Aero CMS 0
Description
Aero CMS 0
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Search and filter 8341 vulnerabilities with AI analyst insights
Aero CMS 0
Aero CMS 0
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
VIAVIWEB Wallpaper Admin 1.0 contains an SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting S...
VIAVIWEB Wallpaper Admin 1.0 contains an SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the img_id parameter. Attackers can send GET requests to edit_gallery_image.php with malicious img_id values to extract database information.
Update VIAVIWEB Wallpaper Admin Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
VIAVIWEB Wallpaper Admin 1.0 contains an unauthenticated remote code execution vulnerability in the image upload functionality. Attackers can upload a...
VIAVIWEB Wallpaper Admin 1.0 contains an unauthenticated remote code execution vulnerability in the image upload functionality. Attackers can upload a malicious PHP file through the add_gallery_image.php endpoint to execute arbitrary code on the server.
Executive Summary:
A critical vulnerability exists in VIAVIWEB Wallpaper Admin software that allows an unauthenticated attacker to take complete control of the web server. By uploading a malicious file disguised as an image, an attacker can execute arbitrary code, leading to potential data theft, service disruption, and full system compromise. This vulnerability requires immediate attention due to its high severity and ease of exploitation.
Vulnerability Details
CVE-ID: CVE-2022-50893
Affected Software: VIAVIWEB Wallpaper Admin Multiple Products
Affected Versions: Version 1.0 is confirmed to be vulnerable. See vendor advisory for a complete list of affected products and versions.
Vulnerability: The vulnerability is an unauthenticated Remote Code Execution (RCE) flaw within the image upload functionality. The specific endpoint, add_gallery_image.php, fails to properly validate the type of file being uploaded and does not require any authentication to access. An attacker can craft a malicious PHP script, save it with an image file extension (or bypass client-side checks), and upload it to the server. Once uploaded, the attacker can navigate to the file's location on the server, causing the web server to execute the embedded PHP code with the permissions of the web server process.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, reflecting the extreme risk it poses to the organization. Successful exploitation could lead to a complete compromise of the affected server, resulting in the theft of sensitive data, including customer information, intellectual property, and credentials. An attacker could also deface the website, disrupt business operations by deleting files or shutting down services, or use the compromised server as a pivot point to launch further attacks against the internal network or to host malware. The potential for significant financial loss, reputational damage, and regulatory fines is high.
Remediation Plan
Immediate Action:
add_gallery_image.php endpoint, especially from unknown IP addresses.Proactive Monitoring:
Compensating Controls:
add_gallery_image.php endpoint from all untrusted IP addresses.Exploitation Status
Public Exploit Available: true
Analyst Notes: As of January 13, 2026, this vulnerability is publicly disclosed, and proof-of-concept exploits for similar unrestricted file upload vulnerabilities are widely available. The lack of an authentication requirement makes this flaw trivial to exploit. While this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its critical severity and ease of exploitation make it a highly attractive target for threat actors.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the unauthenticated nature of this remote code execution vulnerability, we recommend immediate and urgent action. The risk of a full system compromise is extremely high. Organizations must prioritize applying the vendor-supplied patches to all affected systems without delay. If patching cannot be performed immediately, the compensating controls listed above, particularly restricting access to the vulnerable endpoint and disabling script execution in upload directories, should be implemented as an emergency mitigation measure.
Update VIAVIWEB Wallpaper Admin Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
VIAVIWEB Wallpaper Admin 1
VIAVIWEB Wallpaper Admin 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
CoolerMaster MasterPlus 1
CoolerMaster MasterPlus 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Concrete5 CMS version 9.1.3 contains an XPath injection vulnerability that allows attackers to manipulate URL path parameters with malicious payloads....
Concrete5 CMS version 9.1.3 contains an XPath injection vulnerability that allows attackers to manipulate URL path parameters with malicious payloads. Attackers can flood the system with crafted requests to potentially extract internal content paths and system information.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
4images 1
4images 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Senayan Library Management System 9
Senayan Library Management System 9
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
JM-DATA ONU JF511-TV version 1.0.67 uses default credentials that allow attackers to gain unauthorized access to the device with administrative privil...
JM-DATA ONU JF511-TV version 1.0.67 uses default credentials that allow attackers to gain unauthorized access to the device with administrative privileges.
Executive Summary:
A critical vulnerability has been identified in JM-DATA ONU devices, specifically version 1.0.67 of the JF511-TV model. The device uses static, default credentials which, if unchanged, allow unauthenticated attackers to gain full administrative control, posing a severe risk of network compromise, data interception, and service disruption.
Vulnerability Details
CVE-ID: CVE-2022-50803
Affected Software: JM-DATA ONU JF511-TV (and potentially other products)
Affected Versions: version 1.0.67
Vulnerability: The vulnerability exists due to the use of hardcoded, default credentials for administrative access. An attacker with network access to the device's management interface can use these publicly known credentials to log in with the highest level of privileges. This allows the attacker to view or modify all device configurations, monitor network traffic passing through the device, disable services, or use the compromised device as a pivot point to launch further attacks against the internal network.
Business Impact
This vulnerability is rated as critical, with a CVSS score of 9.8, reflecting the extreme ease of exploitation and the potential for complete system compromise. Successful exploitation could lead to significant business disruption, including loss of internet connectivity, unauthorized access to sensitive internal network resources, and data exfiltration. An attacker could manipulate network traffic, conduct man-in-the-middle attacks, or install persistent backdoors, severely impacting the confidentiality, integrity, and availability of business operations and data.
Remediation Plan
Immediate Action: The primary remediation step is to immediately change the default administrative password on all affected JM-DATA ONU devices. If a vendor-supplied firmware update is available to address this issue, it should be applied as soon as possible. Organizations should also review access logs for any signs of unauthorized logins using the default credentials.
Proactive Monitoring: Implement continuous monitoring of network device logs, specifically looking for successful or repeated failed login attempts to management interfaces from untrusted IP addresses. Monitor for unexpected configuration changes, unusual outbound traffic originating from the ONU device, or alterations to DNS settings, as these can be indicators of compromise.
Compensating Controls: If patching or changing credentials is not immediately feasible, restrict network access to the device's management interface (e.g., web portal, SSH, Telnet) to a limited set of trusted administrative IP addresses. Employ network segmentation to isolate the ONU device from critical internal network segments, limiting the potential impact of a compromise.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of Dec 30, 2025, the "exploit" for this vulnerability is the public knowledge of the default credentials. This makes exploitation trivial for any attacker who can access the device's login interface. While this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, vulnerabilities involving default credentials are a common target for automated scanning and opportunistic attacks.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the trivial nature of exploitation, we strongly recommend that organizations take immediate action. All affected JM-DATA ONU devices must be identified and their default credentials must be changed without delay. Even though this vulnerability is not on the CISA KEV list, its high severity presents a clear and present danger to the network, and remediation should be treated as a top priority.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
H3C SSL VPN contains a user enumeration vulnerability that allows attackers to identify valid usernames through the 'txtUsrName' POST parameter
H3C SSL VPN contains a user enumeration vulnerability that allows attackers to identify valid usernames through the 'txtUsrName' POST parameter
Executive Summary:
This report details a high-severity user enumeration vulnerability in H3C SSL VPN products, identified as CVE-2022-50800. The flaw allows unauthenticated attackers to remotely confirm the existence of valid usernames, which can then be used in targeted attacks like password spraying to gain unauthorized access to the corporate network. Organizations are urged to apply vendor patches immediately to mitigate the risk of a potential network breach.
Vulnerability Details
CVE-ID: CVE-2022-50800
Affected Software: Unknown Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability exists in the login functionality of H3C SSL VPN solutions. An unauthenticated remote attacker can exploit this flaw by sending specially crafted POST requests to the login interface, manipulating the 'txtUsrName' parameter. The system provides a distinguishable response based on whether the submitted username is valid or invalid, allowing the attacker to systematically test a list of potential usernames and build a definitive list of valid accounts on the system.
Business Impact
This vulnerability is rated as high severity with a CVSS score of 7.5. Successful exploitation provides attackers with the foundational information needed for more advanced attacks. By obtaining a list of valid usernames, attackers can conduct highly effective password spraying or brute-force campaigns, significantly increasing the likelihood of account compromise and unauthorized access to the internal network. This could lead to data breaches, ransomware deployment, or further lateral movement within the organization's infrastructure.
Remediation Plan
Immediate Action: Apply the security updates provided by the vendor (H3C) across all affected SSL VPN appliances without delay. After patching, review VPN access logs for any signs of enumeration attempts or unusual login patterns that may have occurred prior to remediation.
Proactive Monitoring: Security teams should actively monitor VPN logs for a high volume of failed login attempts from a single source IP address targeting multiple usernames. Implement alerting for rapid, sequential POST requests to the VPN login page. Monitor for successful logins that immediately follow a burst of failed attempts from the same IP, as this could indicate a successful password-spraying attack.
Compensating Controls: If immediate patching is not feasible, implement the following controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 31, 2025, there are no known public exploits specifically targeting this CVE. However, user enumeration is a common and well-understood attack technique, and scripts to exploit this type of vulnerability are trivial for a skilled attacker to create.
Analyst Recommendation
Given the high CVSS score of 7.5 and the critical role this vulnerability plays as a precursor to account compromise, we strongly recommend that organizations prioritize the immediate application of vendor-supplied patches. While this CVE is not currently on the CISA KEV list, its potential to facilitate unauthorized network access makes it a significant risk. Organizations should treat this as an urgent priority and implement compensating controls like MFA and rate-limiting to add layers of defense against this threat.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Fetch FTP Client 5
Fetch FTP Client 5
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SoX 14
SoX 14
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SOUND4 IMPACT/FIRST/PULSE/Eco <=2
SOUND4 IMPACT/FIRST/PULSE/Eco <=2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SOUND4 IMPACT/FIRST/PULSE/Eco <=2
SOUND4 IMPACT/FIRST/PULSE/Eco <=2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain an unauthenticated command injection vulnerability in the username parameter. Attackers c...
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain an unauthenticated command injection vulnerability in the username parameter. Attackers can exploit index.php and login.php scripts by injecting arbitrary shell commands through the HTTP POST 'username' parameter to execute system commands.
Executive Summary:
A critical, unauthenticated command injection vulnerability exists in multiple SOUND4 products. This flaw allows a remote attacker without any credentials to take complete control of an affected device by sending a specially crafted request, posing a significant risk of system compromise, data breach, and service disruption.
Vulnerability Details
CVE-ID: CVE-2022-50794
Affected Software: SOUND4 IMPACT/FIRST/PULSE/Eco
Affected Versions: versions 2.x and below
Vulnerability: The vulnerability is an unauthenticated command injection flaw found in the web interface of the affected products. An attacker can send a malicious HTTP POST request to the index.php or login.php scripts. By injecting operating system shell commands into the username parameter of the login request, the attacker can force the underlying server to execute these commands with the privileges of the web service, leading to a full system compromise.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation allows an unauthenticated attacker to gain complete control over the affected device. This could lead to severe consequences, including theft of sensitive configuration data, interception or modification of audio streams, complete service disruption, or using the compromised device as a pivot point to launch further attacks against the internal network. The operational and reputational damage from such an attack could be substantial.
Remediation Plan
Immediate Action: Immediately update all affected SOUND4 IMPACT, FIRST, PULSE, and Eco products to the latest patched version provided by the vendor. Prioritize patching for systems that are accessible from the internet.
Proactive Monitoring: System administrators should actively monitor web server access logs for suspicious POST requests to index.php and login.php. Specifically, look for unusual or malicious-looking strings and shell commands within the username parameter. Monitor for unexpected outbound network connections, unusual process execution, and any modifications to system files on the affected devices.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to block command injection attempts in POST request parameters. Restrict network access to the device's management interface to a trusted administrative network or specific IP addresses.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of Dec 30, 2025, proof-of-concept exploit code is publicly available for this vulnerability. Due to the simplicity of exploitation and the unauthenticated nature of the attack, threat actors are likely to be actively scanning for and exploiting vulnerable devices. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high severity and the availability of public exploits indicate a high likelihood of active exploitation in the wild.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the availability of a public exploit, this vulnerability poses an immediate and severe threat to the organization. We strongly recommend that all affected SOUND4 devices be patched immediately, with internet-facing systems treated as the highest priority. Due to the risk of active exploitation, organizations should assume that any unpatched, publicly accessible devices may already be compromised and should consider initiating incident response procedures to investigate for signs of malicious activity.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
SOUND4 IMPACT/FIRST/PULSE/Eco <=2
SOUND4 IMPACT/FIRST/PULSE/Eco <=2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain an unauthenticated file disclosure vulnerability that allows remote attackers to access s...
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain an unauthenticated file disclosure vulnerability that allows remote attackers to access sensitive system files. Attackers can exploit the vulnerability by manipulating the 'file' GET parameter to disclose arbitrary files on the affected device.
Executive Summary:
A critical remote and unauthenticated file disclosure vulnerability, identified as CVE-2022-50792, exists in multiple SOUND4 products. This flaw allows an attacker with network access to the device to read any file on the system, potentially exposing highly sensitive information such as configuration details, user credentials, and system keys without needing any prior authentication.
Vulnerability Details
CVE-ID: CVE-2022-50792
Affected Software: SOUND4 IMPACT, SOUND4 FIRST, SOUND4 PULSE, SOUND4 Eco
Affected Versions: Versions 2.x and below
Vulnerability: This vulnerability is a classic path traversal flaw within the web interface of the affected devices. A remote, unauthenticated attacker can craft a specific HTTP GET request manipulating the 'file' parameter. By using directory traversal sequences (e.g., ../../..), the attacker can navigate outside of the intended web root directory and access arbitrary files anywhere on the device's file system, provided the application's user has read permissions for those files.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, reflecting the extreme risk it poses to an organization. Successful exploitation could lead to a complete compromise of confidentiality, allowing attackers to exfiltrate sensitive data such as system passwords, private cryptographic keys, intellectual property, and network configuration files. This stolen information can be used to facilitate further network intrusion, pivot to other systems, disrupt broadcast operations, or lead to a significant data breach, resulting in severe financial, reputational, and regulatory damage.
Remediation Plan
Immediate Action: Immediately identify all affected SOUND4 devices within the environment and update them to a patched version as recommended by the vendor. After patching, review system and access logs for any signs of compromise that may have occurred prior to remediation.
Proactive Monitoring: Implement continuous monitoring of web server access logs for affected devices. Specifically, search for suspicious GET requests containing the file= parameter followed by directory traversal payloads such as ../, ..%2f, or other variants. Monitor for unusual outbound network traffic from these devices, which could indicate data exfiltration.
Compensating Controls: If immediate patching is not feasible, implement network segmentation to restrict access to the device's management interface to a minimal set of trusted administrative hosts. If the device is exposed to the internet, place it behind a Web Application Firewall (WAF) configured with rules to detect and block path traversal attack patterns.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of Dec 30, 2025, this vulnerability is not listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, indicating no widespread, active exploitation campaigns have been confirmed by CISA. However, given the simplicity of exploiting this type of vulnerability, proof-of-concept (PoC) code is readily available, and it is highly likely to be targeted by opportunistic attackers scanning for vulnerable systems.
Analyst Recommendation
Due to the critical severity (CVSS 9.8) and the fact that this vulnerability can be exploited by an unauthenticated remote attacker, immediate action is required. All organizations using the affected SOUND4 products must prioritize applying the vendor-supplied patches without delay. Although not currently on the CISA KEV list, the low complexity of attack makes these devices prime targets. If patching cannot be performed immediately, the compensating controls outlined above must be implemented as a critical temporary measure to reduce the risk of compromise.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
SOUND4 IMPACT/FIRST/PULSE/Eco <=2
SOUND4 IMPACT/FIRST/PULSE/Eco <=2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain an unauthenticated vulnerability that allows remote attackers to access live radio stream...
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain an unauthenticated vulnerability that allows remote attackers to access live radio stream information through webplay or ffmpeg scripts. Attackers can exploit the vulnerability by calling specific web scripts to disclose radio stream details without requiring authentication.
Executive Summary:
A critical vulnerability has been identified in SOUND4 IMPACT, FIRST, PULSE, and Eco products. This flaw allows any remote, unauthenticated attacker to access sensitive live radio stream information by simply calling specific web scripts, posing a significant risk of content theft, service disruption, and potential stream hijacking. Due to the lack of authentication required, this vulnerability is easy to exploit and requires immediate attention.
Vulnerability Details
CVE-ID: CVE-2022-50790
Affected Software: SOUND4 IMPACT, SOUND4 FIRST, SOUND4 PULSE, SOUND4 Eco
Affected Versions: Versions 2.x and below
Vulnerability: The vulnerability is an information disclosure flaw resulting from a lack of authentication on specific web scripts, including webplay and ffmpeg scripts. A remote attacker can exploit this by sending a direct HTTP request to these scripts on a vulnerable device. The server will improperly process the request without verifying user identity, returning sensitive details about the live radio stream, such as stream URLs, formats, and other configuration data.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could lead to significant business consequences, including the unauthorized interception and re-broadcasting of proprietary audio content, resulting in copyright infringement and revenue loss. The disclosed stream information could also be used to launch denial-of-service (DoS) attacks against the broadcast infrastructure, leading to service outages and reputational damage. Furthermore, this information could serve as reconnaissance for more sophisticated attacks against the organization's network.
