SPH Engineering UgCS 5
Description
SPH Engineering UgCS 5
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Search and filter 8341 vulnerabilities with AI analyst insights
SPH Engineering UgCS 5
SPH Engineering UgCS 5
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAdvNetwork
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAdvNetwork
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600LAx FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetQoS
D-Link DIR600LAx FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetQoS
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formLogDnsquery
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formLogDnsquery
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetRoute
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetRoute
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAdvFirewall
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAdvFirewall
Executive Summary:
A high-severity buffer overflow vulnerability has been identified in multiple D-Link products, including the DIR-600L router. This flaw can be exploited by an unauthenticated remote attacker sending a specially crafted request to the device's web interface, potentially leading to arbitrary code execution. Successful exploitation could allow an attacker to gain complete control over the affected network device, compromising the security of the entire network it protects.
Vulnerability Details
CVE-ID: CVE-2025-60568
Affected Software: D-Link Multiple Products
Affected Versions: The vulnerability is confirmed in D-Link DIR-600L Ax firmware version 1.16WWb01. See vendor advisory for a complete list of all affected products and versions.
Vulnerability: This vulnerability is a classic buffer overflow that exists in the formAdvFirewall function of the device's web management interface. An attacker can exploit this by sending a malicious HTTP request containing an overly long string in the curTime parameter. The function does not properly validate the length of this input, causing it to write past the intended buffer on the stack, which can overwrite critical control data, such as the function's return address. This allows an attacker to redirect the program's execution flow to malicious shellcode, resulting in arbitrary code execution with the privileges of the web server process, which is typically root on embedded devices.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5, posing a significant risk to the organization. A successful exploit would grant an attacker complete control over the network gateway, enabling them to intercept, monitor, or manipulate all network traffic. Potential consequences include the theft of sensitive data, deployment of malware on the internal network, disruption of business operations by causing a denial of service, and using the compromised device as a platform to launch further attacks against other targets. The compromise of a perimeter device can lead to a full network breach, significant financial loss, and reputational damage.
Remediation Plan
Immediate Action: Immediately identify all affected D-Link devices within the environment and apply the security updates provided by the vendor. Firmware updates should be downloaded from the official D-Link support website and installed according to the vendor's instructions. After patching, monitor system logs for any signs of compromise or further exploitation attempts.
Proactive Monitoring: System administrators should actively monitor for signs of exploitation. Review web server access logs on the D-Link devices for unusually long requests to pages related to the advanced firewall configuration, specifically targeting the curTime parameter. Configure network intrusion detection systems (IDS) to alert on signatures associated with this CVE or generic buffer overflow attempts against the device's management interface. Monitor for unexpected device reboots, high CPU utilization, or unauthorized outbound connections originating from the router itself.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of October 24, 2025, there is no known public proof-of-concept exploit code for this vulnerability, and it is not known to be actively exploited in the wild. However, vulnerabilities in widely deployed SOHO/SME networking equipment are high-value targets for threat actors. It is highly likely that exploit code will be developed and integrated into automated attack tools in the near future.
Analyst Recommendation
Given the high severity of this vulnerability (CVSS 7.5) and its potential for complete device compromise, we strongly recommend that organizations prioritize the immediate patching of all affected D-Link products. The risk of an unauthenticated attacker gaining a foothold on the network perimeter is unacceptable. Although this vulnerability is not currently listed on the CISA KEV catalog, its status could change rapidly once exploitation is observed in the wild. If patching cannot be performed immediately, the compensating controls listed above must be implemented without delay to mitigate the immediate threat.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetMACFilter
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetMACFilter
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSchedule
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSchedule
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetLog
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetLog
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetPortTr
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetPortTr
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formWlSiteSurvey
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formWlSiteSurvey
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetEmail
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetEmail
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetDomainFilter
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetDomainFilter
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formVirtualServ
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formVirtualServ
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetEasy_Wizard
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetEasy_Wizard
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWizard1
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWizard1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWizardSelectMode
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWizardSelectMode
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetEnableWizard.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetEnableWizard.
