CVE-2026-33825
Microsoft Defender Insufficient Granularity of Access Control Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Monday's brief is dominated by GeoVision vulnerabilities affecting GV-VMS video management software and LPC2011/LPC2211 devices, alongside critical flaws in Totolink WA300 routers and LG GV-IP Device Utility. The brief includes 7 critical CVEs (up 250% from 2) and 36 high-priority CVEs (down 64% from 100). Notable disclosures include CVE-2026-42369 (CVSS 10) and CVE-2026-42370 in GeoVision GV-VMS, plus CVE-2026-7719 in Totolink WA300. Network edge devices, video surveillance platforms, and IP camera utilities represent the primary attack surface, with 9 vulnerabilities under active exploitation across Microsoft Defender, D-Link, SimpleHelp, and ConnectWise products. Zero patches are currently available across the disclosed set, requiring compensating controls and network segmentation.
Immediate action: Prioritize isolation and access restriction for GeoVision GV-VMS deployments and LPC2011/LPC2211 devices, along with Totolink WA300 routers and LG GV-IP Device Utility installations. With 0% patch availability, defenders should restrict management interfaces to trusted networks, monitor for exploitation attempts against actively exploited products including SimpleHelp and ConnectWise ScreenConnect, and prepare patch deployment workflows for vendor releases.
Microsoft Defender Insufficient Granularity of Access Control Vulnerability - Active in CISA KEV catalog.
Marimo Remote Code Execution Vulnerability - Active in CISA KEV catalog.
D-Link DIR-823X Command Injection Vulnerability - Active in CISA KEV catalog.
Samsung MagicINFO 9 Server Path Traversal Vulnerability - Active in CISA KEV catalog.
SimpleHelp Path Traversal Vulnerability - Active in CISA KEV catalog.
SimpleHelp Missing Authorization Vulnerability - Active in CISA KEV catalog.
ConnectWise ScreenConnect Path Traversal Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Protection Mechanism Failure Vulnerability - Active in CISA KEV catalog.
Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability - Active in CISA KEV catalog.
An OS command injection vulnerability in the DdnsSetting.cgi functionality of GeoVision LPC2011/LPC2211 allows arbitrary command execution via crafted DDNS configuration.
A buffer overflow vulnerability in the Totolink WA300 loginauth function allows remote attackers to execute arbitrary code via a manipulated http_host argument.
A stack-based buffer overflow in the GV-VMS WebCam Server gvapi endpoint allows remote attackers to gain SYSTEM-level code execution via a specially crafted HTTP Authorization header.
A privilege escalation vulnerability in the GeoVision LPC2011/LPC2211 web interface allows an attacker to execute privileged operations via a crafted HTTP request.
An insufficient encryption vulnerability in the GeoVision GV-IP Device Utility allows attackers on the same LAN to decrypt administrative credentials from broadcast traffic.
A stack overflow in the WebCam Server Login functionality of GeoVision GV-VMS 20.0.2 allows unauthenticated remote attackers to achieve arbitrary code execution.
A stack overflow in the GeoVision GV-VMS WebCam Server login functionality allows unauthenticated attackers to gain SYSTEM-level code execution via unconstrained sscanf calls.
Sunnet CTMS contains a SQL injection vulnerability that allows authenticated remote attackers to execute arbitrary database commands.
The WCFM β Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6
The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'sort' parameter in all versions up to, and including, 1
The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'map_post_type' parameter in all versions up to, and including, 1
The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'object_ids' and 'exclude_object_ids' parameters in all versions up to, and including, 1
The Salon Booking System β Free Version plugin for WordPress is vulnerable to Arbitrary File Read in versions up to, and including, 10
The Brizy β Page Builder plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in all versions up to, and including, 2
The NEX-Forms β Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via POST parameter key names in the submit_nex_form() function in versions up to, and including, 9
The Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification and disruption of Stripe webhook configuration in all versions up to, and including, 3
A vulnerability has been found in innocommerce InnoShop up to 0
A flaw has been found in funadmin up to 7
A vulnerability was determined in code-projects Online Hospital Management System 1
A security vulnerability has been identified in the osrg GoBGP software, potentially allowing for unexpected behavior or unauthorized access.
A vulnerability was identified in MikroTik RouterOS 6
School App developed by Zyosoft has an Insecure Direct Object Reference vulnerability, allowing authenticated remote attackers to modify a specific parameter to read and modify other users' data
CTMS and CPAS developed by Sunnet has an Arbitrary File Upload vulnerability, allowing privileged remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server
A vulnerability has been found in the Shenzhen Libituo Technology LBT-T300-HW1 device, which may allow for unauthorized system access.
A high-severity vulnerability has been identified in the Shenzhen Libituo Technology LBT-T300-HW1 device, potentially allowing for unauthorized system impact.
A security vulnerability has been detected in the Edimax BR-6428nC router, which may allow for unauthorized system interaction.
A vulnerability has been identified in the Edimax BR-6208AC router, which may pose a risk to the security and integrity of the device.
A vulnerability was determined in Totolink WA300 5
A guessable session cookie vulnerability in the GeoVision LPC2011/LPC2211 web interface allows unauthorized access to administrative sessions.
Multiple reflected cross-site scripting (xss) vulnerabilities exist in the Web Interface / ssi
Multiple reflected cross-site scripting (xss) vulnerabilities exist in the Web Interface / ssi
A vulnerability has been found in ChatGPTNextWeb NextChat up to 2
A flaw has been found in Jinher OA 1
A security vulnerability has been discovered in the YunaiV yudao-cloud platform, which may expose the system to unauthorized access or manipulation.
A flaw has been found in Acrel Electrical ECEMS Enterprise Microgrid Energy Efficiency Management System 1
A vulnerability has been found in Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform 1
A vulnerability was identified in Tiandy Easy7 Integrated Management Platform 7
A flaw has been found in AV Stumpfl Pixera Two Media Server up to 25
A security flaw has been identified in the YunaiV yudao-cloud platform that may allow for unauthorized access or system compromise.
A security weakness has been identified in the MindsDB platform that could potentially be leveraged by an attacker to compromise system integrity.
A security flaw has been discovered in the PrefectHQ prefect orchestration platform that could lead to unauthorized system access.
A critical security vulnerability has been identified in the Shandong Hoteam Software PDM system, which may permit unauthorized access to sensitive product data.
A security vulnerability has been identified in the osrg GoBGP software that may impact network routing security and stability.