Remediation Plan
Immediate Action: Immediately update all affected SOUND4 IMPACT, FIRST, PULSE, and Eco devices to the latest available version (above 2.x) to patch the vulnerability. After patching, review web server and application access logs for any signs of exploitation attempts that may have occurred prior to remediation.
Proactive Monitoring:
webplay or ffmpeg scripts, especially from unknown or suspicious IP addresses.Compensating Controls:
If immediate patching is not feasible, implement the following controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 30, 2025, there are no known public proof-of-concept exploits for this vulnerability. However, due to the trivial nature of the exploitation method—simply calling a web script—it is highly probable that threat actors can independently develop an exploit with minimal effort. The primary risk is unauthenticated information disclosure, which can be a stepping stone for more impactful attacks.
Analyst Recommendation
Given the critical 9.8 CVSS score and the absence of any required authentication for exploitation, this vulnerability presents a severe risk to the organization. We strongly recommend that all affected SOUND4 products be patched immediately. Although this CVE is not currently listed on the CISA KEV list, its high severity and ease of exploitation warrant urgent action. If patching cannot be performed immediately, the compensating controls listed above should be implemented as a temporary measure to mitigate the risk.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
SOUND4 IMPACT/FIRST/PULSE/Eco <=2
SOUND4 IMPACT/FIRST/PULSE/Eco <=2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SOUND4 IMPACT/FIRST/PULSE/Eco <=2
SOUND4 IMPACT/FIRST/PULSE/Eco <=2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x contains a network vulnerability that allows unauthenticated attackers to send ICMP signals to arbitrary ho...
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x contains a network vulnerability that allows unauthenticated attackers to send ICMP signals to arbitrary hosts through network command scripts. Attackers can abuse ping.php, traceroute.php, and dns.php to generate network flooding attacks targeting external hosts.
Executive Summary:
A critical vulnerability has been identified in several SOUND4 products which allows unauthenticated attackers to abuse built-in network utilities. This enables attackers to use the vulnerable device to launch network flooding attacks against external targets, potentially implicating the organization in a denial-of-service attack and causing reputational damage or blacklisting of the organization's IP addresses.
Vulnerability Details
CVE-ID: CVE-2022-50695
Affected Software: SOUND4 IMPACT, SOUND4 FIRST, SOUND4 PULSE, SOUND4 Eco
Affected Versions: Versions 2.x
Vulnerability: The web management interface of the affected products contains several diagnostic scripts (ping.php, traceroute.php, and dns.php) that lack proper authentication and input validation. A remote, unauthenticated attacker can send specially crafted HTTP requests to these scripts, instructing the device to execute network commands like ping or traceroute against an arbitrary IP address. By repeatedly sending these requests, an attacker can force the vulnerable device to generate a high volume of ICMP traffic, effectively using it as a bot to conduct a network flooding or Distributed Denial-of-Service (DDoS) attack against a third-party target.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. The primary business impact is not a direct compromise of the affected device but its use as a weapon against other organizations. If exploited, the organization's network assets could be used to launch DDoS attacks, leading to significant reputational damage, potential legal liability, and the blacklisting of the organization's IP addresses by security services. This could result in disruption of the organization's own internet services and communication channels, and intervention from the internet service provider.
Remediation Plan
Immediate Action: Update all affected SOUND4 products (IMPACT, FIRST, PULSE, Eco) to the latest version provided by the vendor to patch the vulnerability. After patching, review web server access logs for any requests to ping.php, traceroute.php, or dns.php to identify potential past exploitation attempts.
Proactive Monitoring: Continuously monitor outbound network traffic from the SOUND4 devices for abnormally high volumes of ICMP packets. Configure network monitoring and alerting to detect traffic patterns consistent with a denial-of-service attack originating from these internal assets. Monitor web server logs for a high frequency of requests to the vulnerable PHP scripts from unknown IP addresses.
Compensating Controls: If patching is not immediately possible, implement strict firewall rules to restrict all access to the web management interface of the SOUND4 devices, allowing connections only from a trusted internal management network or specific administrative IP addresses. If the diagnostic functionality is not essential, consider disabling or removing the ping.php, traceroute.php, and dns.php files from the device's web server to eliminate the attack vector.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of December 30, 2025, while this vulnerability is not listed in the CISA KEV catalog, the exploit is trivial to execute. The vulnerability can be triggered by a simple, unauthenticated web request, meaning the barrier to entry for attackers is extremely low. Organizations should assume that this vulnerability could be easily discovered and exploited by threat actors scanning for abusable network devices.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the ease of exploitation, this vulnerability poses a severe risk. The potential for the organization's assets to be used in malicious attacks against other entities makes remediation an urgent priority. We strongly recommend that all affected SOUND4 devices be patched immediately. If patching is delayed for any reason, the compensating controls outlined above, particularly restricting access via a firewall, must be implemented without delay to mitigate the risk.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
SOUND4 IMPACT/FIRST/PULSE/Eco <=2
SOUND4 IMPACT/FIRST/PULSE/Eco <=2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Splashtop 8
Splashtop 8
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
MiniDVBLinux 5.4 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary commands as root through...
MiniDVBLinux 5.4 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary commands as root through the 'command' GET parameter. Attackers can exploit the /tpl/commands.sh endpoint by sending malicious command values to gain root-level system access.
Executive Summary:
A critical vulnerability has been identified in multiple MiniDVBLinux products, designated CVE-2022-50691. This flaw allows any unauthenticated attacker on the network to remotely execute arbitrary commands with the highest system privileges (root), leading to a complete compromise of the affected device. Due to the ease of exploitation and the severity of its impact, this vulnerability poses a significant and immediate threat to the confidentiality, integrity, and availability of the system.
Vulnerability Details
CVE-ID: CVE-2022-50691
Affected Software: MiniDVBLinux Multiple Products
Affected Versions: Version 5.4. See vendor advisory for specific affected versions.
Vulnerability: This is an unauthenticated remote command execution (RCE) vulnerability. The /tpl/commands.sh script improperly handles user-supplied input from the 'command' GET parameter. An attacker can craft a malicious HTTP GET request to this endpoint, embedding arbitrary system commands within the 'command' parameter, which are then executed on the underlying operating system with root privileges.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation grants an attacker complete control over the affected MiniDVBLinux device. The potential consequences include theft or modification of sensitive data, complete service disruption, installation of malware or ransomware, and using the compromised device as a pivot point to launch further attacks against the internal network. The lack of authentication required for exploitation significantly increases the risk, as any attacker with network access to the device can exploit it.
Remediation Plan
Immediate Action: The primary remediation is to apply the security patches provided by the vendor. System administrators should immediately update all instances of MiniDVBLinux Multiple Products to the latest version. Refer to the official vendor security advisory for specific patch information and installation instructions.
Proactive Monitoring: Security teams should actively monitor web server access logs for any requests to the /tpl/commands.sh endpoint. Specifically, look for suspicious or unexpected commands (e.g., wget, curl, nc, bash) within the 'command' GET parameter. Monitor for unusual outbound network traffic from affected devices and any unexpected processes running with root privileges.
Compensating Controls: If immediate patching is not feasible, implement the following controls to mitigate risk:
/tpl/commands.sh endpoint.Exploitation Status
Public Exploit Available: true
Analyst Notes: As of Dec 30, 2025, this vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, given the simplicity of the exploit (a single crafted GET request), proof-of-concept code is widely available, and it is highly likely that this vulnerability is being actively scanned for and exploited by threat actors.
Analyst Recommendation
Due to the critical CVSS score of 9.8 and the unauthenticated, remote nature of this vulnerability, immediate remediation is strongly recommended. Organizations must prioritize patching all affected MiniDVBLinux devices without delay. If patching cannot be performed immediately, the compensating controls listed above should be implemented as an urgent temporary measure. The high potential for complete system compromise makes this a top-priority security issue.
Update MiniDVBLinux Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
Wondershare MirrorGo 2
Wondershare MirrorGo 2
Executive Summary:
A high-severity vulnerability has been identified in multiple Wondershare products, including MirrorGo. This flaw could allow a remote attacker to execute arbitrary code on an affected system, potentially leading to a full system compromise. Successful exploitation could result in data theft, malware installation, or further intrusion into the network.
Vulnerability Details
CVE-ID: CVE-2022-50690
Affected Software: Wondershare Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability allows for remote code execution in the network service component of affected Wondershare products. An unauthenticated attacker on the same local network could send specially crafted data packets to the listening service. This could trigger a memory corruption error, such as a buffer overflow, enabling the attacker to execute arbitrary code with the same privileges as the running application.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.4, posing a significant risk to the organization. A successful exploit could lead to a complete compromise of the workstation where the software is installed. The potential consequences include unauthorized access to sensitive corporate or personal data, deployment of ransomware, installation of persistent backdoors, and the use of the compromised machine as a launchpad for further attacks against the internal network.