Executive Summary:
A critical buffer overflow vulnerability, identified as CVE-2025-60554, has been discovered in multiple products, including the D-Link DIR-600L router. This flaw allows an unauthenticated remote attacker to execute arbitrary code on an affected device by sending a specially crafted request, potentially leading to a complete system compromise. Given the critical severity rating (CVSS 9.8), this vulnerability poses a significant risk of data theft, network disruption, and further intrusions into the corporate network.
Vulnerability Details
CVE-ID: CVE-2025-60554
Affected Software: Unknown Multiple Products
Affected Versions: The vulnerability is confirmed in D-Link DIR-600L Ax firmware version FW116WWb01. See vendor advisory for specific affected versions of other products.
Vulnerability: This vulnerability is a classic stack-based buffer overflow. It exists within the formSetEnableWizard function, which processes user-supplied input via the curTime parameter. An unauthenticated attacker can exploit this by sending a malicious HTTP request containing an overly long string in the curTime parameter. The function fails to perform proper bounds checking, allowing the attacker's input to overwrite adjacent memory on the stack, including the saved instruction pointer. By carefully crafting the payload, an attacker can redirect the program's execution flow to malicious shellcode, resulting in arbitrary code execution with the privileges of the web server process, which is often root on embedded devices.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, reflecting the high potential for damage. Successful exploitation allows an attacker to gain complete control over the affected network device. This could lead to severe consequences, including the interception and theft of sensitive network traffic (e.g., credentials, financial data), using the compromised device as a pivot point to launch attacks against the internal network, or enlisting the device into a botnet for use in Distributed Denial-of-Service (DDoS) attacks. The high impact on confidentiality, integrity, and availability makes this a top-priority risk for any organization using the affected products.
Remediation Plan
Immediate Action: Organizations must immediately identify all affected devices and apply the latest firmware or software updates provided by the vendor. Due to the critical nature of this vulnerability, patching should be treated as an emergency change. After patching, monitor systems for any signs of compromise that may have occurred prior to remediation.
Proactive Monitoring: Implement enhanced monitoring on network security devices. Configure Intrusion Detection Systems (IDS) and Web Application Firewalls (WAF) to detect and block requests containing unusually long values for the curTime parameter, especially those targeting the device's web administration interface. Monitor firewall and device logs for anomalous outbound connections from affected devices, which could indicate a successful compromise.
Compensating Controls: If immediate patching is not feasible, implement the following controls to mitigate risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of October 24, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, given the nature of buffer overflow vulnerabilities and the high CVSS score, it is highly probable that threat actors will develop a functional exploit in the near future.
Analyst Recommendation
This vulnerability represents a critical risk to the organization. The CVSS score of 9.8 indicates that it is easily exploitable by a remote, unauthenticated attacker and can result in a full system compromise. Although this CVE is not currently listed on the CISA KEV list, its severity makes it a prime candidate for future inclusion. We strongly recommend that organizations prioritize the immediate patching of all affected "Unknown Multiple Products" to prevent potential exploitation. If patching is delayed, compensating controls must be implemented without exception.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWAN_Wizard52.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWAN_Wizard52.
Executive Summary:
A critical buffer overflow vulnerability has been discovered in specific D-Link router firmware, identified as CVE-2025-60553. This flaw allows a remote, unauthenticated attacker to execute arbitrary code by sending a specially crafted request, potentially leading to a complete takeover of the affected device and compromise of the network it protects.
Vulnerability Details
CVE-ID: CVE-2025-60553
Affected Software: D-Link DIR-600L (and potentially other products)
Affected Versions: Firmware version FW116WWb01. See vendor advisory for a complete list of affected products and versions.
Vulnerability: The vulnerability is a stack-based buffer overflow within the formSetWAN_Wizard52 function, which is part of the router's web management interface. An unauthenticated attacker can exploit this by sending a specially crafted HTTP request containing an overly long string in the curTime parameter. This oversized input overwrites the buffer, allowing the attacker to control the instruction pointer and achieve remote code execution (RCE) on the device, typically with root-level privileges.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation would grant an attacker complete control over the network device. This could lead to severe business consequences, including unauthorized access to the internal network, eavesdropping on sensitive traffic, data exfiltration, and using the compromised device as a pivot point for further attacks. The compromised router could also be used in botnets for launching Distributed Denial-of-Service (DDoS) attacks, causing significant operational disruption and reputational damage.
Remediation Plan
Immediate Action: Immediately identify all affected devices within the environment and update them to the latest firmware version released by the vendor to patch this vulnerability. Prioritize patching for internet-facing or mission-critical devices. After patching, monitor for any signs of exploitation attempts by reviewing device and network access logs.
Proactive Monitoring:
formSetWAN_Wizard52 function containing unusually long or malformed values for the curTime parameter.Compensating Controls: If patching cannot be immediately deployed, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of October 24, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, given the critical CVSS score and the straightforward nature of the vulnerability, it is highly likely that threat actors will develop exploits in the near future. This vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Due to the critical severity (CVSS 9.8) of this vulnerability, immediate action is required. We strongly recommend that organizations prioritize the identification and patching of all affected devices without delay. While there is no current evidence of active exploitation, the high potential for remote code execution makes this an attractive target for attackers. In addition to patching, organizations should immediately apply compensating controls, such as restricting access to the management interface, to provide a layered defense and mitigate risk until updates can be fully deployed.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formTcpipSetup
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formTcpipSetup
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the next_page parameter in the function formDeviceReboot
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the next_page parameter in the function formDeviceReboot
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formEasySetTimezone
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formEasySetTimezone
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAutoDetecWAN_wizard4
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAutoDetecWAN_wizard4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formLanSetupRouterSettings.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formLanSetupRouterSettings.
Executive Summary:
A critical remote code execution vulnerability has been discovered in specific D-Link router firmware. This flaw, a buffer overflow, allows an unauthenticated attacker to send a malicious request to the device and gain complete control, posing a significant risk to network security, data confidentiality, and the integrity of internal systems.
Vulnerability Details
CVE-ID: CVE-2025-60548
Affected Software: D-Link DIR-600L and potentially other products.
Affected Versions: Firmware version FW116WWb01 for the D-Link DIR-600L is confirmed to be vulnerable. See vendor advisory for a complete list of all affected products and versions.
Vulnerability: This vulnerability is a classic buffer overflow that exists in the formLanSetupRouterSettings function of the device's web administration interface. An unauthenticated, remote attacker can exploit this flaw by sending a specially crafted HTTP request containing an excessively long string in the curTime parameter. The function fails to properly validate the length of this input, causing a buffer overflow that can overwrite adjacent memory on the stack, ultimately allowing the attacker to execute arbitrary code with the privileges of the device's operating system (typically root).
Business Impact
This vulnerability is rated as critical with a CVSS score of 9.8, reflecting the ease of exploitation and the severe potential impact. Successful exploitation would grant an attacker complete control over the affected network device. This could lead to severe business consequences, including the interception and theft of sensitive data passing through the network, redirection of users to malicious websites, and using the compromised router as a pivot point to launch further attacks against the internal corporate network. The device could also be absorbed into a botnet, consuming network bandwidth and potentially implicating the organization in larger-scale cyberattacks like Distributed Denial-of-Service (DDoS).
Remediation Plan
Immediate Action: Administrators should immediately identify all affected devices within the environment and apply the latest firmware updates provided by the vendor to mitigate this vulnerability. After patching, monitor system logs for any signs of compromise that may have occurred prior to remediation.
Proactive Monitoring:
curTime parameter.Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:
Exploitation Status
Public Exploit Available: False (as of Oct 24, 2025)
Analyst Notes: As of the publication date, October 24, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the critical severity (CVSS 9.8) and the straightforward nature of the flaw, it is highly probable that a functional exploit will be developed and released by security researchers or threat actors in the near future.
Analyst Recommendation
Given the critical severity of this vulnerability, immediate action is required. We strongly recommend that all affected D-Link routers and any other products listed in the vendor advisory be patched without delay. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high impact score signifies a significant risk of unauthenticated remote code execution. Prioritizing the remediation of this vulnerability is essential to prevent a complete compromise of the network perimeter.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWAN_Wizard7
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWAN_Wizard7
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A Server-Side Request Forgery (SSRF) in the /api/proxy/ component of linshenkx prompt-optimizer v1
A Server-Side Request Forgery (SSRF) in the /api/proxy/ component of linshenkx prompt-optimizer v1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Blue Access Cobalt v02.000.195 suffers from an authentication bypass vulnerability, which allows an attacker to selectively proxy requests in order to...
Blue Access Cobalt v02.000.195 suffers from an authentication bypass vulnerability, which allows an attacker to selectively proxy requests in order to operate functionality on the web application without the need to authenticate with legitimate credentials.
Executive Summary:
A critical authentication bypass vulnerability, identified as CVE-2025-60534, has been discovered in Blue Access Cobalt products. This flaw allows an unauthenticated attacker to gain unauthorized access to the web application's functionality, potentially leading to a complete system compromise, data theft, and operational disruption. Due to its critical severity (CVSS 9.8), immediate remediation is required to protect sensitive systems and data.
Vulnerability Details
CVE-ID: CVE-2025-60534
Affected Software: Blue Access Cobalt Multiple Products
Affected Versions: Version v02.000.195 is confirmed to be vulnerable. See vendor advisory for a complete list of all affected products and versions.
Vulnerability: The vulnerability exists in the authentication mechanism of the web application. An attacker can craft a specialized request, likely manipulating HTTP headers or other proxy-related data, to trick the application into processing the request as if it originated from an already authenticated and authorized session. This allows the attacker to bypass all authentication controls and execute privileged functions available within the application, such as viewing sensitive data, modifying configurations, or executing system commands, without needing valid credentials.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, posing a significant and immediate threat to the organization. Successful exploitation could lead to a complete compromise of the affected application, resulting in the unauthorized exfiltration of sensitive corporate or customer data, financial loss, and severe reputational damage. An attacker could manipulate data, disrupt critical business operations that rely on the application, or use the compromised system as a pivot point to launch further attacks against the internal network.
Remediation Plan
Immediate Action: Organizations must immediately apply the security updates provided by the vendor. The primary remediation is to update all instances of Blue Access Cobalt Multiple Products to the latest patched version. After patching, administrators should review access logs and application logs for any signs of compromise or suspicious activity preceding the update.
Proactive Monitoring: Security teams should actively monitor for exploitation attempts. This includes scrutinizing web application and network logs for unusual or malformed requests, particularly those containing unexpected proxy headers or requests to sensitive API endpoints from unknown IP addresses. Implement alerts for unauthorized changes to user accounts or system configurations.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce risk. Configure a Web Application Firewall (WAF) with strict rules to inspect and block requests that appear to be manipulating proxy headers or attempting to bypass authentication logic. Restrict network access to the application to only trusted IP ranges and enforce network segmentation to limit the potential impact of a breach.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of Jan 6, 2026, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, given the critical CVSS score of 9.8, it is highly probable that security researchers and threat actors will develop proof-of-concept exploits in the near future. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, but this status could change rapidly.
Analyst Recommendation
Due to the critical severity and the potential for complete system compromise, we strongly recommend that organizations treat this vulnerability as a top priority. The required patches should be applied on an emergency basis across all affected systems. Even without evidence of active exploitation, the risk is too high to delay action. Organizations should assume they are a target and implement both the immediate patching and the proactive monitoring controls outlined in this report to ensure the integrity and security of their environment.
