For security teams
Prioritize known exploited and high-confidence records.
Connected devices can stay in use long after vulnerability or support signals change. Search CVE, exploited, and EPSS risk records first.
Track consumer IoT device vulnerabilities, support-life, known exploited CVEs, EPSS risk, and firmware signals.
Showing 12 device records. Use search, category, and sort to narrow the database.
Stack-based buffer overflow in the DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary code via a long string in a GetDeviceSettings action to the HNAP interface.
Security records are triage intelligence and should be validated against asset inventory, firmware versions, compensating controls, and vendor advisories.
Reports and workspace access are available through the main access flow after review. This page keeps record research display-only.
Use access for report, workspace, correction, claim, or API questions.Compare status, category, risk, and source confidence in one view. The paid report adds the locked citations and next-step checklist.
| device | Security signal | Status | Risk | Confidence |
|---|---|---|---|---|
| CVE-2015-2052Stack-based buffer overflow in the DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary code via a long string in a GetDeviceSettings action to the HNAP interface. | NVD CVE record | CVE | Review | 90 |
| CVE-2015-2051The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface. | NVD CVE record | CVE | Review | 90 |
| CVE-2015-1437Multiple cross-site scripting (XSS) vulnerabilities in Asus RT-N10+ D1 router with firmware 2.1.1.1.70 allow remote attackers to inject arbitrary web script or HTML via the flag parameter to (1) result_of_get_changed_status.asp or (2) error_page.htm. | NVD CVE record | CVE | Review | 90 |
| CVE-2015-0869I-O DATA DEVICE NP-BBRM routers allow remote attackers to cause a denial of service (SSDP reflection) via UPnP requests. | NVD CVE record | CVE | Review | 90 |
| CVE-2014-7270Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allows remote attackers to hijack the authentication of arbitrary users. | NVD CVE record | CVE | Review | 90 |
consumers, MSPs, cyber insurers, retailers, property managers, schools, and device vendors need searchable source records, plain-English explanations, paid citations, and a clear escalation path when the public preview is not enough.
Prioritize known exploited and high-confidence records.
Check support and vulnerability signals before purchase.
Use reports and monitors for customer device review.
Source names, source URLs, and citation paths are included in paid reports and workspace access. Security records are triage intelligence and should be validated against asset inventory, firmware versions, compensating controls, and vendor advisories.
| Coverage group | Records source count | Max authority | Access |
|---|---|---|---|
| state source reference | 50 | 5/5 | Included in paid report |
| source reference | 4 | 5/5 | Included in paid report |
| cisa kev | 1 | 5/5 | Included in paid report |
| epss | 1 | 4/5 | Included in paid report |
| nvd cve | 1 | 5/5 | Included in paid report |
These resources explain how to search the database, what paid reports add, and when source-backed records should be verified directly with the relevant authority.
Device/security signal snapshot Includes locked citations, interpretation, risk questions, and action checklist.
Request accessSession workspace for saved review context, report access, record review, correction/claim intake, and API access requests.
Request accessPortfolio monitor setup for selected records, daily source refresh review, workspace review access, and escalation checklist.
Request accessEnterprise onboarding intake for custom coverage, users, API/report delivery, monitoring rules, and human QA workflow.
Request accessHigh-impact use cases should request human QA before relying on automated source records.
Prefer email? Contact info@dataverityhub.com.