Remediation Plan
Immediate Action: Apply vendor security updates immediately across all systems with the affected software. Prioritize patching for internet-facing or critical systems. After patching, monitor for any signs of exploitation attempts by reviewing application and system logs for unusual activity or crashes related to the Wondershare service.
Proactive Monitoring: Implement enhanced monitoring on endpoints running Wondershare software. Look for unusual network connections to the ports used by the application, unexpected process creation originating from the Wondershare executable, and outbound traffic to unknown destinations. Utilize Endpoint Detection and Response (EDR) solutions to detect and alert on anomalous behavior.
Compensating Controls: If immediate patching is not feasible, use host-based firewalls to restrict inbound network connections to the vulnerable service, allowing access only from trusted IP addresses. Ensure the application is run with the lowest possible user privileges to limit the impact of a potential compromise. Consider network segmentation to isolate workstations running this software from critical assets.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 23, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the high severity and potential for remote code execution, it is likely that threat actors will attempt to develop an exploit. Organizations should remain vigilant and monitor threat intelligence sources for any updates on exploitation activity.
Analyst Recommendation
This vulnerability represents a high risk and requires immediate attention. Given the CVSS score of 8.4, all instances of affected Wondershare products must be identified and patched without delay to prevent potential system compromise. Although this vulnerability is not currently on the CISA KEV list, its severity warrants treating it with the same level of urgency as a known exploited vulnerability.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Cobian Backup Gravity 11
Cobian Backup Gravity 11
Executive Summary:
A critical remote code execution vulnerability exists in Cobian Backup Gravity 11, which could allow an unauthenticated attacker to take full control of the backup server over the network. Successful exploitation could lead to the theft or destruction of sensitive backup data, deployment of ransomware, and further compromise of the internal network.
Vulnerability Details
CVE-ID: CVE-2022-50688
Affected Software: Cobian Backup
Affected Versions: Cobian Backup Gravity 11 (Version 11.2.0.582 and potentially prior versions). See vendor advisory for specific affected versions.
Vulnerability: This vulnerability is an unauthenticated remote code execution (RCE) due to improper input sanitization in the product's web interface. An unauthenticated remote attacker can send a specially crafted HTTP POST request to the /users endpoint. The username parameter within this request is not validated correctly and is passed directly to a system command, allowing for command injection. By embedding malicious commands within the username parameter, an attacker can execute arbitrary code on the server with the privileges of the Cobian Backup service.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.4. Successful exploitation would grant an attacker complete control over the backup server, which presents a significant risk to the organization. Potential consequences include the compromise, exfiltration, or deletion of all backup data, rendering disaster recovery plans ineffective. The compromised server could also be used as a staging point to launch further attacks against the internal network, leading to a wider system breach, deployment of ransomware, and significant operational disruption.
Remediation Plan
Immediate Action: Apply vendor security updates immediately to all vulnerable instances of Cobian Backup. After patching, review web server and system access logs for any signs of exploitation attempts that may have occurred prior to the update, such as unusual POST requests to the /users endpoint.
Proactive Monitoring:
/users containing command-line syntax or special characters in the username field.cmd.exe or powershell.exe being spawned by the Cobian Backup service, or unexpected outbound network connections.Compensating Controls:
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of December 23, 2025, multiple public proof-of-concept (PoC) exploits are available for this vulnerability. The availability of a simple-to-use exploit for an unauthenticated RCE significantly increases the risk, as it lowers the technical barrier for attackers. Although this CVE is not currently listed on the CISA KEV list, its characteristics make it an attractive target for widespread scanning and opportunistic attacks.
Analyst Recommendation
Given the high severity (CVSS 8.4), the unauthenticated nature of the exploit, and the public availability of PoC code, this vulnerability poses a critical and immediate threat. The organization must prioritize the immediate application of vendor-supplied security patches to all affected Cobian Backup instances. If patching cannot be performed immediately, implement compensating controls, such as firewall restrictions, to limit the attack surface until patches can be deployed. Due to the high likelihood of exploitation, a retroactive threat hunt for indicators of compromise is strongly recommended.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Apple Multiple Products Unspecified Vulnerability - Active in CISA KEV catalog.
Apple Multiple Products Unspecified Vulnerability - Active in CISA KEV catalog.
FEDERAL DEADLINE: November 9, 2025 (21 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. FEDERAL DEADLINE: November 9, 2025 (21 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Deadline: November 9, 2025
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Voltronic Power ViewPower through 1.04-21353 and PowerShield Netguard before 1.04-23292 allows a remote attacker to configure the system via an unspec...
Voltronic Power ViewPower through 1.04-21353 and PowerShield Netguard before 1.04-23292 allows a remote attacker to configure the system via an unspecified web interface. An unauthenticated remote att...
Executive Summary:
A critical vulnerability has been identified in Voltronic Power ViewPower and PowerShield Netguard software, which allows an unauthenticated remote attacker to gain administrative control over the system's web interface. Successful exploitation could allow an attacker to alter power management configurations, potentially leading to widespread power disruption for connected critical infrastructure, data loss, and equipment damage. Due to the high severity and potential for significant operational impact, immediate remediation is strongly advised.
Vulnerability Details
CVE-ID: CVE-2022-43110
Affected Software: Voltronic Power ViewPower, PowerShield Netguard
Affected Versions:
Vulnerability:
The vulnerability is a missing authentication check on a critical function within the web interface of the affected software. A remote attacker with network access to the device's management portal can send a specially crafted HTTP request to modify system configurations without providing any credentials. This allows an unauthenticated user to perform administrative actions, such as changing UPS settings, scheduling shutdowns, or altering network parameters, effectively granting them full control over the power management system.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could have a severe and direct impact on business operations. An attacker could maliciously shut down power to critical IT infrastructure, including servers, storage, and network devices, leading to major service outages, data corruption, and significant financial loss. Furthermore, by manipulating power settings, an attacker could potentially cause physical damage to sensitive equipment. This vulnerability poses a direct threat to business continuity, operational stability, and the physical security of IT assets.
Remediation Plan
Immediate Action:
Immediately update all instances of affected software to the latest patched version as recommended by the vendor.
Proactive Monitoring:
Compensating Controls:
If immediate patching is not feasible, implement the following controls to mitigate risk:
Exploitation Status
Public Exploit Available: true
Analyst Notes:
As of August 22, 2025, proof-of-concept (PoC) exploit code for this vulnerability is publicly available. The existence of public exploits significantly increases the likelihood of attack, as it lowers the technical skill required for an adversary to successfully compromise a vulnerable system. Power management systems are often "set and forget" devices and may be overlooked in routine patch cycles, making them attractive targets for attackers.
Analyst Recommendation
Given the critical CVSS score of 9.8, the ability for unauthenticated remote exploitation, and the availability of public exploit code, this vulnerability represents a severe and immediate threat. We strongly recommend that organizations prioritize the immediate patching of all affected Voltronic Power and PowerShield systems. If patching cannot be performed immediately, the compensating controls, particularly network segmentation to isolate the management interface, must be implemented without delay to reduce the attack surface. Although not currently listed on the CISA KEV catalog, the high risk profile warrants treating this vulnerability with the highest urgency.
Update Voltronic Power ViewPower through Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
D-Link DNR-322L Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
D-Link DNR-322L Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
FEDERAL DEADLINE: August 25, 2025 (21 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. FEDERAL DEADLINE: August 25, 2025 (21 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Deadline: August 25, 2025
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, does not properly validate TLS certificates when downloading up...
FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, does not properly validate TLS certificates when downloading update packages through its auto-update mechanism
Executive Summary:
A high-severity vulnerability exists within a third-party software component, FunJSQ, used in multiple NETGEAR routers and Orbi WiFi systems. This flaw allows the device's auto-update mechanism to download and install software from unverified sources, potentially enabling a network attacker to gain complete control of the device. Successful exploitation could lead to data theft, network eavesdropping, and further attacks on the internal network.
Vulnerability Details
CVE-ID: CVE-2022-40620
Affected Software: NETGEAR Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability exists within the FunJSQ third-party module responsible for handling automatic software updates. The module fails to properly validate the TLS certificate of the update server it connects to. An attacker in a Man-in-the-Middle (MitM) position can intercept the device's update request and present a malicious software package hosted on a server with an invalid or self-signed certificate. Because the certificate is not validated, the vulnerable NETGEAR device will trust the malicious server, download the fraudulent update, and execute it, likely leading to arbitrary code execution with root-level privileges on the device.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.7. A successful exploit would result in a complete compromise of the network perimeter device. This could have significant business consequences, including the ability for an attacker to intercept, inspect, and modify all incoming and outgoing network traffic, leading to the theft of sensitive corporate data or user credentials. A compromised router could also be used as a pivot point to launch further attacks against internal network assets, serve malware to internal users, or be co-opted into a botnet for use in larger-scale attacks.
