Monday, April 13, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Monday's vulnerability disclosures are concentrated around Totolink A7100RU routers, which account for the majority of 14 critical-severity CVEs β€” a 56% increase from Sunday's 9 critical disclosures. High-priority CVEs declined to 54, down 27% from the prior day's 74. Multiple Totolink A7100RU flaws (CVE-2026-6112 through CVE-2026-6139) carry CVSS 9.8 scores, alongside CVE-2019-25709 affecting CF Image Hosting Script. Two vulnerabilities are confirmed actively exploited: CVE-2026-5281 in Google Dawn and CVE-2026-3502 in TrueConf Client, both rated CVSS 9.5. No patches are currently available for any of the 68 disclosed vulnerabilities, requiring defenders to prioritize network-level mitigations and access controls.

  • Totolink A7100RU routers affected by 9+ critical CVSS 9.8 vulnerabilities spanning multiple attack vectors
  • 14 critical CVEs disclosed, up 56% from Sunday's 9 critical disclosures
  • 54 high-priority CVEs reported, down 27% from the prior day's 74
  • Google Dawn (CVE-2026-5281) and TrueConf Client (CVE-2026-3502) confirmed actively exploited at CVSS 9.5
  • Patch availability at 0% across all 68 disclosures β€” no vendor fixes currently released

Immediate action: Organizations using Totolink A7100RU routers should restrict administrative access and isolate affected devices behind network segmentation until patches are available. Google Dawn and TrueConf Client users should monitor vendor channels for emergency updates given confirmed exploitation. With zero patches available, apply compensating controls including WAF rules, access restrictions, and enhanced monitoring for all affected products.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation