VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202509-0001 CVE-2025-9752 D-Link Corporation  of  DIR-852  in the firmware  OS  Command injection vulnerability CVSS V2: 7.5
CVSS V3: 7.3
Severity: Medium
A security vulnerability has been detected in D-Link DIR-852 1.00CN B09. Impacted is the function soapcgi_main of the file soap.cgi of the component SOAP Service. Such manipulation of the argument service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer. (DoS) It may be in a state
VAR-202508-2441 CVE-2025-9748 Shenzhen Tenda Technology Co.,Ltd.  of  ch22  Out-of-bounds write vulnerability in firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
A vulnerability was determined in Tenda CH22 1.0.0.1. Affected by this issue is the function fromIpsecitem of the file /goform/IPSECsave of the component httpd. Executing manipulation of the argument ipsecno can lead to stack-based buffer overflow. The attack may be performed from remote. Shenzhen Tenda Technology Co.,Ltd. of ch22 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda CH22 suffers from a buffer overflow vulnerability caused by a failure to properly validate the length of the input data in the parameter "ipsecno" in the file "/goform/IPSECsave". This vulnerability could allow an attacker to execute arbitrary code on the system or cause a denial of service
VAR-202508-2473 CVE-2025-9745 D-Link Corporation  of  DI-500WF  in the firmware  OS  Command injection vulnerability CVSS V2: 5.8
CVSS V3: 4.7
Severity: Low
A security vulnerability has been detected in D-Link DI-500WF 14.04.10A1T. The impacted element is an unknown function of the file /version_upgrade.asp of the component jhttpd. The manipulation of the argument path leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. D-Link Corporation of DI-500WF The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The D-Link DI-500WF is a panel-mounted wireless access point (AP) primarily used for building wireless network coverage environments. It supports the 802.11n protocol and has a theoretical maximum transmission rate of 150Mbps. This vulnerability stems from the fact that the parameter `path` in the file `/version_upgrade.asp` fails to properly filter special characters and commands used in command construction. Detailed vulnerability information is not currently available
VAR-202508-2475 CVE-2025-9731 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  Hardcoded password usage vulnerability in firmware CVSS V2: 1.0
CVSS V3: 2.5
Severity: Low
A vulnerability was determined in Tenda AC9 15.03.05.19. The impacted element is an unknown function of the file /etc_ro/shadow of the component Administrative Interface. This manipulation causes hard-coded credentials. It is possible to launch the attack on the local host. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been publicly disclosed and may be utilized. Shenzhen Tenda Technology Co.,Ltd. of AC9 The firmware contains vulnerabilities related to the use of hard-coded passwords and vulnerabilities related to the use of hard-coded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker could exploit this vulnerability to compromise confidentiality
VAR-202508-2617 CVE-2025-9727 D-Link Corporation  of  DIR-816L  Command injection vulnerability in firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A weakness has been identified in D-Link DIR-816L 206b01. Affected by this issue is the function soapcgi_main of the file /soap.cgi. This manipulation of the argument service causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-816L The firmware contains a command injection vulnerability. (DoS) It may be in a state. The D-Link DIR-816L is a dual-band wireless router that supports 2.4GHz and 5GHz bands, with a maximum transmission rate of 450Mbps. This vulnerability stems from the fact that the `service` parameter in the file `/soap.cgi` fails to properly filter special characters and commands used in command construction. Detailed vulnerability information is not currently available
VAR-202508-3455 No CVE Mosa Technology (Shanghai) Co., Ltd.'s NPort 5410 has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The NPort 5410 is an industrial-grade serial communication processor primarily used to connect traditional serial devices to a network for remote management and monitoring. The NPort 5410 from Mosa Technology (Shanghai) Co., Ltd. has an unauthorized access vulnerability that could allow attackers to obtain sensitive information.
VAR-202508-2645 CVE-2025-9377 plural  TP-LINK Technologies  In the product  OS  Command injection vulnerability CVSS V2: -
CVSS V3: 7.2
Severity: HIGH
The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9. This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108. Both products have reached the status of EOL (end-of-life). It's recommending to purchase the new product to ensure better performance and security. If replacement is not an option in the short term, please use the second reference link to download and install the patch(es). TP-LINK Technologies of TL-WR841N firmware, TL-WR841ND firmware, Archer C7 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-2727 CVE-2025-55763 CivetWeb project  of  CivetWeb  Stack-based buffer overflow vulnerability in CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Buffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or arbitrary code execution. CivetWeb project of CivetWeb Exists in a stack-based buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202508-2393 CVE-2025-9605 Shenzhen Tenda Technology Co.,Ltd.  of  ac21  firmware and  ac23  Buffer error vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: High
A security vulnerability has been detected in Tenda AC21 and AC23 16.03.08.16. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. Such manipulation of the argument mac leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. Shenzhen Tenda Technology Co.,Ltd. of ac21 firmware and ac23 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-2619 CVE-2025-9603 Telesquare  of  TLR-2005KSH  Command injection vulnerability in firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was determined in Telesquare TLR-2005KSH 1.2.4. The affected element is an unknown function of the file /cgi-bin/internet.cgi?Command=lanCfg. Executing manipulation of the argument Hostname can lead to command injection. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. Telesquare of TLR-2005KSH Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-3772 No CVE Toshiba Corporation. e-STUDIO478S has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The e-STUDIO478S is a printer. Toshiba Corporation. The e-STUDIO478S has an unauthorized access vulnerability that could allow an attacker to obtain sensitive information.