Remediation Plan
Immediate Action: Apply the security updates provided by NETGEAR immediately across all affected devices. After patching, review device and network logs for any signs of unusual update activity, unexpected reboots, or outbound connections to suspicious domains that may indicate a prior compromise.
Proactive Monitoring: Monitor outbound DNS queries and network connections originating from the routers for requests to unknown or non-NETGEAR update servers. Security teams should look for anomalies in traffic patterns and review device logs for errors related to certificate validation or failed update checks, which could indicate an exploitation attempt.
Compensating Controls: If immediate patching is not feasible, consider implementing network segmentation to isolate the affected devices and limit their ability to communicate with critical internal systems. Use an upstream firewall or Intrusion Prevention System (IPS) to restrict outbound connections from the devices to only known, trusted NETGEAR update servers. If the device's administrative interface allows, disable the FunJSQ feature or its auto-update functionality until a patch can be applied.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of January 30, 2026, there are no known public exploits or active exploitation campaigns targeting this vulnerability. The Man-in-the-Middle (MitM) attack vector required for exploitation makes it more suitable for targeted attacks rather than widespread, opportunistic campaigns. However, vulnerabilities in perimeter devices are highly valued by threat actors for establishing initial access.
Analyst Recommendation
Given the high severity (CVSS 7.7) and the potential for a complete device takeover, we strongly recommend that organizations prioritize the immediate deployment of the vendor-supplied patches for all affected NETGEAR products. Although this vulnerability is not currently listed on the CISA KEV catalog, its presence on a critical network perimeter device presents a significant risk. Patching this vulnerability is essential to prevent a network breach, data exfiltration, and the compromise of the internal corporate environment.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, exposes an HTTP server over the LAN interface of affected devic...
FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, exposes an HTTP server over the LAN interface of affected devices
Executive Summary:
A high-severity vulnerability exists in a third-party software component, FunJSQ, used in multiple NETGEAR router and Orbi WiFi products. This flaw exposes an unsecured web server on the local network, allowing an attacker on the same network to potentially compromise the device. Successful exploitation could lead to unauthorized access, interception of network traffic, or disruption of network services.
Vulnerability Details
CVE-ID: CVE-2022-40619
Affected Software: NETGEAR Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The FunJSQ third-party module, integrated into the firmware of affected NETGEAR devices, improperly initializes an HTTP server that is accessible from the local area network (LAN) interface. An attacker who has already gained access to the LAN (e.g., via a compromised endpoint or as a malicious insider) can send specially crafted HTTP requests to this exposed server. Depending on the functions exposed by the server, this could allow the attacker to retrieve sensitive information, alter device configurations, or potentially execute arbitrary code on the underlying operating system of the router.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.7. Exploitation of this flaw could have a significant business impact by compromising a critical piece of network infrastructure. An attacker could gain control over the organization's network gateway, leading to loss of confidentiality through traffic interception, loss of integrity by redirecting users to malicious websites (DNS hijacking), and loss of availability by causing a denial-of-service condition. A compromised router also serves as a powerful pivot point for an attacker to launch further attacks against other sensitive systems on the internal network.
Remediation Plan
Immediate Action: Apply the security updates provided by NETGEAR to all affected devices immediately. After patching, review device access and system logs for any unusual connections or configuration changes that may have occurred prior to remediation.
Proactive Monitoring: Monitor network traffic for unusual HTTP requests directed at the internal IP addresses of NETGEAR devices from other clients on the LAN. In device system logs, look for anomalous entries, unexpected process activity related to FunJSQ, or unauthorized configuration changes. Configure network monitoring tools to alert on any attempts to connect to non-standard ports on network infrastructure devices.
Compensating Controls: If patching is not immediately possible, implement network segmentation to isolate critical systems from less trusted networks (e.g., guest Wi-Fi, IoT devices). Use access control lists (ACLs) to restrict communication to the router's management interfaces to only authorized administrative workstations. Ensure all endpoints on the network are protected with up-to-date security software to prevent the initial compromise that would grant an attacker LAN access.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of January 30, 2026, proof-of-concept (PoC) exploit code is publicly available for this vulnerability. The availability of PoC code lowers the barrier for attackers to develop and launch attacks. While this vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, its public nature makes it a target for opportunistic attackers who have already established a foothold on a target network.
Analyst Recommendation
Given the High severity rating (CVSS 7.7) and the existence of public exploit code, this vulnerability poses a significant risk to the organization. All affected NETGEAR products must be identified and patched immediately to prevent exploitation. If immediate patching is not feasible, the compensating controls outlined above should be implemented as a temporary measure to reduce the attack surface. Due to the critical role these devices play in network security, their compromise would be highly impactful, and therefore remediation should be treated as a top priority.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In BootRom, there's a possible missing payload size check. This could lead to memory buffer overflow without requiring additional execution privileges...
In BootRom, there's a possible missing payload size check. This could lead to memory buffer overflow without requiring additional execution privileges.
Executive Summary:
A critical vulnerability has been identified in the BootRom of multiple "In" products, designated CVE-2022-38696. This flaw stems from a failure to check the size of incoming data, which could allow an attacker to cause a memory buffer overflow and execute arbitrary code. Successful exploitation could lead to a complete and persistent compromise of the affected device at its most fundamental level, requiring no special privileges.
Vulnerability Details
CVE-ID: CVE-2022-38696
Affected Software: In Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability exists within the device's BootRom, the first code that runs when the device powers on. The BootRom code responsible for loading a payload fails to validate that the size of the payload is within the bounds of the allocated memory buffer. An attacker can craft a malicious payload that is larger than the buffer, causing a buffer overflow. This allows the attacker to overwrite adjacent memory with their own code, which would then be executed with the highest privileges during the boot sequence, effectively bypassing all operating system-level security controls.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, posing a severe risk to the organization. Exploitation could lead to a complete compromise of the device's confidentiality, integrity, and availability. An attacker could install a persistent rootkit that survives reboots and OS reinstalls, making detection and removal extremely difficult. The potential consequences include theft of sensitive data, permanent device incapacitation ("bricking"), or the use of the compromised device as a pivot point to launch further attacks against the internal network. This could result in significant financial loss, reputational damage, and operational disruption.
Remediation Plan
Immediate Action: The primary remediation is to apply the security patches provided by the vendor. System administrators must identify all affected assets and update "In Multiple Products" to the latest version immediately. It is crucial to consult the official vendor security advisory to confirm the specific patch details and applicability for each product.
Proactive Monitoring: Monitor for any anomalous system behavior, such as unexpected reboots, performance degradation, or unusual network traffic originating from affected devices. Review boot logs, if available, for any errors or warnings that could indicate a failed exploitation attempt. Implement file integrity monitoring to detect unauthorized changes to critical system files post-boot.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk. Enforce strict physical security for all affected devices to prevent unauthorized access. Isolate the devices on a segmented network to limit the potential impact of a compromise. If the device supports it, ensure secure boot features are enabled and properly configured to validate the integrity of all boot-level components.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of Sep 1, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, due to the critical nature of BootRom vulnerabilities, the likelihood of exploit development by threat actors is high.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the potential for complete, persistent system compromise, this vulnerability requires immediate attention. Although there is no evidence of active exploitation at this time, the severity of the flaw means that it should be treated as an imminent threat. We strongly recommend that the organization prioritizes the identification and patching of all affected "In" products as the top remediation priority. Awaiting evidence of exploitation before acting would expose the organization to an unacceptable level of risk.
Update In Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
In BootRom, there's a possible unchecked command index
In BootRom, there's a possible unchecked command index
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In BootRom, there is a possible unchecked write address
In BootRom, there is a possible unchecked write address
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In FDL1, there is a possible missing payload size check. This could lead to memory buffer overflow without requiring additional execution privileges.
In FDL1, there is a possible missing payload size check. This could lead to memory buffer overflow without requiring additional execution privileges.
Executive Summary:
A critical vulnerability, identified as CVE-2022-38693, has been discovered in multiple products from the vendor "In". This flaw allows an attacker to cause a memory buffer overflow by sending specially crafted data, which could lead to a complete system compromise without requiring any special privileges. Due to its critical severity (CVSS 9.8), immediate patching is required to prevent potential remote code execution.
