Emoncms 11
Description
Emoncms 11
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Search and filter 8341 vulnerabilities with AI analyst insights
Emoncms 11
Emoncms 11
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An issue in the size query parameter (/views/file
An issue in the size query parameter (/views/file
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An authenticated stored XSS vulnerability exists in the Bagisto 2
An authenticated stored XSS vulnerability exists in the Bagisto 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Publii CMS v0
Publii CMS v0
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Reolink Video Doorbell Wi-Fi DB_566128M5MP_W stores and transmits DDNS credentials in plaintext within its configuration and update scripts, allowing...
Reolink Video Doorbell Wi-Fi DB_566128M5MP_W stores and transmits DDNS credentials in plaintext within its configuration and update scripts, allowing attackers to intercept or extract sensitive information
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in D-Link R15 (AX1500) 1.20.01 and below. By manipulating the model name parameter during a password change request in...
A vulnerability has been found in D-Link R15 (AX1500) 1.20.01 and below. By manipulating the model name parameter during a password change request in the web administrator page, it is possible to trigger a command injection in httpd.
Update A vulnerability has been found in Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
An issue was discovered in BESSystem BES Application Server thru 9
An issue was discovered in BESSystem BES Application Server thru 9
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Antabot White-Jotter up to commit 9bcadc was discovered to contain an unauthenticated remote code execution (RCE) vulnerability via the component /api...
Antabot White-Jotter up to commit 9bcadc was discovered to contain an unauthenticated remote code execution (RCE) vulnerability via the component /api/aaa;/../register.
Update Antabot Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
jshERP up to commit fbda24da was discovered to contain an unauthenticated remote code execution (RCE) vulnerability via the jsh_erp function
jshERP up to commit fbda24da was discovered to contain an unauthenticated remote code execution (RCE) vulnerability via the jsh_erp function
Executive Summary:
A critical vulnerability has been discovered in multiple jshERP products, allowing an unauthenticated attacker to remotely execute arbitrary code on the server. Successful exploitation could lead to a complete system compromise, enabling an attacker to steal sensitive data, disrupt business operations, or use the server for further malicious activities. Immediate patching of all affected systems is required to mitigate this high-severity risk.
Vulnerability Details
CVE-ID: CVE-2025-60801
Affected Software: jshERP Multiple Products
Affected Versions: All versions up to and including commit fbda24da.
Vulnerability: The vulnerability is an unauthenticated Remote Code Execution (RCE) flaw within the jsh_erp function. An attacker can exploit this weakness by sending a specially crafted, unauthenticated request to an exposed application endpoint that utilizes this function. The application fails to properly sanitize the input, allowing the attacker's malicious payload to be executed on the underlying server with the privileges of the jshERP service account.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.2. Exploitation by a remote, unauthenticated attacker could result in a complete compromise of the affected server. The potential business impact includes theft of sensitive corporate or customer data, deployment of ransomware, disruption of critical business services relying on the ERP system, and reputational damage. A compromised system could also be used as a pivot point to launch further attacks against the internal network, escalating the security incident.
Remediation Plan
Immediate Action:
Proactive Monitoring:
jsh_erp function.Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes:
As of October 24, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the critical nature of unauthenticated RCE vulnerabilities and the low complexity of exploitation, it is highly probable that a functional proof-of-concept exploit will be developed and made public by threat actors or security researchers in the near future.
Analyst Recommendation
Given the high CVSS score of 8.2 and the critical impact of a potential remote code execution attack, immediate remediation is strongly recommended. Although this vulnerability is not yet listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity and the ease of exploitation for an unauthenticated attacker make it a prime target. Organizations must prioritize applying the vendor-supplied patches to all affected jshERP systems, starting with those exposed to the internet, to prevent a full system compromise.
Apply security patches immediately for internet-facing systems. Monitor for exploitation attempts and review access logs.
Incorrect access control in the /jshERP-boot/user/info interface of jshERP up to commit 90c411a allows attackers to access sensitive information via a...
Incorrect access control in the /jshERP-boot/user/info interface of jshERP up to commit 90c411a allows attackers to access sensitive information via a crafted GET request
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to unauthorized admin account creation in all versions up to, and inclu...
The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to unauthorized admin account creation in all versions up to, and including, 67
Executive Summary:
A critical vulnerability has been identified in the WPGYM - Wordpress Gym Management System plugin, which allows an unauthenticated attacker to create an administrative account on the affected WordPress site. Successful exploitation grants the attacker full control over the website, enabling them to steal sensitive data, deface the site, or launch further attacks. This represents a significant security risk that requires immediate attention.
Vulnerability Details
CVE-ID: CVE-2025-6080
Affected Software: WPGYM - Wordpress Gym Management System plugin
Affected Versions: All versions up to, and including, 67
Vulnerability: The vulnerability exists within the user registration functionality of the WPGYM plugin. A flaw in the code fails to properly enforce authentication and authorization checks, allowing an unauthenticated remote attacker to send a specially crafted request to the application. This request is processed with administrative privileges, resulting in the creation of a new user account with full administrator rights on the WordPress site.
Business Impact
This is a High severity vulnerability with a CVSS score of 8.8. An attacker who successfully exploits this flaw gains complete administrative control over the affected website. This could lead to severe business consequences, including the theft of sensitive customer or business data, website defacement causing reputational damage, distribution of malware to site visitors, and disruption of business operations. The compromised website could also be used as a platform to launch further attacks against other internal or external systems, posing a significant risk to the organization's security posture.
Remediation Plan
Immediate Action:
Proactive Monitoring:
Compensating Controls:
/wp-admin/) to only trusted IP addresses at the firewall or web server level.Exploitation Status
Public Exploit Available: False
Analyst Notes: As of August 17, 2025, there is no known public proof-of-concept exploit code, and the vulnerability is not reported to be actively exploited in the wild. However, vulnerabilities that allow for unauthenticated administrative access are highly sought after by threat actors. It is highly probable that exploit code will be developed and published in the near future, increasing the risk of widespread attacks.
Analyst Recommendation
Immediate patching is strongly recommended for all systems running a vulnerable version of the WPGYM plugin. The high severity score (CVSS 8.8) and the critical impact of a successful exploit—complete system compromise—make this a high-priority vulnerability. Although this CVE is not currently on the CISA KEV list, its characteristics make it a likely candidate if widespread exploitation is observed. Organizations must prioritize the immediate actions outlined in the remediation plan to prevent a potential compromise.
The School Management System for Wordpress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the hom...
The School Management System for Wordpress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the homework
Executive Summary:
A high-severity vulnerability exists within the School Management System for Wordpress plugin, allowing attackers to upload malicious files to the server. Successful exploitation could lead to a complete website takeover, theft of sensitive data, and further compromise of the organization's network. Immediate patching is required to mitigate the significant risk posed by this flaw.
Vulnerability Details
CVE-ID: CVE-2025-6079
Affected Software: The School Management System for Wordpress plugin
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is an arbitrary file upload weakness found in the homework submission functionality of the plugin. The system fails to properly validate the types of files being uploaded, allowing an attacker to bypass intended restrictions (e.g., .pdf, .docx). An attacker can upload a file with a malicious executable extension, such as a PHP web shell (.php), which is then saved to a web-accessible directory on the server. By navigating to the URL of the uploaded file, the attacker can trigger its execution, granting them the ability to run arbitrary commands on the server, access the database, and deface the website.
Business Impact
This is a high-severity vulnerability with a CVSS score of 8.8, posing a significant risk to the organization. Successful exploitation can lead to a full compromise of the web server. The potential consequences include a breach of sensitive data (e.g., student and faculty information), reputational damage from website defacement, and operational disruption. A compromised server could also be used as a staging point to launch further attacks against the internal network, escalating the incident's impact and recovery costs.
Remediation Plan
Immediate Action: Update the "School Management System for Wordpress" plugin to the latest available version to apply the security patch. After updating, review all WordPress security settings to ensure they are properly configured. If the plugin is no longer essential for business operations, it should be deactivated and removed entirely to reduce the overall attack surface.
Proactive Monitoring: Monitor web server access logs for unusual POST requests to the plugin's file upload endpoints, specifically looking for attempts to upload files with executable extensions (e.g., .php, .phtml, .sh). Implement file integrity monitoring on the web server's upload directories to detect the creation of unauthorized files. Monitor for any suspicious outbound network traffic from the web server, which could indicate a successful compromise.
Compensating Controls: If patching cannot be performed immediately, configure a Web Application Firewall (WAF) with rules to inspect file uploads and block requests containing malicious file types. Harden server permissions by ensuring that the directory where files are uploaded does not have execute permissions, which can prevent uploaded web shells from running. As a last resort, temporarily disable the homework upload feature within the plugin until a patch can be applied.
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of August 17, 2025, there are no known public exploits or reports of this vulnerability being actively exploited in the wild. However, arbitrary file upload vulnerabilities are trivial to exploit once discovered, and proof-of-concept code is likely to be developed and published by security researchers or threat actors in the near future.
Analyst Recommendation
Given the high severity (CVSS 8.8) of this vulnerability and its potential for complete system compromise, immediate action is required. We strongly recommend that all organizations using the "School Management System for Wordpress" plugin prioritize the installation of the vendor-supplied patch. Although this CVE is not currently on the CISA KEV list, its critical impact and the popularity of the WordPress platform make it an attractive target for attackers, and it should be treated with the highest urgency.
MotionEye v0
MotionEye v0
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A Zip Slip vulnerability in the import a Project component of iceScrum v7
A Zip Slip vulnerability in the import a Project component of iceScrum v7
Executive Summary:
A high-severity vulnerability has been identified in the "import a Project" component, affecting multiple products including iceScrum v7. This flaw, known as a Zip Slip vulnerability, allows a remote attacker to upload a malicious archive file that can write files to arbitrary locations on the server. Successful exploitation could lead to remote code execution and a complete compromise of the affected system.