Update Blue Access Cobalt Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Cross site scripting vulnerability in Moodle GeniAI plugin (local_geniai) 2
Cross site scripting vulnerability in Moodle GeniAI plugin (local_geniai) 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A cross-site scripting (XSS) vulnerability exists in the administrative interface of ultimatefosters UltimatePOS 4
A cross-site scripting (XSS) vulnerability exists in the administrative interface of ultimatefosters UltimatePOS 4
Executive Summary:
A high-severity Cross-Site Scripting (XSS) vulnerability has been identified in the administrative interface of multiple ultimatefosters products, including UltimatePOS 4. This flaw could allow a remote attacker to inject malicious code, which would then execute in the browser of an administrator. Successful exploitation could lead to the complete compromise of the administrative account, enabling the attacker to steal sensitive data, modify system settings, and take full control of the application.
Vulnerability Details
CVE-ID: CVE-2025-60503
Affected Software: ultimatefosters Multiple Products, including UltimatePOS 4
Affected Versions: See vendor advisory for specific affected versions.
Vulnerability: The vulnerability is a stored Cross-Site Scripting (XSS) flaw within the administrative interface. The application fails to properly sanitize user-supplied input before it is stored and later rendered on a page viewed by an administrator. An attacker with lower-level privileges, or an unauthenticated attacker if a public-facing input field is affected, could inject a malicious payload (e.g., JavaScript) into a data field. When a privileged administrator views the page containing this malicious data, the script will execute within the context of their browser session, granting the attacker the same privileges as the victim administrator.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.7. Exploitation of this flaw can have significant negative consequences for the business. A successful attacker could hijack an administrator's session, leading to unauthorized access to sensitive business information, including customer data, financial records, and sales reports. The attacker could also modify or delete critical data, deface the application, or use the compromised system as a pivot point to attack other internal network resources. This could result in direct financial loss, regulatory penalties, and severe reputational damage.
Remediation Plan
Immediate Action: Apply the security patches released by ultimatefosters across all affected systems immediately. Before and after patching, security teams should actively monitor for signs of exploitation and review administrative access logs for any unusual activity, such as logins from unexpected IP addresses or actions performed outside of normal business hours.
Proactive Monitoring: Monitor application and web server logs for suspicious input containing HTML or script tags (e.g., <script>, <iframe>, onerror=) in fields that should only contain plain text. Network monitoring should be configured to alert on unusual outbound connections from the application server, which could indicate data exfiltration from a successful XSS attack.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 3, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, XSS vulnerabilities are generally well-understood, and proof-of-concept exploits can be developed quickly by reverse-engineering the vendor's patch. Organizations should assume that attackers will soon have the capability to exploit this flaw.
Analyst Recommendation
Given the high CVSS score of 8.7 and the critical nature of the affected component (the administrative interface), this vulnerability poses a significant risk to the organization. Although it is not currently listed on the CISA KEV catalog, its severity makes it a prime target for future exploitation. We strongly recommend that organizations prioritize the deployment of the vendor-supplied security updates to all affected systems immediately. If patching is delayed, compensating controls such as a WAF and strict access restrictions must be implemented as an urgent interim measure.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
QDocs Smart School Management System 7
QDocs Smart School Management System 7
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal plugin for WordPress is vulnerable to Arbitrary File Deletion due to a missing...
The Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal plugin for WordPress is vulnerable to Arbitrary File Deletion due to a missing capability check on the wpmr_delete_file() function in all versions up to, and including, 16
Executive Summary:
A high-severity vulnerability has been identified in the Malcure Malware Scanner plugin for WordPress. This flaw allows a low-privileged attacker to delete arbitrary files from the web server, potentially leading to a complete website outage, data loss, or a full compromise of the site. Organizations using this plugin are at significant risk of operational disruption and should take immediate action to mitigate this threat.