Vulnerability Details
CVE-ID: CVE-2022-38693
Affected Software: In Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability exists within the FDL1 component, which fails to properly validate the size of incoming data payloads. An unauthenticated remote attacker can send a payload larger than the allocated memory buffer. This action triggers a buffer overflow, overwriting adjacent memory regions, which can be leveraged to execute arbitrary code with the privileges of the application or cause a denial-of-service condition. Exploitation does not require additional execution privileges or user interaction, making it a low-complexity attack vector.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, posing a significant risk to the organization. Successful exploitation could grant an attacker complete control over the affected system, leading to remote code execution (RCE). The potential consequences include theft of sensitive data, deployment of ransomware or other malware, disruption of critical business operations, and using the compromised system as a pivot point for further attacks on the internal network. The lack of a privilege requirement makes a wide range of systems susceptible to compromise.
Remediation Plan
Immediate Action: Immediately apply the latest security updates provided by the vendor "In" for all affected products. Consult the official vendor security advisory to identify the specific product versions that are vulnerable and obtain the corresponding patches. Prioritize the patching of internet-facing and business-critical systems.
Proactive Monitoring: Monitor network traffic for malformed or unusually large packets targeting the FDL1 service. Review application and system logs for evidence of crashes, memory corruption errors, or unexpected behavior that could indicate an exploitation attempt. Implement and update signatures for Intrusion Detection/Prevention Systems (IDS/IPS) to detect and block traffic patterns associated with this vulnerability.
Compensating Controls: If immediate patching is not feasible, implement network segmentation to isolate vulnerable systems and restrict access to the affected service from untrusted networks. Deploy a Web Application Firewall (WAF) or an Intrusion Prevention System (IPS) with virtual patching capabilities to inspect and block malicious payloads at the network perimeter. Enforce strict firewall rules to limit communication to the vulnerable component to only trusted IP addresses.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 1, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, given the critical CVSS score and the low complexity of the attack, the likelihood of a functional exploit being developed in the near future is high. The vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, but organizations should monitor for changes in threat intelligence.
Analyst Recommendation
Due to the critical severity (CVSS 9.8) of this vulnerability and its potential for remote code execution without authentication, immediate remediation is strongly recommended. Organizations must prioritize applying the vendor-supplied patches to all affected "In" products without delay. Although this CVE is not currently on the CISA KEV list, its high impact and ease of exploitation make it an attractive target for threat actors. All recommended patching, monitoring, and compensating controls should be implemented urgently to mitigate the risk of a system compromise.
Update In Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
In BootROM, there is a missing size check for RSA keys in Certificate Type 0 validation. This could lead to memory buffer overflow without requiring a...
In BootROM, there is a missing size check for RSA keys in Certificate Type 0 validation. This could lead to memory buffer overflow without requiring additional execution privileges.
Executive Summary:
A critical vulnerability exists in the BootROM of multiple "In" products, identified as CVE-2022-38692. This flaw allows for a memory buffer overflow during the validation of digital certificates, which could enable an attacker to execute arbitrary code at the earliest stage of the device's boot-up sequence. Successful exploitation could lead to a complete and persistent compromise of the affected device, bypassing all subsequent security measures.
Vulnerability Details
CVE-ID: CVE-2022-38692
Affected Software: In Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability lies within the device's BootROM code, which is the first software executed upon power-on. Specifically, the function responsible for validating Certificate Type 0 fails to perform a necessary size check on the provided RSA public key. An attacker can craft a malicious certificate containing an oversized RSA key and present it to the device. When the BootROM processes this certificate, the oversized key will be copied into a fixed-size memory buffer, causing a buffer overflow and corrupting adjacent memory, which could include function pointers or executable code. This allows an attacker with the ability to introduce a malicious certificate (e.g., via a compromised firmware update or physical access) to achieve arbitrary code execution at the highest privilege level before the main operating system even loads.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could result in a complete compromise of the device's confidentiality, integrity, and availability. An attacker could install a persistent, undetectable rootkit (a "bootkit"), permanently disable the device, bypass secure boot mechanisms, and exfiltrate any sensitive data stored on or processed by the device. Since the flaw resides in the immutable BootROM, a successful compromise is extremely difficult to detect and remediate, potentially requiring physical hardware replacement. This poses a severe risk to the organization's operational security and data integrity.
Remediation Plan
Immediate Action: Update In Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
Proactive Monitoring: Monitor for signs of compromise on potentially affected devices, such as unexpected reboots, system instability, or anomalous network traffic. Security teams should also monitor for any unauthorized attempts to update device firmware or access physical hardware. Implement file and system integrity monitoring to detect unauthorized changes.
Compensating Controls: If patching is not immediately possible, implement strict physical security controls to prevent unauthorized access to devices. Use network segmentation to isolate vulnerable devices and limit their communication channels. Enforce a secure and verified firmware update process, ensuring that only signed and trusted updates from the vendor can be installed.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 1, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, given the critical nature of a BootROM flaw, it is highly likely that sophisticated threat actors may be developing private exploits. A successful exploit would grant attackers a powerful and persistent foothold into a target environment.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the potential for complete system compromise at a fundamental hardware level, this vulnerability must be addressed with the highest priority. Organizations must immediately identify all affected assets within their environment and deploy the vendor-provided firmware updates. Although this CVE is not currently listed on the CISA KEV list, its severity warrants immediate action equivalent to that of a known exploited vulnerability. For systems that cannot be patched, compensating controls such as physical security and network isolation must be strictly enforced.
Update In Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
In BootROM, there is a possible missing validation for Certificate Type 0
In BootROM, there is a possible missing validation for Certificate Type 0
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link Routers Buffer Overflow Vulnerability - Active in CISA KEV catalog.
D-Link Routers Buffer Overflow Vulnerability - Active in CISA KEV catalog.
FEDERAL DEADLINE: December 28, 2025 (20 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. FEDERAL DEADLINE: December 28, 2025 (20 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Deadline: December 28, 2025
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Voltronic Power ViewPower through 1.04-24215, ViewPower Pro through 2.0-22165, and PowerShield Netguard before 1.04-23292 allows a remote attacker to...
Voltronic Power ViewPower through 1.04-24215, ViewPower Pro through 2.0-22165, and PowerShield Netguard before 1.04-23292 allows a remote attacker to run arbitrary code via an unspecified web interfac...
Executive Summary:
A critical remote code execution vulnerability, rated with the maximum CVSS score of 10, has been identified in multiple Voltronic Power software products. This flaw allows an unauthenticated attacker to take complete control of affected systems over the network, potentially leading to severe disruption of power management infrastructure, data breaches, and further network compromise. Immediate patching is required to mitigate this severe risk.
Vulnerability Details
CVE-ID: CVE-2022-31491
Affected Software: Voltronic Power ViewPower, ViewPower Pro, and PowerShield Netguard
Affected Versions:
Vulnerability: This vulnerability allows a remote, unauthenticated attacker to execute arbitrary code on the server running the affected software. The flaw exists within an unspecified web interface, which fails to properly sanitize user-supplied input. An attacker can craft a malicious request to this interface to execute commands with the privileges of the application, leading to a full system compromise.
Business Impact
This vulnerability is of critical severity with a CVSS score of 10. Successful exploitation would grant an attacker complete control over the power management software and the underlying server. This could lead to catastrophic business impacts, including the deliberate shutdown of critical power systems, manipulation of power monitoring data, theft of sensitive system or network information, and using the compromised server as a pivot point to launch further attacks against the internal network. The potential consequences include significant operational downtime, financial loss, reputational damage, and a complete breach of the system's confidentiality, integrity, and availability.
Remediation Plan
Immediate Action: Immediately identify all instances of the affected software and update them to the latest patched versions as recommended by the vendor. After patching, review web server and system access logs for any signs of compromise or suspicious activity predating the update.
Proactive Monitoring: Implement enhanced monitoring on affected systems. Look for unusual or malformed requests to the web interface in access logs, unexpected processes or services running on the server, and anomalous outbound network traffic. Intrusion Detection/Prevention Systems (IDS/IPS) should be updated with signatures to detect and block known exploitation attempts.
Compensating Controls: If immediate patching is not feasible, restrict network access to the vulnerable web interface. Use a firewall to limit access to only trusted administrative workstations or place the affected systems on a segmented, isolated network. A Web Application Firewall (WAF) can also be deployed to inspect and block malicious web requests.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of Aug 22, 2025, this vulnerability is not listed in the CISA Known Exploited Vulnerabilities (KEV) catalog. However, proof-of-concept (PoC) exploit code is publicly available. The critical CVSS score of 10 and the availability of a public exploit significantly increase the likelihood of opportunistic or targeted attacks.