Vulnerability Details
CVE-ID: CVE-2025-60786
Affected Software: import a Project component in products such as iceScrum.
Affected Versions: iceScrum v7. See vendor advisory for a complete list of affected versions and products.
Vulnerability: This vulnerability is a path traversal flaw, commonly referred to as "Zip Slip." An attacker can exploit this by crafting a malicious zip archive containing files with path traversal sequences in their filenames (e.g., ../../../../etc/passwd). When the vulnerable "import a Project" component processes this archive, it fails to sanitize the file paths before extraction. This allows the attacker-controlled file to be written outside of the intended destination directory, enabling them to overwrite critical system files, configuration files, or upload a web shell to achieve remote code execution on the server.
Business Impact
This is a high-severity vulnerability with a CVSS score of 8.8, posing a significant risk to the organization. Successful exploitation could grant an attacker full control over the affected server, leading to severe consequences. These include the theft of sensitive project data, customer information, and intellectual property; disruption of business operations through system downtime or data corruption; and reputational damage. A compromised server could also be used as a pivot point to launch further attacks against the internal network, escalating the security incident.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor to all affected systems immediately. After patching, it is crucial to monitor for any signs of post-exploitation activity by reviewing access logs for unusual file upload events or access to suspicious files.
Proactive Monitoring: Implement enhanced logging and monitoring for the application server. Security teams should look for:
Compensating Controls: If immediate patching is not feasible, implement the following controls to mitigate risk:
../).Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 16, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, Zip Slip is a well-understood vulnerability class, and proof-of-concept exploits can be developed with relative ease. Organizations should assume that attackers will develop exploit code and begin scanning for vulnerable systems shortly.
Analyst Recommendation
Given the high severity (CVSS 8.8) of this vulnerability and its potential to allow for remote code execution, it is strongly recommended that organizations prioritize the immediate application of the vendor-supplied security patches to all affected systems. While this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high severity and the ease of exploitation represent a significant and immediate risk. If patching is delayed, the compensating controls outlined above must be implemented as a temporary measure to reduce the attack surface.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A remote code execution (RCE) vulnerability in the Postgres Drivers component of iceScrum v7
A remote code execution (RCE) vulnerability in the Postgres Drivers component of iceScrum v7
Executive Summary:
A critical remote code execution (RCE) vulnerability, identified as CVE-2025-60785, has been discovered in the Postgres Drivers component utilized by iceScrum v7. This high-severity flaw could allow a remote, unauthenticated attacker to execute arbitrary code on the server, potentially leading to a full system compromise, data theft, and service disruption. Organizations using the affected software are urged to apply security patches immediately to mitigate this significant risk.
Vulnerability Details
CVE-ID: CVE-2025-60785
Affected Software: Postgres Drivers Multiple Products
Affected Versions: The vulnerability impacts the Postgres Drivers as implemented within iceScrum v7. See vendor advisory for specific affected driver versions.
Vulnerability: This vulnerability is a remote code execution (RCE) flaw that exists due to improper input validation within the Postgres database driver. An unauthenticated remote attacker can exploit this by sending a specially crafted request to the iceScrum application. The application, in turn, passes this malicious data to the vulnerable driver, which fails to sanitize it, leading to code execution with the privileges of the application's service account on the underlying server.
Business Impact
This vulnerability is classified as High severity with a CVSS score of 8.8. Successful exploitation could result in a complete compromise of the affected server, granting an attacker full control. The potential consequences include unauthorized access to and exfiltration of sensitive project data, intellectual property, and customer information (loss of confidentiality); modification or deletion of critical data (loss of integrity); and complete service unavailability (loss of availability). This could lead to significant financial loss, reputational damage, and regulatory penalties.
Remediation Plan
Immediate Action: Apply the security patches provided by the vendor to all affected systems immediately, prioritizing internet-facing instances of iceScrum v7. After patching, it is crucial to review application and system access logs for any signs of compromise or unusual activity preceding the patch application.
Proactive Monitoring: Implement enhanced monitoring to detect potential exploitation attempts. Security teams should look for:
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 4, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, given the high severity and the nature of the RCE vulnerability, it is highly likely that threat actors will reverse-engineer the patch and develop exploits in the near future.
Analyst Recommendation
Due to the critical risk of remote code execution (CVSS 8.8), this vulnerability requires immediate attention. We strongly recommend that all organizations apply the necessary security patches to affected systems without delay, starting with those exposed to the internet. Although this CVE is not currently listed on the CISA KEV list, its high impact warrants treating it with the highest priority to prevent potential system compromise and data breaches.
Apply security patches immediately for internet-facing systems. Monitor for exploitation attempts and review access logs.
Improper authentication in the web-based management interface of NETLINK HG322G V1.0.00-231017, allows a remote unauthenticated attacker to escalate p...
Improper authentication in the web-based management interface of NETLINK HG322G V1.0.00-231017, allows a remote unauthenticated attacker to escalate privileges and lock out the legitimate administrato...
Executive Summary:
A critical improper authentication vulnerability has been identified in the web-based management interface of certain NETLINK devices. This flaw allows a remote, unauthenticated attacker to gain full administrative control, potentially leading to a complete system compromise and the lockout of legitimate administrators from the device.
Vulnerability Details
CVE-ID: CVE-2025-60772
Affected Software: NETLINK HG322G
Affected Versions: V1.0.00-231017
Vulnerability: The vulnerability exists within the web-based management interface of the affected device. Due to an improper authentication mechanism, the system fails to adequately verify user identity. A remote attacker can exploit this weakness by sending specially crafted requests to the management interface, bypassing authentication controls entirely and gaining administrative-level privileges. This access allows the attacker to view or modify system configurations, disrupt services, or change the administrator's password, thereby locking them out of the device.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could lead to a complete compromise of the affected network device. The business impact includes the potential for network traffic interception, unauthorized access to sensitive internal network segments, and service disruption. An attacker could use the compromised device as a pivot point to launch further attacks against the internal network, leading to a significant data breach or operational outage. The ability to lock out administrators would also delay detection and remediation efforts, increasing the overall impact of an incident.
Remediation Plan
Immediate Action: Immediately apply security updates provided by the vendor to patch the affected devices. Prioritize patching for devices with management interfaces exposed to the internet. After patching, verify that the update has been successfully applied and that administrative access is functioning correctly.
Proactive Monitoring: Monitor device access logs for any unusual or unauthorized login attempts, especially from untrusted or external IP addresses. Scrutinize logs for unexpected configuration changes, such as password modifications or the creation of new administrative accounts. Network monitoring should be configured to detect anomalous traffic patterns originating from the affected devices, which could indicate a compromise.
Compensating Controls: If immediate patching is not feasible, implement network-level access controls to mitigate risk. Use a firewall to restrict access to the device's web-based management interface, allowing connections only from a dedicated, trusted management network or specific administrative IP addresses. Disable WAN/remote management on the device if it is not essential for business operations.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of October 21, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, given the critical severity (CVSS 9.8) and the simplicity of exploitation typically associated with authentication bypass flaws, it is highly probable that a functional exploit will be developed and used by threat actors in the near future.
Analyst Recommendation
Due to the critical severity of this vulnerability, immediate action is required. We strongly recommend that all affected NETLINK devices be patched immediately, starting with those that are internet-facing. Although this CVE is not currently listed on the CISA KEV (Known Exploited Vulnerabilities) catalog, its high-impact nature makes it a prime target for exploitation. Organizations should treat this vulnerability with the highest priority and apply both the recommended remediation and compensating controls without delay to prevent a full network compromise.
Update Improper authentication in the Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
GeographicLib 2
GeographicLib 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
DLL Hijacking vulnerability in Trimble SketchUp desktop 2025 via crafted libcef
DLL Hijacking vulnerability in Trimble SketchUp desktop 2025 via crafted libcef
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Cross Site Request Forgery (CSRF) vulnerability in Ilevia EVE X1 Server Firmware Version v4.7.18.0.eden and before, Logic Version v6.00 - 2025_07_21 a...
Cross Site Request Forgery (CSRF) vulnerability in Ilevia EVE X1 Server Firmware Version v4.7.18.0.eden and before, Logic Version v6.00 - 2025_07_21 allows a remote attacker to execute arbitrary code via the /bh_web_backend component
Executive Summary:
A critical Cross-Site Request Forgery (CSRF) vulnerability has been identified in Ilevia EVE X1 Server Firmware. This flaw, rated 9.6 on the CVSS scale, allows a remote attacker to execute arbitrary code by tricking an authenticated administrator into visiting a malicious webpage. Successful exploitation could lead to a complete compromise of the affected server, posing a significant risk to data confidentiality, integrity, and availability.
Vulnerability Details
CVE-ID: CVE-2025-60739
Affected Software: Ilevia EVE X1 Server Firmware
Affected Versions: Version v4.7.18.0.eden and before, Logic Version v6.00 - 2025_07_21 and before.
Vulnerability: The vulnerability exists within the /bh_web_backend component of the Ilevia EVE X1 Server's web interface, which lacks adequate Cross-Site Request Forgery (CSRF) protections. An attacker can craft a malicious website or link that, when visited by a logged-in administrator, sends a forged request to the vulnerable endpoint on the server. Because the server cannot distinguish this forged request from a legitimate one, it processes the request with the administrator's privileges, leading to arbitrary code execution on the underlying system.
Business Impact
This vulnerability is rated as critical with a CVSS score of 9.6, indicating a high likelihood of exploitation and severe potential impact. A successful attack would grant an adversary complete control over the affected Ilevia EVE X1 Server. This could result in the theft of sensitive data, disruption of critical services managed by the server, and the use of the compromised system as a pivot point to launch further attacks against the internal network. The potential consequences include significant financial loss, operational downtime, and severe reputational damage.
Remediation Plan
Immediate Action:
/bh_web_backend component.Proactive Monitoring:
/bh_web_backend endpoint. Pay close attention to requests originating from unexpected referrers.Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes:
As of November 25, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the critical severity (CVSS 9.6) and the direct path to remote code execution, it is highly probable that threat actors will develop and deploy exploits in the near future.
Analyst Recommendation
Given the critical CVSS score of 9.6 and the risk of complete system compromise, this vulnerability represents a severe threat. It is strongly recommended that organizations immediately identify all affected Ilevia EVE X1 Servers and apply the vendor-provided firmware updates as a top priority. Although this CVE is not currently listed on the CISA KEV catalog, its severity warrants immediate attention. If patching is delayed, the compensating controls listed above should be implemented without delay to reduce the attack surface.
Update Cross Site Request Forgery Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
An issue in Ilevia EVE X1 Server Firmware Version v4
An issue in Ilevia EVE X1 Server Firmware Version v4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
code-projects Online Medicine Guide 1.0 is vulnerable to SQL Injection in /login.php via the upass parameter.
code-projects Online Medicine Guide 1.0 is vulnerable to SQL Injection in /login.php via the upass parameter.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
PerfreeBlog v4
PerfreeBlog v4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
PerfreeBlog v4
PerfreeBlog v4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
PerfreeBlog v4
PerfreeBlog v4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Stack-based Buffer Overflow vulnerability in ABB RMC-100, ABB RMC-100 LITE
Stack-based Buffer Overflow vulnerability in ABB RMC-100, ABB RMC-100 LITE
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Privilege context switching error in Windows Administrator Protection allows an authorized attacker to elevate privileges locally
Privilege context switching error in Windows Administrator Protection allows an authorized attacker to elevate privileges locally
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Buffer over-read in Windows TDX
Buffer over-read in Windows TDX
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Stack-based Buffer Overflow vulnerability in ABB RMC-100, ABB RMC-100 LITE
Stack-based Buffer Overflow vulnerability in ABB RMC-100, ABB RMC-100 LITE
Untrusted search path in Windows Administrator Protection allows an authorized attacker to elevate privileges locally
Untrusted search path in Windows Administrator Protection allows an authorized attacker to elevate privileges locally
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network
Executive Summary:
A high-severity vulnerability exists within the Windows Routing and Remote Access Service (RRAS) that could allow an attacker with network access and valid credentials to take full control of an affected server. Successful exploitation could lead to a complete system compromise, enabling the attacker to steal data, disrupt network services, and move deeper into the corporate network. Immediate patching is required to mitigate this critical risk.
Vulnerability Details
CVE-ID: CVE-2025-60715
Affected Software: Microsoft Windows Routing and Remote Access Service (RRAS)
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is a heap-based buffer overflow. An authenticated attacker can exploit this flaw by sending a specially crafted network packet to the RRAS service. The service fails to properly validate the size of the incoming data, allowing the attacker to write beyond the intended memory buffer on the heap, which can overwrite adjacent memory structures and lead to arbitrary code execution with the privileges of the RRAS service, typically SYSTEM-level.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8. A successful exploit would grant an attacker complete control over the compromised RRAS server. This could lead to severe business consequences, including the theft of sensitive data, deployment of ransomware, disruption of critical VPN and remote access services, and the ability for the attacker to use the compromised server as a pivot point for lateral movement across the entire network. The confidentiality, integrity, and availability of the network infrastructure are at significant risk.
Remediation Plan
Immediate Action: Apply the security updates released by the vendor (Microsoft) immediately to all affected systems. Prioritize patching on internet-facing servers and critical internal infrastructure. After patching, monitor for any signs of exploitation attempts by reviewing RRAS service logs and network traffic for anomalous activity.
Proactive Monitoring: Organizations should actively monitor for indicators of compromise. This includes watching for unexpected crashes or restarts of the RRAS service (RemoteAccess), analyzing network traffic to RRAS servers for malformed packets or unusual patterns, and using SIEM/EDR solutions to detect suspicious child processes or command-line activity originating from the RRAS service process.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Restrict network access to the RRAS service to only trusted IP addresses and authorized subnets using host-based or network firewalls. Enforce the principle of least privilege for all accounts authorized to connect to the service. Deploy a Network Intrusion Prevention System (NIPS) with signatures capable of detecting and blocking exploit attempts against this vulnerability.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 12, 2025, there are no known public exploits for this vulnerability. However, due to the nature of buffer overflow vulnerabilities, it is highly likely that threat actors are actively working to develop proof-of-concept code. The requirement for an attacker to be "authorized" lowers the risk from external, unauthenticated attackers but makes this an ideal vulnerability for privilege escalation and lateral movement once an initial foothold is established in the network.
Analyst Recommendation
This vulnerability poses a critical risk to the organization's network infrastructure and must be addressed with urgency. The primary recommendation is to apply the vendor-supplied security patches to all vulnerable systems immediately, prioritizing externally-facing and critical servers. Although this CVE is not currently listed on the CISA KEV catalog, its high severity and potential for remote code execution mean it could be added if widespread exploitation is observed. Organizations must assume it will be exploited and take proactive steps to patch, monitor for suspicious activity, and apply compensating controls where patching is delayed.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Heap-based buffer overflow in Windows OLE allows an unauthorized attacker to execute code locally
Heap-based buffer overflow in Windows OLE allows an unauthorized attacker to execute code locally
Executive Summary:
A high-severity vulnerability has been identified in the Windows Object Linking and Embedding (OLE) component, affecting multiple products. This flaw, a heap-based buffer overflow, could allow an attacker to take control of a user's computer by tricking them into opening a specially crafted document, leading to potential data theft, malware installation, and further network compromise.
Vulnerability Details
CVE-ID: CVE-2025-60714
Affected Software: Unknown Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is a heap-based buffer overflow within the Windows OLE subsystem, which is responsible for handling embedded and linked objects in documents. An attacker can exploit this by creating a malicious file (e.g., a Microsoft Office document) containing a specially crafted OLE object. When a user opens this file, the vulnerable OLE component fails to properly validate the size of the data being copied into a memory buffer, causing it to write past the buffer's boundary on the heap. This memory corruption can be leveraged by the attacker to hijack the application's control flow and execute arbitrary code with the privileges of the logged-in user.
Business Impact
This vulnerability presents a significant risk to the organization, rated as High severity with a CVSS score of 7.8. Successful exploitation allows an attacker to achieve local code execution on a victim's workstation. This could lead to a complete system compromise, enabling the attacker to install malware (such as ransomware or spyware), exfiltrate sensitive corporate data, steal user credentials, or use the compromised machine as a beachhead to move laterally across the internal network. Given that OLE is a ubiquitous technology in enterprise environments, the potential for widespread impact is considerable.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates released by the vendor across all affected systems immediately. Prioritize patching for workstations that frequently handle documents from external sources. Following patching, IT and security teams should actively monitor for any signs of exploitation attempts and review system and application access logs for anomalous activity.
Proactive Monitoring: Implement enhanced monitoring focused on detecting exploit behavior. This includes watching for common office applications (e.g., winword.exe, excel.exe) spawning unexpected child processes like cmd.exe or powershell.exe. Utilize Endpoint Detection and Response (EDR) solutions and review Windows Event Logs (specifically Event ID 4688 for process creation) to identify suspicious process chains originating from document-handling applications.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce risk. These include:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date of November 12, 2025, there are no known public proof-of-concept exploits or active attacks leveraging this vulnerability. However, vulnerabilities of this type (local code execution in a common Windows component) are attractive targets for threat actors, and it is highly probable that reliable exploits will be developed. The vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Given the high severity (CVSS 7.8) and the potential for complete system compromise through a common attack vector like a malicious document, this vulnerability requires immediate attention. Organizations must prioritize the deployment of vendor-supplied security patches to all affected endpoints. While there is no evidence of active exploitation at this time, the risk of future attacks is high. Proactive application of patches is the most effective defense and will prevent this vulnerability from becoming a significant security incident.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally
Untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally
Executive Summary:
A high-severity vulnerability has been identified in the Windows Routing and Remote Access Service (RRAS), which could allow a local attacker to gain full administrative control over a vulnerable system. An attacker who already has basic user access can exploit this flaw to elevate their privileges to the SYSTEM level, leading to a complete system compromise. This poses a significant risk to the confidentiality, integrity, and availability of the affected assets.
Vulnerability Details
CVE-ID: CVE-2025-60713
Affected Software: Untrusted Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is an untrusted pointer dereference within the Windows Routing and Remote Access Service (RRAS). An attacker with existing low-privilege access to a target system can exploit this flaw by sending a specially crafted input to the RRAS service. This action causes the service to use a memory pointer that the attacker has influenced, leading to memory corruption and enabling the execution of arbitrary code with the elevated privileges of the RRAS service, which typically runs as SYSTEM.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.8. Successful exploitation would result in a local privilege escalation, granting an attacker complete control over the compromised system. This could lead to the theft or modification of sensitive data, installation of persistent malware like backdoors or ransomware, and disruption of critical business services. If exploited on a key server, it could also serve as a pivot point for lateral movement, enabling the attacker to compromise the wider network environment.
Remediation Plan
Immediate Action:
Proactive Monitoring:
Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 12, 2025, there are no known public proof-of-concept exploits for this vulnerability. However, privilege escalation vulnerabilities are highly sought after by threat actors. It is anticipated that attackers will reverse-engineer the vendor patch to develop a functional exploit, which could then be integrated into malware and commercial attack tools.