VAR-202508-3777 No CVE RICOH M C251FW of Ricoh (China) Investment Co., Ltd. has an unauthorized access vulnerability CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
The RICOH M C251FW is an A4 color laser multifunction printer that supports Wi-Fi Direct and NFC. The RICOH M C251FW, manufactured by Ricoh (China) Investment Co., Ltd., has an unauthorized access vulnerability that could allow an attacker to obtain sensitive information and modify user passwords.
VAR-202508-3775 No CVE IIST IICAM500GK has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The IICAM500GK is a webcam product. The IIST IICAM500GK has a weak password vulnerability that could allow attackers to log into the system and obtain sensitive information.
VAR-202508-3771 No CVE LanZhuo Digital Technology Co., Ltd.'s SupOS industrial operating system has an information leakage vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The SupOS industrial operating system, developed by LanZhuo Digital Technology Co., Ltd., directly addresses core manufacturing scenarios, addressing issues such as production equipment management, production control, production management, production safety, and business operations. It helps companies achieve the five key goals of safety, quality improvement, cost reduction, efficiency improvement, and environmental protection. LanZhuo Digital Technology Co., Ltd.'s SupOS industrial operating system contains an information leakage vulnerability that could be exploited by attackers to obtain sensitive information.
VAR-202508-2427 CVE-2025-9577 TOTOLINK  of  x2000r  Firmware vulnerabilities CVSS V2: 1.0
CVSS V3: 2.5
Severity: Low
A security flaw has been discovered in TOTOLINK X2000R up to 2.0.0. The affected element is an unknown function of the file /etc/shadow.sample of the component Administrative Interface. The manipulation results in use of default credentials. Attacking locally is a requirement. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit has been released to the public and may be exploited. TOTOLINK of x2000r There are unspecified vulnerabilities in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK X2000R is a WiFi 6 router released by China's TOTOLINK Electronics. It supports Gigabit networking and Easy Mesh functionality, enabling multi-device connectivity and wireless expansion. Detailed vulnerability details are currently unavailable
VAR-202508-2557 CVE-2025-57220 Shenzhen Tenda Technology Co.,Ltd.  of  AC10  Firmware Input Validation Vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
An input validation flaw in the 'ate' service of Tenda AC10 v4.0 firmware v16.03.10.09_multi_TDE01 to escalate privileges to root via a crafted UDP packet. Shenzhen Tenda Technology Co.,Ltd. of AC10 There is an input validation vulnerability in firmware.Information may be obtained. The Tenda AC10 is a dual-band gigabit wireless router launched by Shenzhen Jixiang Tengda Technology Co., Ltd., primarily for users with fiber optic connections of 200Mbps and above. Detailed vulnerability details are currently unavailable
VAR-202508-2517 CVE-2025-57219 Shenzhen Tenda Technology Co.,Ltd.  of  AC10  Access control vulnerabilities in firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Incorrect access control in the endpoint /goform/ate of Tenda AC10 v4.0 firmware v16.03.10.09_multi_TDE01 allows attackers to escalate privileges or access sensitive components via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of AC10 Firmware contains an access control vulnerability.Information may be obtained. The Tenda AC10 is a dual-band gigabit wireless router launched by Shenzhen Jixiang Tengda Technology Co., Ltd., primarily for users with fiber optic connections of 200Mbps and above
VAR-202508-2507 CVE-2025-57215 Shenzhen Tenda Technology Co.,Ltd.  of  AC10  Stack-based buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Tenda AC10 v4.0 firmware v16.03.10.20 was discovered to contain a stack overflow via the function get_parentControl_list_Info. Shenzhen Tenda Technology Co.,Ltd. of AC10 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda AC10 is a dual-band gigabit wireless router launched by Shenzhen Jixiang Tengda Technology Co., Ltd., primarily targeting fiber optic users with speeds of 200 Mbps and above. The Tenda AC10 suffers from a stack buffer overflow vulnerability caused by the get_parentControl_list_Info function's failure to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
VAR-202508-2380 CVE-2025-9575 Linksys  of  RE6250  Command injection vulnerabilities in firmware and other products from multiple vendors CVSS V2: 6.5
CVSS V3: 6.3
Severity: Low
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function cgiMain of the file /cgi-bin/upload.cgi. Executing manipulation of the argument filename can lead to os command injection. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. Linksys of RE6250 Firmware and other products from multiple vendors have command injection vulnerabilities, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202508-2571 CVE-2025-57218 Shenzhen Tenda Technology Co.,Ltd.  of  AC10  Stack-based buffer overflow vulnerability in firmware CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Tenda AC10 v4.0 firmware v16.03.10.09_multi_TDE01 was discovered to contain a stack overflow via the security_5g parameter in the function sub_46284C. Shenzhen Tenda Technology Co.,Ltd. of AC10 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda AC10 is a dual-band gigabit wireless router launched by Shenzhen Jixiang Tengda Technology Co., Ltd., primarily targeting users with fiber optic connections of 200Mbps and above. This vulnerability stems from the failure of the security_5g parameter in the sub_46284C function to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service