Analyst Recommendation
This vulnerability poses a critical and immediate threat to the organization. Due to the perfect CVSS score, the public availability of exploit code, and the potential for complete system compromise via a low-complexity remote attack, immediate action is imperative. All affected Voltronic Power software must be patched without delay. The absence of this CVE from the CISA KEV catalog should not be interpreted as a low risk; organizations must assume they are an active target and apply remediation or compensating controls immediately.
Update Voltronic Power ViewPower through Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
An issue was discovered in Dynamicweb before 9.12.8. An attacker can add a new administrator user without authentication. This flaw exists due to a lo...
An issue was discovered in Dynamicweb before 9.12.8. An attacker can add a new administrator user without authentication. This flaw exists due to a logic issue when determining if the setup phases of the product can be run again. Once an attacker is authenticated as the new admin user they have added, it is possible to upload an executable file and achieve command execution. This is fixed in 9.5.9, 9.6.16, 9.7.8, 9.8.11, 9.9.8, 9.10.18, 9.12.8, and 9.13.0 (and later).
Update An issue was discovered in Dynamicweb before Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Netaxis API Orchestrator (APIO) before 0.19.3 allows server side template injection (SSTI).
Netaxis API Orchestrator (APIO) before 0.19.3 allows server side template injection (SSTI).
Update Netaxis API Orchestrator Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Simple CMS 2
Simple CMS 2
Executive Summary:
A high-severity vulnerability, identified as CVE-2021-47918, has been discovered in Simple CMS 2. This flaw could allow a remote, unauthenticated attacker to compromise the affected content management system, potentially leading to unauthorized data access, website defacement, or a complete system takeover. Organizations are urged to apply the vendor-provided security updates immediately to mitigate the significant risk of exploitation.
Vulnerability Details
CVE-ID: CVE-2021-47918
Affected Software: Simple Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The specific technical details of this vulnerability have not been publicly disclosed, but its high CVSS score of 8.1 suggests a critical flaw. A vulnerability of this severity in a Content Management System (CMS) typically allows for Remote Code Execution (RCE) or critical SQL Injection. An unauthenticated remote attacker could likely exploit this flaw by sending a specially crafted request to a vulnerable system, requiring no user interaction, to execute arbitrary commands, manipulate the underlying database, or upload malicious files.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.1. Successful exploitation could have a severe impact on the business, leading to the complete compromise of the public-facing website and its underlying server. Potential consequences include theft of sensitive data (such as customer information or intellectual property), service disruption, significant reputational damage, and financial loss. A compromised web server could also be used as a pivot point for launching further attacks against the internal network, escalating the overall security risk to the organization.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor to all affected systems without delay. After patching, administrators should review web server and application access logs for any signs of compromise or attempted exploitation that may have occurred before the patch was applied.
Proactive Monitoring: Implement continuous monitoring of web server logs, looking for unusual or malformed requests, especially those targeting CMS components. Monitor for unexpected file modifications in the web root directory, suspicious outbound network connections originating from the web server, and the creation of any unauthorized administrative accounts within the CMS.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce the risk:
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of February 2, 2026, there is no known public proof-of-concept exploit code available for this vulnerability, and it is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, given the high CVSS score, it is highly probable that threat actors will actively research and develop exploits. The lack of current public exploitation should not diminish the urgency of remediation.
Analyst Recommendation
Due to the high severity (CVSS 8.1) of this vulnerability and the critical role of CMS platforms, we recommend that organizations treat this as a high-priority issue. The potential for a remote, unauthenticated attacker to compromise the system presents a significant risk. All organizations using the affected Simple products must prioritize the immediate application of vendor-supplied security patches to prevent potential exploitation.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
PHP Melody version 3
PHP Melody version 3
Executive Summary:
A high-severity SQL Injection vulnerability, identified as CVE-2021-47915, exists in PHP Melody version 3. This flaw allows an unauthenticated remote attacker to execute arbitrary commands on the application's database, potentially leading to a complete compromise of sensitive data, including user credentials and website content. Due to the public availability of exploit code, immediate remediation is critical to prevent data breaches and system compromise.
Vulnerability Details
CVE-ID: CVE-2021-47915
Affected Software: Melody PHP Melody
Affected Versions: PHP Melody version 3.0 and potentially prior versions. See vendor advisory for specific affected versions.
Vulnerability: This vulnerability is a time-based blind SQL Injection flaw. The article.php script fails to properly sanitize user-supplied input in the p parameter before using it in a SQL query. A remote, unauthenticated attacker can exploit this by sending a specially crafted HTTP request containing malicious SQL syntax to the vulnerable parameter, allowing them to infer information from the database by observing the time it takes for the server to respond. This can be used to exfiltrate sensitive data, such as usernames and password hashes, from the database.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.1. Successful exploitation could have a significant negative impact on the business. An attacker could exfiltrate the entire database, leading to the theft of sensitive user data, intellectual property, and other confidential information. This could result in severe reputational damage, loss of customer trust, regulatory fines (e.g., GDPR, CCPA), and financial losses associated with incident response and recovery. Furthermore, an attacker could potentially modify or delete website data, causing service disruption and impacting business operations.
Remediation Plan
Immediate Action: Apply vendor security updates immediately. All instances of PHP Melody should be upgraded to a patched version as recommended by the vendor. After patching, it is crucial to review access logs for any signs of exploitation that may have occurred prior to remediation.
Proactive Monitoring: Security teams should actively monitor web server and database logs for suspicious activity. Specifically, look for unusual or malformed requests to article.php that contain SQL keywords (e.g., SELECT, UNION, SLEEP, BENCHMARK) within the p parameter. Implement alerts for multiple failed database queries or queries that exhibit abnormally long response times, which could indicate blind SQL injection attempts.
Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with a robust ruleset configured to block SQL injection attacks. Additionally, ensure the database user account associated with the PHP Melody application operates with the principle of least privilege, restricting its permissions to only what is absolutely necessary for the application to function. This can limit the impact of a successful exploit.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of February 2, 2026, multiple proof-of-concept (PoC) exploits are publicly available for this vulnerability. The existence of public exploits lowers the barrier for attackers, making it easy for even less-skilled actors to target vulnerable systems. While this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, the availability of a public exploit significantly increases the likelihood of active exploitation attempts.
Analyst Recommendation
Given the high CVSS score, the unauthenticated nature of the attack, and the public availability of exploit code, this vulnerability poses a critical risk to the organization. We strongly recommend that all affected PHP Melody instances be patched immediately. This vulnerability should be treated as a top priority for remediation. Delaying action exposes the organization to a high probability of a data breach and subsequent operational and financial damages.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Mult-E-Cart Ultimate 2
Mult-E-Cart Ultimate 2
Executive Summary:
A high-severity SQL Injection vulnerability has been identified in Mult-E-Cart Ultimate 2 software. This flaw allows a remote, unauthenticated attacker to execute malicious commands on the backend database, potentially leading to a complete compromise of sensitive data, including customer information and financial records. Immediate patching is required to prevent data breaches and maintain system integrity.
Vulnerability Details
CVE-ID: CVE-2021-47909
Affected Software: Mult-E-Cart Ultimate 2
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is a classic SQL Injection flaw. An unauthenticated attacker can send a specially crafted request to the index.php page, manipulating the subcat_id parameter with malicious SQL syntax. Due to insufficient input validation, the application directly incorporates this malicious input into a database query, allowing the attacker to execute arbitrary SQL commands against the backend database.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.1. Successful exploitation could have severe consequences for the business, including the unauthorized access, modification, or theft of sensitive data such as customer Personally Identifiable Information (PII), credentials, and payment card details. This can lead to significant financial loss, severe reputational damage, and potential regulatory fines for non-compliance with data protection standards like GDPR or PCI-DSS. An attacker could also potentially leverage this access to disrupt business operations by deleting or corrupting critical data.
Remediation Plan
Immediate Action: Apply vendor security updates immediately to patch the vulnerable component. After patching, it is critical to monitor for any ongoing exploitation attempts and conduct a thorough review of web server and database access logs to identify any signs of compromise that may have occurred before the patch was applied.
Proactive Monitoring: Implement robust monitoring of web application traffic. Specifically, look for suspicious GET requests to index.php containing SQL keywords (e.g., UNION, SELECT, ', --) within the subcat_id parameter. Utilize a Web Application Firewall (WAF) to detect and block common SQL injection attack patterns.
Compensating Controls: If immediate patching is not feasible, deploy a WAF with strict rules to filter malicious input targeting the vulnerable subcat_id parameter. Enforce the principle of least privilege by ensuring the web application's database user has the minimum permissions necessary for its operation, thereby limiting the impact of a potential breach.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of February 2, 2026, proof-of-concept (PoC) exploit code for this vulnerability is publicly available. The existence of a public exploit significantly increases the likelihood of attacks by a wide range of threat actors, from automated scanners to targeted attackers. Although not currently listed on the CISA KEV list, its high severity and public exploitability make it an attractive target.