Analyst Recommendation
Given the high severity (CVSS 7.8) and the critical impact of a successful privilege escalation attack, immediate patching is strongly recommended. Organizations should prioritize the deployment of the vendor's security update on all vulnerable systems, particularly multi-user workstations, terminal servers, and critical infrastructure servers where local access is more common. Although this vulnerability is not yet on the CISA KEV list, its nature makes it a prime target for future exploitation, and a proactive patching and monitoring stance is essential to mitigate risk.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges l...
Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Out-of-bounds read in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally
Out-of-bounds read in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Use after free in Multimedia Class Scheduler Service (MMCSS) allows an authorized attacker to elevate privileges locally
Use after free in Multimedia Class Scheduler Service (MMCSS) allows an authorized attacker to elevate privileges locally
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper access control in Windows Client-Side Caching (CSC) Service allows an authorized attacker to elevate privileges locally
Improper access control in Windows Client-Side Caching (CSC) Service allows an authorized attacker to elevate privileges locally
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Untrusted pointer dereference in Windows Remote Desktop allows an authorized attacker to elevate privileges locally
Untrusted pointer dereference in Windows Remote Desktop allows an authorized attacker to elevate privileges locally
Executive Summary:
A high-severity vulnerability has been identified in Windows Remote Desktop, designated CVE-2025-60703. This flaw allows an authenticated user who is already on a system to exploit a memory corruption error to gain full administrative privileges. Successful exploitation could lead to complete system compromise, data theft, or the installation of malicious software.
Vulnerability Details
CVE-ID: CVE-2025-60703
Affected Software: Windows Remote Desktop
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is an untrusted pointer dereference within the Windows Remote Desktop service. It is a type of memory corruption flaw that occurs when the program attempts to use a memory pointer that it cannot trust, potentially leading to a crash or arbitrary code execution. An attacker who has already gained low-privileged access to a Windows system can craft a specific request to the Remote Desktop service to trigger this flaw, allowing them to execute code with elevated SYSTEM-level permissions.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.8. The primary business impact is the complete loss of confidentiality, integrity, and availability of the compromised system. An attacker with low-level user access (e.g., a standard employee account) could escalate their privileges to that of a domain administrator, allowing them to access and exfiltrate sensitive company data, deploy ransomware, disable security controls, and pivot to other systems on the network. This risk is particularly acute on multi-user systems such as terminal servers and Remote Desktop Session Hosts.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor to all affected Windows systems immediately. After patching, system administrators should monitor for any signs of exploitation attempts by reviewing system and application logs for unusual activity related to the Remote Desktop service.
Proactive Monitoring: Security teams should monitor for anomalous behavior, including unexpected processes being spawned by the Remote Desktop service (e.g., svchost.exe -k termsvcs). Specifically, look for the creation of command shells (cmd.exe, powershell.exe) or other suspicious executables. Review Windows Security Event Logs for unauthorized privilege escalation events (Event ID 4672) associated with non-administrative accounts.
Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls. Restrict Remote Desktop (RDP) access to only authorized and necessary administrative personnel. Enforce the principle of least privilege for all user accounts to limit the initial attack surface. Utilize Endpoint Detection and Response (EDR) solutions to detect and block memory exploitation techniques and anomalous process behavior.
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of November 12, 2025, there is no known public proof-of-concept exploit code, and there are no reports of this vulnerability being actively exploited in the wild. However, local privilege escalation vulnerabilities are highly sought after by threat actors for post-compromise activities and are often integrated into malware and exploit kits shortly after disclosure.
Analyst Recommendation
Given the high CVSS score and the critical nature of a privilege escalation vulnerability, we strongly recommend that organizations prioritize the deployment of the vendor-supplied patches to all affected systems. Special attention should be paid to high-value assets and multi-user systems like Remote Desktop servers. While an attacker requires prior authenticated access, this vulnerability provides a direct path to full system control in a post-compromise scenario. Although not currently on the CISA KEV list, its severity warrants immediate and decisive action to mitigate the risk of compromise.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog
A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog
A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A stack-based buffer overflow vulnerability exists in the makeRequest
A stack-based buffer overflow vulnerability exists in the makeRequest
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A stack-based buffer overflow exists in the validate_static_route function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2
A stack-based buffer overflow exists in the validate_static_route function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A stack-based buffer overflow vulnerability exists in the libshared
A stack-based buffer overflow vulnerability exists in the libshared
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A stack-based buffer overflow exists in the httpd binary of Linksys E1200 v2 routers (Firmware E1200_v2
A stack-based buffer overflow exists in the httpd binary of Linksys E1200 v2 routers (Firmware E1200_v2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2
A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2
Executive Summary:
A high-severity vulnerability has been identified in multiple Linksys router products, which could allow an unauthenticated attacker to remotely take full control of an affected device. This stack-based buffer overflow flaw (CVE-2025-60690) can be exploited by sending a malicious request to the router's web interface, potentially leading to network traffic interception, data theft, or the compromise of the internal network.
