronics (Tianjin) Co., Ltd.'s WAGO 750-890 has a weak password vulnerability that attackers could exploit to obtain sensitive information.
VAR-202509-4466 No CVE WAGO 750-881, manufactured by WAGO Electronics (Tianjin) Co., Ltd., contains an unauthorized access vulnerability. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The WAGO 750-881 is an Ethernet switch module primarily used in industrial automation control scenarios. It supports the TCP/IP protocol and is compatible with the 750 series devices. WAGO Electronics (Tianjin) Co., Ltd.'s WAGO 750-881 contains an unauthorized access vulnerability, which attackers could exploit to obtain sensitive information.