VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202504-3390 CVE-2025-28031 TOTOLINK  of  A810R  Hardcoded password usage vulnerability in firmware CVSS V2: 6.1
CVSS V3: 6.5
Severity: MEDIUM
TOTOLINK A810R V4.1.2cu.5182_B20201026 was discovered to contain a hardcoded password for the telnet service in product.ini. TOTOLINK of A810R A vulnerability exists in the firmware related to the use of hardcoded passwords.Information may be obtained and information may be tampered with. TOTOLINK A810R is a wireless dual-band router from China's TOTOLINK Electronics. TOTOLINK A810R V4.1.2cu.5182_B20201026 has a trust management vulnerability, which is caused by a hard-coded password in product.ini. Attackers can exploit this vulnerability to cause authentication errors
VAR-202504-3251 CVE-2025-28030 TOTOLINK  of  A810R  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK A810R V4.1.2cu.5182_B20201026 was discovered to contain a stack overflow via the startTime and endTime parameters in setParentalRules function. TOTOLINK of A810R A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A810R is a wireless dual-band router from China's TOTOLINK Electronics. TOTOLINK A810R V4.1.2cu.5182_B20201026 has a buffer overflow vulnerability. The vulnerability is caused by the startTime and endTime parameters in the setParentalRules function failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202504-3327 CVE-2025-28024 TOTOLINK  of  A810R  Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerability in the cstecgi.cgi. TOTOLINK of A810R Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A810R is a wireless dual-band router from China's TOTOLINK Electronics. The vulnerability is caused by cstecgi.cgi failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202504-3389 CVE-2025-28034 plural  TOTOLINK  In the product  OS  Command injection vulnerability CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
TOTOLINK A800R V4.1.2cu.5137_B20200730, A810R V4.1.2cu.5182_B20201026, A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a pre-auth remote command execution vulnerability in the NTPSyncWithHost function through the hostTime parameter. a800r firmware, A810R firmware, A830R firmware etc. TOTOLINK The product has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-3329 CVE-2025-28033 plural  TOTOLINK  Stack-based buffer overflow vulnerability in products CVSS V2: -
CVSS V3: 7.3
Severity: HIGH
TOTOLINK A800R V4.1.2cu.5137_B20200730, A810R V4.1.2cu.5182_B20201026, A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a pre-auth buffer overflow vulnerability in the setNoticeCfg function through the IpTo parameter. a800r firmware, A810R firmware, A830R firmware etc. TOTOLINK The product contains a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-3345 CVE-2025-28032 plural  TOTOLINK  Stack-based buffer overflow vulnerability in products CVSS V2: -
CVSS V3: 7.3
Severity: HIGH
TOTOLINK A800R V4.1.2cu.5137_B20200730, A810R V4.1.2cu.5182_B20201026, A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 contain a pre-auth buffer overflow vulnerability in the setNoticeCfg function through the IpForm parameter. a800r firmware, A810R firmware, A830R firmware etc. TOTOLINK The product contains a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-3648 No CVE TOSHIBA e-STUDIO4508A has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
TOSHIBA e-STUDIO4508A is a high-performance black-and-white digital multifunction printer suitable for office environments, providing printing, copying and scanning functions. ‌ TOSHIBA e-STUDIO4508A has a weak password vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202504-3808 No CVE Beijing Zhixin Microelectronics Technology Co., Ltd.'s intelligent fusion terminal has industrial control equipment vulnerabilities CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Beijing Zhixin Microelectronics Technology Co., Ltd. is a high-tech enterprise focusing on the field of microelectronics. Beijing Zhixin Microelectronics Technology Co., Ltd.'s intelligent fusion terminal has an industrial control equipment vulnerability, which can be exploited by attackers to obtain server permissions.
VAR-202504-4020 No CVE Netshi Technology Co., Ltd. W1 series routers have unauthorized access vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Founded in 2016, Netshi Technology Co., Ltd. is a high-tech enterprise focusing on the research, development, production and sales of data communication network equipment. Netshi Technology Co., Ltd.'s W1 series routers have an unauthorized access vulnerability that attackers can exploit to obtain sensitive information.
VAR-202504-3810 No CVE MOBOTIX Q22 has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
‌MOBOTIX Q22 is a 360-degree panoramic network camera. ‌MOBOTIX Q22 is a 360-degree panoramic network camera. MOBOTIX Q22 has an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202504-3734 No CVE MOBOTIX S14 has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
MOBOTIX S14 is a camera. MOBOTIX S14 has an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202504-3812 No CVE MOBOTIX D22 has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
MOBOTIX D22 is a camera. MOBOTIX D22 has an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202504-3879 No CVE Shenzhen Bilian Electronics Co., Ltd. BL-LTE300 has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
BL-LTE300 is a home router. Shenzhen Bilian Electronics Co., Ltd. BL-LTE300 has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202504-3955 No CVE MOBOTIX M1 has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
MOBOTIX M1 is a camera. MOBOTIX M1 has an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202504-4090 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. A15 has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
A15 is a dual-band 3G wireless router suitable for fiber-optic homes within 1000M. Shenzhen Jixiang Tengda Technology Co., Ltd. A15 has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202504-3877 No CVE MOBOTIX D10 has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
MOBOTIX D10 is a high-performance smart network camera. MOBOTIX D10 has an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202504-3650 No CVE Fuhong Technology Co., Ltd. IP Network Camera has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Fuhong Technology Co., Ltd. was established in 1991. It has always been committed to the development and manufacture of image monitoring systems with professional R&D and perfect sales services as its core orientation. Its product systems include environmental monitoring and mobile monitoring, and it achieves comprehensive security protection with the vision of system integration and solutions. Fuhong Technology Co., Ltd. IP Network Camera has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202504-3512 No CVE MOBOTIX P25 has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
MOBOTIX P25 is a high-performance smart network camera. MOBOTIX P25 has an unauthorized access vulnerability that can be exploited by attackers to obtain sensitive information.
VAR-202504-3735 No CVE Beijing Yakong Technology Development Co., Ltd. kingh5stream has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Beijing Yakong Technology Development Co., Ltd. is a high-tech enterprise of industrial automation and information software platform, focusing on independent research and development, marketing and service of domestic industrial software. Beijing Yakong Technology Development Co., Ltd. kingh5stream has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202504-4091 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. AC8 has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
AC8 is a dual-band three-gigabit wireless router suitable for fiber-optic homes within 1000 megabits, supporting gigabit ports, intelligent frequency selection, parental control and other functions. AC8 of Shenzhen Jixiang Tengda Technology Co., Ltd. has a binary vulnerability that can be exploited by attackers to cause a denial of service.