Analyst Recommendation
Given the high CVSS score of 8.1 and the public availability of functional exploit code, this vulnerability presents a critical and immediate risk to the organization. We strongly recommend that the vendor-supplied patch be applied on an emergency basis across all affected systems. Following remediation, a security audit should be conducted to ensure no persistent threats remain from a potential compromise.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
PhreeBooks 5
PhreeBooks 5
Executive Summary:
A high-severity vulnerability exists within PhreeBooks software, allowing an unauthenticated remote attacker to execute arbitrary commands on the underlying database. Successful exploitation could lead to the complete compromise of sensitive data, including financial records and customer information, resulting in significant data breaches and financial loss.
Vulnerability Details
CVE-ID: CVE-2021-47904
Affected Software: PhreeBooks Multiple Products
Affected Versions: PhreeBooks ERP version 5.2.5 and potentially prior versions. See vendor advisory for a complete list.
Vulnerability: This vulnerability is a SQL Injection flaw in the phreebooks.php script. An unauthenticated attacker can send a specially crafted HTTP request to the id parameter of this script. Due to insufficient input validation, the malicious payload is passed directly to the backend database, allowing the attacker to execute arbitrary SQL commands, bypass authentication, and read, modify, or delete any data in the database.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation could lead to the unauthorized access and exfiltration of highly sensitive business data, such as financial statements, customer Personally Identifiable Information (PII), and proprietary company information. The potential consequences include severe reputational damage, direct financial loss from fraud, regulatory penalties for data privacy violations, and significant disruption to business operations that rely on the integrity of the financial data managed by PhreeBooks.
Remediation Plan
Immediate Action: Apply the vendor-provided security updates to all affected PhreeBooks instances without delay. After patching, review web server and database access logs for any indicators of compromise that may have occurred prior to remediation.
Proactive Monitoring: Implement continuous monitoring of web server logs for suspicious requests targeting phreebooks.php, specifically looking for SQL injection syntax (e.g., single quotes, UNION, SELECT, comments) within the id parameter. Monitor database logs for unusual or unauthorized queries originating from the web application's service account. Utilize a Web Application Firewall (WAF) to detect and block SQL injection attempts in real-time.
Compensating Controls: If immediate patching is not feasible, deploy a WAF with strict rules specifically configured to block SQL injection attacks against the PhreeBooks application. Restrict network access to the application, allowing connections only from trusted IP addresses. Ensure the database user account used by the application operates with the principle of least privilege to limit the potential damage of a successful exploit.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of January 25, 2026, proof-of-concept (PoC) exploit code for this vulnerability is widely and publicly available. This lowers the technical skill required for an attacker to target vulnerable systems. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high severity and the availability of public exploits make it a prime target for opportunistic and targeted attacks.
Analyst Recommendation
Given the high severity (CVSS 8.8) and the public availability of functional exploit code, this vulnerability poses a critical and immediate risk to the organization. We strongly recommend that the vendor's security updates be applied as a top priority. Until patching is complete, compensating controls must be implemented to mitigate the risk of a data breach. A thorough compromise assessment should also be conducted to identify any potential exploitation that may have already occurred.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
LiteSpeed Web Server Enterprise 5
LiteSpeed Web Server Enterprise 5
Executive Summary:
A high-severity vulnerability has been identified in LiteSpeed Web Server Enterprise 5, posing a significant risk to affected systems. Successful exploitation could allow a remote attacker to compromise the web server, potentially leading to unauthorized code execution, data theft, or complete system takeover. Organizations are urged to apply vendor-supplied security updates immediately to mitigate this critical threat.
Vulnerability Details
CVE-ID: CVE-2021-47903
Affected Software: Web Multiple Products
Affected Versions: LiteSpeed Web Server Enterprise version 5. See vendor advisory for specific affected versions.
Vulnerability: This vulnerability allows a remote, unauthenticated attacker to execute arbitrary code on the target server. The flaw likely exists in a core component responsible for processing incoming web requests. By sending a specially crafted request to a vulnerable LiteSpeed server, an attacker can trigger the vulnerability to gain control over the server process, effectively compromising the entire web application and underlying system.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation of this flaw could have severe consequences for the business, including the compromise of sensitive data hosted on the server, such as customer information, financial records, or intellectual property. An attacker could deface the website, cause a denial-of-service condition leading to business disruption and revenue loss, or use the compromised server as a pivot point to launch further attacks against the internal network. The potential for reputational damage and regulatory fines is significant.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor immediately. System administrators should prioritize the deployment of these patches across all affected LiteSpeed Web Server instances. After patching, it is crucial to monitor systems for any signs of exploitation attempts that may have occurred prior to the update and to review web server access and error logs for anomalous activity.
Proactive Monitoring: Implement enhanced monitoring on affected servers. Security teams should look for unusual or malformed requests in web server access logs, unexpected outbound network connections from the server, unexplained spikes in CPU or memory utilization, and the presence of suspicious files or processes in the web application's directory.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk. These can include deploying a Web Application Firewall (WAF) with virtual patching rules designed to block exploit attempts, restricting access to the server from untrusted IP addresses, and ensuring the web server process runs with the lowest possible privileges to limit the impact of a potential compromise.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of January 25, 2026, there are no public reports of active exploitation in the wild. However, given the high severity score (CVSS 8.8) and the nature of the vulnerability (remote code execution), it is highly likely that threat actors will develop and weaponize an exploit. Organizations should operate under the assumption that an exploit is imminent.
Analyst Recommendation
The high severity of this vulnerability warrants immediate attention and action. Although CVE-2021-47903 is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its potential for enabling remote code execution makes it a critical risk to the organization. We strongly recommend that all available vendor patches are applied on an emergency basis. Until patching is complete, the compensating controls and proactive monitoring detailed above should be implemented to reduce the attack surface and improve detection capabilities.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Testa Online Test Management System 3
Testa Online Test Management System 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical SQL injection vulnerability exists in VIAVIWEB Wallpaper Admin products, identified as CVE-2022-50894. This flaw allows an authenticated attacker to manipulate database queries and steal sensitive information, such as user credentials and configuration data. Due to the high severity (CVSS 9.8), successful exploitation could lead to a complete compromise of the application's database, resulting in a significant data breach.
Vulnerability Details
CVE-ID: CVE-2022-50894
Affected Software: VIAVIWEB Wallpaper Admin Multiple Products
Affected Versions: Version 1.0 is confirmed to be vulnerable. See vendor advisory for a complete list of specific affected products and versions.
Vulnerability: The vulnerability is an SQL injection flaw in the
edit_gallery_image.phpscript. An authenticated attacker can exploit this by sending a specially crafted GET request where theimg_idparameter contains malicious SQL code. Because the application fails to properly sanitize this user-supplied input, the malicious code is executed directly by the database, allowing the attacker to bypass security controls and exfiltrate sensitive data from the database.Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, posing a significant risk to the organization. A successful attack could result in a complete loss of data confidentiality and integrity within the application's database. Potential consequences include the theft of user credentials, personal information, and other sensitive data, leading to reputational damage, regulatory penalties, and financial loss. While the vulnerability requires authentication, a low-privileged user account is sufficient to launch a high-impact attack.
Remediation Plan
Immediate Action: The primary remediation is to apply the vendor-supplied security patches immediately. Upgrade all instances of VIAVIWEB Wallpaper Admin to the latest secure version to resolve the vulnerability.
Proactive Monitoring: System administrators should actively monitor web server and application logs for suspicious activity targeting
edit_gallery_image.php. Look for GET requests with unusual or malformedimg_idparameters containing SQL keywords (e.g.,UNION,SELECT,--,' OR '1'='1'). Monitor for anomalous database query patterns or unexpected outbound network traffic that could indicate data exfiltration.Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to detect and block SQL injection attacks. Additionally, enforce the principle of least privilege for the application's database user account to limit the potential impact of a successful exploit.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of January 13, 2026, this vulnerability is not listed in the CISA Known Exploited Vulnerabilities (KEV) catalog. However, SQL injection is a well-understood vulnerability class, and proof-of-concept exploits are simple to create and are likely available in the public domain. The requirement for authentication reduces the attack surface but does not eliminate the risk, especially from insider threats or attackers who have compromised a user account.
Analyst Recommendation
Given the critical severity (CVSS 9.8) and the high potential for data exfiltration, it is strongly recommended that organizations prioritize patching this vulnerability immediately. All affected VIAVIWEB Wallpaper Admin instances should be upgraded to the latest version without delay. In parallel, security teams should review access logs for any evidence of past exploitation attempts. If patching is delayed for any reason, the implementation of compensating controls, such as a WAF, is crucial to mitigate the immediate risk.