CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

sonicwall

sma_500v_firmware

32 known vulnerabilities · sorted by CVSS score

CVE-2021-20042
CRITICAL9.8

An unauthenticated remote attacker can use SMA 100 as an unintended proxy or intermediary undetectable proxy to bypass firewall rules. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

sonicwall / sma_200_firmware+14
Network
Published Dec 8, 2021
Page 1 of 2
CVE-2022-22273
CRITICAL9.8

Improper neutralization of Special Elements leading to OS Command Injection vulnerability impacting end-of-life Secure Remote Access (SRA) products and older firmware versions of Secure Mobile Access (SMA) 100 series products, specifically the SRA appliances running all 8.x, 9.0.0.5-19sv and earlier versions and Secure Mobile Access (SMA) 100 series products running older firmware 9.0.0.9-26sv and earlier versions

sonicwall / sma_200_firmware+8
Network
Published Mar 17, 2022
CVE-2021-20028
CRITICAL9.8

Improper neutralization of a SQL Command leading to SQL Injection vulnerability impacting end-of-life Secure Remote Access (SRA) products, specifically the SRA appliances running all 8.x firmware and 9.0.0.9-26sv or earlier

sonicwall / sma_210_firmware+5
Network
Published Aug 4, 2021
CVE-2021-20045
CRITICAL9.8

A buffer overflow vulnerability in SMA100 sonicfiles RAC_COPY_TO (RacNumber 36) method allows a remote unauthenticated attacker to potentially execute code as the 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

sonicwall / sma_200_firmware+9
Network
Published Dec 8, 2021
CVE-2021-20038
CRITICAL9.8

A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.

sonicwall / sma_200_firmware+14
Network
Published Dec 8, 2021
CVE-2024-38475
CRITICAL9.1

Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected.  Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.

apache / http_server+6
Network
Published Jul 1, 2024
CVE-2025-40599
CRITICAL9.1

An authenticated arbitrary file upload vulnerability exists in the SMA 100 series web management interface. A remote attacker with administrative privileges can exploit this flaw to upload arbitrary files to the system, potentially leading to remote code execution.

sonicwall / sma_210_firmware+2
Network
Published Jul 23, 2025
CVE-2022-2915
HIGH8.8

A Heap-based Buffer Overflow vulnerability in the SonicWall SMA100 appliance allows a remote authenticated attacker to cause Denial of Service (DoS) on the appliance or potentially lead to code execution. This vulnerability impacts 10.2.1.5-34sv and earlier versions.

sonicwall / sma_200_firmware+4
Network
Published Aug 26, 2022
CVE-2022-1703
HIGH8.8

Improper neutralization of special elements in the SonicWall SSL-VPN SMA100 series management interface allows a remote authenticated attacker to inject OS Commands which potentially leads to remote command execution vulnerability or denial of service (DoS) attack.

sonicwall / sma_210_firmware+5
Network
Published Jun 8, 2022
CVE-2021-20043
HIGH8.8

A Heap-based buffer overflow vulnerability in SonicWall SMA100 getBookmarks method allows a remote authenticated attacker to potentially execute code as the nobody user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

sonicwall / sma_200_firmware+9
Network
Published Dec 8, 2021
CVE-2021-20039
HIGH8.8

Improper neutralization of special elements in the SMA100 management interface '/cgi-bin/viewcert' POST http method allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

sonicwall / sma_200_firmware+14
Network
Published Dec 8, 2021
CVE-2025-32820
HIGH8.8

A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges can inject a path traversal sequence to make any directory on the SMA appliance writable.

sonicwall / sma_100_firmware+5
Network
Published May 7, 2025
CVE-2023-5970
HIGH8.8

Improper authentication in the SMA100 SSL-VPN virtual office portal allows a remote authenticated attacker to create an identical external domain user using accent characters, resulting in an MFA bypass.

sonicwall / sma_200_firmware+4
Network
Published Dec 5, 2023
CVE-2021-20044
HIGH8.8

A post-authentication remote command injection vulnerability in SonicWall SMA100 allows a remote authenticated attacker to execute OS system commands in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

sonicwall / sma_200_firmware+9
Network
Published Dec 8, 2021
CVE-2025-32819
HIGH8.8

A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.

sonicwall / sma_100_firmware+5
Network
Published May 7, 2025
CVE-2024-45318
HIGH8.1

A vulnerability in the SonicWall SMA100 SSLVPN web management interface allows remote attackers to cause Stack-based buffer overflow and potentially lead to code execution.

sonicwall / sma_200_firmware+4
Network
Published Dec 5, 2024
CVE-2024-53703
HIGH8.1

A vulnerability in the SonicWall SMA100 SSLVPN firmware 10.2.1.13-72sv and earlier versions mod_httprp library loaded by the Apache web server allows remote attackers to cause Stack-based buffer overflow and potentially lead to code execution.

sonicwall / sma_200_firmware+4
Network
Published Dec 5, 2024
CVE-2025-40597
HIGH7.5

A Heap-based buffer overflow vulnerability in the SMA100 series web interface allows remote, unauthenticated attacker to cause Denial of Service (DoS) or potentially results in code execution.

sonicwall / sma_500v_firmware+2
Network
Published Jul 23, 2025
CVE-2024-40763
HIGH7.5

Heap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to code execution.

sonicwall / sma_200_firmware+4
Network
Published Dec 5, 2024
CVE-2021-20050
HIGH7.5

An Improper Access Control Vulnerability in the SMA100 series leads to multiple restricted management APIs being accessible without a user login, potentially exposing configuration meta-data.

sonicwall / sma_100_firmware+17
Network
Published Dec 23, 2021