VARIoT IoT vulnerabilities database

VAR-202506-1360 | CVE-2025-6621 | TOTOLINK CA300-PoE ap.so file command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability classified as critical has been found in TOTOLINK CA300-PoE 6.2c.884. This affects the function QuickSetting of the file ap.so. The manipulation of the argument hour/minute leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. TOTOLINK CA300-PoE is a wireless access point from China's TOTOLINK Electronics.
There is a command injection vulnerability in the TOTOLINK CA300-PoE ap.so file. The vulnerability is caused by the failure of the hour/minute parameter of the file ap.so to properly filter special characters and commands in the construction command. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202506-1303 | CVE-2025-6619 | TOTOLINK CA300-PoE upgrade.so file command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been declared as critical. Affected by this vulnerability is the function setUpgradeFW of the file upgrade.so. The manipulation of the argument FileName leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK CA300-PoE is a wireless access point from China's TOTOLINK Electronics.
The TOTOLINK CA300-PoE upgrade.so file has a command injection vulnerability, which is caused by the parameter FileName of the file upgrade.so failing to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202506-1367 | CVE-2025-6618 | TOTOLINK CA300-PoE wps.so file command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Low |
A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been classified as critical. Affected is the function SetWLanApcliSettings of the file wps.so. The manipulation of the argument PIN leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. TOTOLINK CA300-PoE is a wireless access point from China's TOTOLINK Electronics.
There is a command injection vulnerability in the wps.so file of TOTOLINK CA300-PoE. The vulnerability is caused by the failure of the parameter PIN of the file wps.so to properly filter the special characters and commands of the constructed command. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202506-1322 | CVE-2025-6617 | D-Link DIR-619L /formAdvanceSetup file stack buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. This issue affects the function formAdvanceSetup of the file /goform/formAdvanceSetup. The manipulation of the argument webpage leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link DIR-619L is a wireless router from D-Link, a Chinese company.
There is a stack buffer overflow vulnerability in the D-Link DIR-619L /formAdvanceSetup file, which is caused by incorrect boundary checking. An attacker can exploit this vulnerability to cause a buffer overflow, execute arbitrary code on the system, or cause the application to crash
VAR-202506-1368 | CVE-2025-6616 | D-Link DIR-619L Stack Buffer Overflow Vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as critical. This vulnerability affects the function formSetWAN_Wizard51 of the file /goform/formSetWAN_Wizard51. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link DIR-619L is a wireless router from D-Link, a Chinese company. An attacker can exploit this vulnerability to overflow the buffer, execute arbitrary code on the system, or cause the application to crash
VAR-202506-1328 | CVE-2025-6615 | D-Link DIR-619L /formAutoDetecWAN_wizard4 file stack buffer overflow vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability, which was classified as critical, was found in D-Link DIR-619L 2.06B01. This affects the function formAutoDetecWAN_wizard4 of the file /goform/formAutoDetecWAN_wizard4. The manipulation of the argument curTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link DIR-619L is a wireless router from D-Link of China.
The D-Link DIR-619L /formAutoDetecWAN_wizard4 file has a stack buffer overflow vulnerability, which is caused by incorrect bounds checking in the function formAutoDetecWAN_wizard4 of the file /goform/formAutoDetecWAN_wizard4. An attacker can exploit this vulnerability to overflow the buffer, execute arbitrary code on the system, or cause the application to crash
VAR-202506-1323 | CVE-2025-6614 | D-Link DIR-619L Stack Buffer Overflow Vulnerability (CNVD-2025-14221) |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability, which was classified as critical, has been found in D-Link DIR-619L 2.06B01. Affected by this issue is the function formSetWANType_Wizard5 of the file /goform/formSetWANType_Wizard5. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link DIR-619L is a wireless router from D-Link, a Chinese company.
D-Link DIR-619L has a stack buffer overflow vulnerability, which is caused by incorrect bounds checking in the function formSetWANType_Wizard5 of the file /goform/formSetWANType_Wizard5. An attacker can exploit this vulnerability to cause a buffer overflow, execute arbitrary code on the system, or cause the application to crash
VAR-202506-2577 | No CVE | D-Link DI-500WF-WT has a command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
DI-500WF-WT is a wireless network coverage device produced by D-Link of China.
D-Link DI-500WF-WT has a command execution vulnerability, which can be exploited by attackers to execute commands.
VAR-202506-1246 | CVE-2025-6568 |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability classified as critical has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formIpv6Setup of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
VAR-202506-1768 | No CVE | HP LaserJet Pro MFP M126nw of HP Trading (Shanghai) Co., Ltd. has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
HP LaserJet Pro MFP M126nw is a black and white laser all-in-one printer.
HP LaserJet Pro MFP M126nw of HP Trading (Shanghai) Co., Ltd. has a weak password vulnerability, which can be exploited by attackers to log in to the system and obtain sensitive information.
VAR-202506-2791 | No CVE | H3C N12 of H3C Technologies Co., Ltd. has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
H3C N12 is a wireless router of H3C, a Chinese company.
H3C N12 of H3C Technologies Co., Ltd. has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202506-2380 | No CVE | Epson (China) Co., Ltd. L6490 has a logic defect vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
L6490 is a series of printer products.
Epson (China) Co., Ltd. L6490 has a logic defect vulnerability, which can be exploited by attackers to reset the password.
VAR-202506-1774 | No CVE | H3C NX54 of H3C Technologies Co., Ltd. has a command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
H3C NX54 is a Gigabit dual-band router that supports Wi-Fi 6 (802.11ax) protocol.
H3C NX54 of H3C Technologies Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to execute commands.
VAR-202506-2180 | No CVE | PX4 has a logic flaw vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
PX4 is an open source autopilot.
PX4 has a logic flaw vulnerability that can be exploited by attackers to cause an oscillation loop, causing the device to repeatedly collide with obstacles, resulting in a denial of service.
VAR-202506-2988 | No CVE | HP Color LaserJet MFP M476dw of HP Trading (Shanghai) Co., Ltd. has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
HP Color LaserJet MFP M476dw is a color laser multifunction printer.
HP Color LaserJet MFP M476dw of HP Trading (Shanghai) Co., Ltd. has a weak password vulnerability, which can be exploited by attackers to log in to the system and obtain sensitive information.
VAR-202506-2579 | No CVE | H3C NX54 of H3C Technologies Co., Ltd. has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
H3C NX54 is a Gigabit dual-band router that supports Wi-Fi 6 (802.11ax) protocol.
H3C NX54 of H3C Technologies Co., Ltd. has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202506-1769 | No CVE | Shenzhen Jixiang Tengda Technology Co., Ltd. FH451 has a binary vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
FH451 is a 450Mbps home wireless router launched by Tenda.
Shenzhen Jixiang Tenda Technology Co., Ltd. FH451 has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202506-2786 | No CVE | HP Color LaserJet M254nw of HP Trading (Shanghai) Co., Ltd. has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
HP Color LaserJet M254nw is a color laser printer.
HP Color LaserJet M254nw of HP Trading (Shanghai) Co., Ltd. has a weak password vulnerability, which can be exploited by attackers to log in to the system and obtain sensitive information.
VAR-202506-2787 | No CVE | D-Link DI-8200 has a command injection vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
DI-8200 is an enterprise-level router from China's D-Link.
D-Link DI-8200 has a command injection vulnerability that can be exploited by attackers to execute arbitrary commands.
VAR-202506-1772 | No CVE | H3C NX15 of H3C Technologies Co., Ltd. has an unauthorized access vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
H3C NX15 is a home wireless router.
H3C NX15 of H3C Technologies Co., Ltd. has an unauthorized access vulnerability. Attackers can use this vulnerability to log in to telnet and obtain system permissions.