Vulnerability Details
CVE-ID: CVE-2025-60690
Affected Software: Linksys Multiple Products
Affected Versions: The vulnerability is confirmed in Linksys E1200 v2 routers (Firmware E1200_v2). See the vendor advisory for a complete list of all affected products and versions.
Vulnerability: This vulnerability is a stack-based buffer overflow within the get_merge_ipaddr function of the router's web server (httpd) binary. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted HTTP request containing an overly long string to a parameter processed by the vulnerable function. This action overwrites the program's execution stack, allowing the attacker to redirect the flow of execution and run arbitrary code on the device with root-level privileges, resulting in a complete system compromise.
Business Impact
This is a high-severity vulnerability with a CVSS score of 8.8. Successful exploitation would grant an attacker complete administrative control over the affected network device. This could lead to significant business disruption, including the ability to intercept, monitor, or redirect all network traffic (Man-in-the-Middle attacks), gain unauthorized access to the internal corporate network, launch further attacks from the compromised device, or cause a complete denial of service. The compromise of a network perimeter device poses a critical risk to data confidentiality, integrity, and availability.
Remediation Plan
Immediate Action: Apply vendor-supplied security updates to all affected Linksys devices immediately. Before and after patching, monitor for any signs of exploitation attempts by reviewing device and network access logs for anomalous activity targeting the web management interface.
Proactive Monitoring: Security teams should monitor web server access logs on affected devices for unusually long or malformed HTTP requests. Network monitoring should be configured to alert on unexpected inbound connections to the router's management interface or any unusual outbound traffic originating from the router itself, which could indicate a successful compromise.
Compensating Controls: If patching cannot be performed immediately, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 14, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, buffer overflow vulnerabilities in embedded network devices are frequently targeted by threat actors for inclusion in botnets (e.g., Mirai) or for use as a foothold into a target network. The development of a functional exploit is considered highly probable.
Analyst Recommendation
Given the high severity (CVSS 8.8) of this vulnerability and the potential for complete device compromise, immediate action is required. All organizations using affected Linksys products must prioritize the deployment of the vendor-supplied firmware updates to mitigate this risk. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its critical nature warrants urgent attention. If patching is delayed, the compensating controls listed above must be implemented immediately to reduce the attack surface.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A stack buffer overflow vulnerability exists in the D-Link DIR-816A2 router firmware DIR-816A2_FWv1
A stack buffer overflow vulnerability exists in the D-Link DIR-816A2 router firmware DIR-816A2_FWv1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AC18 V15
Tenda AC18 V15
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AC18 V15
Tenda AC18 V15
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AC18 V15
Tenda AC18 V15
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An issue was discovered in Free5GC v4
An issue was discovered in Free5GC v4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical vulnerability, identified as CVE-2025-60803, has been discovered in multiple Antabot products. This flaw allows an unauthenticated remote attacker to execute arbitrary code on an affected system, potentially leading to a complete system compromise, data theft, and service disruption. Due to its critical severity and ease of exploitation, immediate remediation is strongly advised.
Vulnerability Details
CVE-ID: CVE-2025-60803
Affected Software: Antabot Multiple Products
Affected Versions: Antabot White-Jotter up to commit 9bcadc. See vendor advisory for a complete list of affected products and versions.
Vulnerability: This is an unauthenticated Remote Code Execution (RCE) vulnerability. It exists due to a path confusion flaw in a specific API endpoint. An attacker can send a specially crafted HTTP request to the
/api/aaa;/../registercomponent. The use of a semicolon (;) followed by a path traversal sequence (/../) can confuse the server's path parsing logic, causing it to bypass authentication and authorization checks intended for the/api/aaapath and improperly process the/registerendpoint, leading to code execution with the privileges of the web server process.Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation by an unauthenticated attacker could result in a complete compromise of the affected server. The potential consequences include theft of sensitive corporate or customer data, deployment of ransomware, disruption of business-critical services hosted on the server, and using the compromised system as a pivot point to launch further attacks against the internal network. A public breach resulting from this vulnerability could lead to significant financial loss, regulatory fines, and severe reputational damage.
Remediation Plan
Immediate Action:
/api/aaa;/../registerendpoint or containing similar path traversal patterns.Proactive Monitoring:
;/../or other path traversal sequences (../,..%2f, etc.), particularly those targeting API endpoints.Compensating Controls:
If patching cannot be performed immediately, implement the following controls:
;/../in the URL.Exploitation Status
Public Exploit Available: False
Analyst Notes:
As of October 24, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, given the critical severity and the unauthenticated nature of the RCE, it is highly probable that threat actors will reverse-engineer the patch and develop a functional exploit rapidly.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the potential for a complete system compromise without authentication, immediate action is required. All organizations using the affected Antabot products must prioritize applying the vendor-supplied patches immediately. Although this vulnerability is not currently on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity makes it a prime candidate for future inclusion. If patching is delayed, compensating controls such as WAF rules and network segmentation must be implemented as an urgent temporary measure to mitigate the significant risk.