CVE-2026-5281
A use-after-free vulnerability exists in the Dawn component of Google Chrome. This flaw allows attackers to potentially execute arbitrary code or cause a denial-of-service via a crafted HTML page.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Monday's vulnerability disclosures are concentrated around Totolink A7100RU routers, which account for the majority of 14 critical-severity CVEs β a 56% increase from Sunday's 9 critical disclosures. High-priority CVEs declined to 54, down 27% from the prior day's 74. Multiple Totolink A7100RU flaws (CVE-2026-6112 through CVE-2026-6139) carry CVSS 9.8 scores, alongside CVE-2019-25709 affecting CF Image Hosting Script. Two vulnerabilities are confirmed actively exploited: CVE-2026-5281 in Google Dawn and CVE-2026-3502 in TrueConf Client, both rated CVSS 9.5. No patches are currently available for any of the 68 disclosed vulnerabilities, requiring defenders to prioritize network-level mitigations and access controls.
Immediate action: Organizations using Totolink A7100RU routers should restrict administrative access and isolate affected devices behind network segmentation until patches are available. Google Dawn and TrueConf Client users should monitor vendor channels for emergency updates given confirmed exploitation. With zero patches available, apply compensating controls including WAF rules, access restrictions, and enhanced monitoring for all affected products.
A use-after-free vulnerability exists in the Dawn component of Google Chrome. This flaw allows attackers to potentially execute arbitrary code or cause a denial-of-service via a crafted HTML page.
TrueConf Client Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
CF Image Hosting Script 1.6.5 allows unauthenticated attackers to download the application database and delete images via plaintext IDs.
A remote OS command injection vulnerability exists in the Totolink A7100RU CGI handler via the maxRtrAdvInterval argument.
A remote OS command injection vulnerability exists in the Totolink A7100RU CGI handler via the ttyEnable argument.
A remote OS command injection vulnerability exists in the Totolink A7100RU CGI handler via the proto argument.
A remote OS command injection vulnerability exists in the Totolink A7100RU CGI handler via the enable argument.
A remote OS command injection vulnerability exists in the Totolink A7100RU CGI handler via the ip argument.
Acer Totolink A7100RU is vulnerable to remote OS command injection via the setTracerouteCfg function in the CGI handler.
Totolink A7100RU allows remote unauthenticated attackers to execute arbitrary OS commands via the setLedCfg function in the CGI handler.
Totolink A7100RU is vulnerable to remote OS command injection via the setAccessDeviceCfg function in the CGI handler.
Totolink A7100RU contains an OS command injection vulnerability in the UploadOpenVpnCert function of the CGI handler.
Totolink A7100RU is susceptible to remote OS command injection via the UploadFirmwareFile function in the CGI handler.
Totolink A7100RU allows remote OS command injection via the setWizardCfg function within the CGI handler.
Totolink A7100RU is vulnerable to remote OS command injection via the setWanCfg function in the CGI handler.
Totolink A7100RU allows remote OS command injection via the setIpQosRules function in the CGI handler.
CMSsite 1
Dolibarr ERP-CRM 8
A vulnerability was determined in code-projects Simple ChatBox up to 1
ImpressCMS 1
eBrigade ERP 4
The Tushar Hotel Management System contains a security vulnerability that requires immediate attention.
A security vulnerability has been detected in version 1 of the Code-projects Vehicle Showroom Management System.
A security flaw has been identified in version 1 of the Code-projects Vehicle Showroom Management System, requiring immediate attention.
A vulnerability was found in code-projects Vehicle Showroom Management System 1
A vulnerability was determined in code-projects Vehicle Showroom Management System 1
A vulnerability was identified in code-projects Vehicle Showroom Management System 1
A vulnerability was identified in code-projects Lost and Found Thing Management 1
A security flaw has been discovered in code-projects Lost and Found Thing Management 1
A weakness has been identified in code-projects Vehicle Showroom Management System 1
A security vulnerability has been detected in code-projects Vehicle Showroom Management System 1
A vulnerability was detected in code-projects Faculty Management System 1
ResourceSpace 8
Heap-based buffer overflow vulnerability in Samsung Open Source Escargot allows out-of-bounds write
A vulnerability was detected in Tenda F451 1
A flaw has been found in Tenda F451 1
A vulnerability has been found in Tenda F451 1
A vulnerability was found in Tenda F451 1
A vulnerability was determined in Tenda F451 1
A vulnerability was identified in Tenda F451 1
A security flaw has been discovered in Tenda F451 1
A weakness has been identified in Tenda F451 1
A security vulnerability has been detected in Tenda F451 1
A vulnerability was detected in Tenda F451 1
Integer overflow vulnerability in Samsung Open Source Escargot allows Overflow Buffers
Out-of-bounds write vulnerability in Samsung Open Source Escargot allows Overflow Buffers
Newsbull Haber Script 1
Across DR-810 contains an unauthenticated file disclosure vulnerability that allows remote attackers to download the rom-0 backup file containing sensitive information by sending a simple GET request
A vulnerability was detected in Totolink A800R 4
A flaw has been found in TOTOLINK A7000R up to 9
An attacker can control a server-side HTTP request by supplying a crafted URL, causing the server to initiate requests to arbitrary destinations
RGui 3
HTML5 Video Player 1
Faleemi Desktop Software 1
A security vulnerability has been identified in the R programming language environment. Further technical details regarding the specific vector remain limited.
Easy Video to iPod Converter 1
Echo Mirage 3
A Cross-site Scripting (XSS) vulnerability exists in the `from_dict` method of the `AppLollmsMessage` class in the Parisneo Lollms library.
In Mesa before 25
Permission bypass vulnerability in the LBS module
A security vulnerability has been identified in the Perfree go-fastdfs-web application, affecting all versions up to 1.
A vulnerability was identified in FoundationAgents MetaGPT up to 0
A weakness has been identified in zhayujie chatgpt-on-wechat CowAgent 2
A vulnerability was detected in zhayujie chatgpt-on-wechat CowAgent up to 2
A flaw has been found in chatboxai chatbox up to 1
UAF vulnerability in the communication module
A flaw has been found in Totolink N300RH 6
Adianti Framework 5
MyT-PM 1
The ZTE ZXEDM iEMS product has a password reset vulnerability for any user