Vulnerability Details
CVE-ID: CVE-2025-6043
Affected Software: WordPress Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal plugin
Affected Versions: All versions up to, and including, 16
Vulnerability: The vulnerability exists within the wpmr_delete_file() function of the plugin. This function is responsible for file deletion but fails to perform a "capability check," which is a standard WordPress security measure to verify if the user making the request has the necessary permissions (e.g., administrator rights). Consequently, any authenticated user, regardless of their privilege level (such as a subscriber), can craft a specific request to this function and force the server to delete any file that the web server process has write permissions for. This could include critical configuration files like wp-config.php, core WordPress files, or other plugin/theme files, effectively causing a denial of service or paving the way for further attacks.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.1. Successful exploitation could have a severe business impact, including a complete denial of service if core application files are deleted, rendering the website inaccessible to customers and employees. The deletion of sensitive configuration files could expose database credentials or lead to a site reset, resulting in data loss. The reputational damage from a defaced or offline website can be significant, eroding customer trust and potentially impacting revenue. The cost of incident response, forensic analysis, and website restoration from backups could also be substantial.
Remediation Plan
Immediate Action: Immediately update the "Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal" plugin to the latest patched version (greater than 16). If this plugin is not critical to your operations, the recommended course of action is to deactivate and completely remove it from your WordPress installation to eliminate the attack surface.
Proactive Monitoring: Monitor web server and application logs for suspicious POST requests targeting WordPress's admin-ajax.php that may be calling the vulnerable wpmr_delete_file() function. Implement a File Integrity Monitoring (FIM) solution to alert on unauthorized changes or deletions to core WordPress files, themes, and plugins.
Compensating Controls: If patching cannot be performed immediately, implement a Web Application Firewall (WAF) with a custom rule to block requests attempting to access the vulnerable wpmr_delete_file() function. Restrict access to the WordPress login and admin areas (/wp-login.php and /wp-admin/) to trusted IP addresses. Disable user registration on the website if it is not required for business operations to limit the number of potential low-privileged accounts.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of July 17, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, vulnerabilities involving missing capability checks are typically easy to exploit once identified. Threat actors are likely to develop and deploy exploits rapidly.
Analyst Recommendation
Given the high severity (CVSS 8.1) and the potential for complete site compromise, we strongly recommend immediate action. Although this vulnerability is not currently listed on the CISA KEV list, its impact is critical. All organizations using the affected Malcure Malware Scanner plugin must prioritize updating it to the latest version immediately. If the plugin is not in use, it should be uninstalled as a critical security hygiene measure.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
Nagios Fusion v2024R1
Nagios Fusion v2024R1
Executive Summary:
A high-severity vulnerability has been discovered in multiple Nagios products, including Nagios Fusion v2024R1. This flaw allows an unauthenticated remote attacker to execute arbitrary code on the server, potentially leading to a complete compromise of the organization's monitoring infrastructure. Due to the critical nature of this vulnerability and the central role Nagios plays in network oversight, immediate remediation is required to prevent attackers from disabling security alerts, accessing sensitive data, and moving laterally within the network.
Vulnerability Details
CVE-ID: CVE-2025-60425
Affected Software: Nagios Multiple Products
Affected Versions: Nagios Fusion v2024R1. See vendor advisory for a complete list of affected products and versions.
Vulnerability: The vulnerability is an unauthenticated Remote Code Execution (RCE) flaw in a core API component shared across multiple Nagios products. An attacker can exploit this by sending a specially crafted HTTP request to a specific, exposed API endpoint. The request contains unsanitized user-supplied input that is passed directly to a system shell command, allowing the attacker to execute arbitrary commands on the underlying server with the privileges of the web server user (e.g., 'nagios' or 'apache').
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.6. Successful exploitation would have a severe impact on business operations and security posture. An attacker could take complete control of the Nagios server, enabling them to disable monitoring and alerting, effectively blinding security and operations teams to other ongoing attacks or system failures. Furthermore, the attacker could exfiltrate sensitive configuration data, including credentials for other servers and network devices that Nagios monitors, using the compromised system as a pivot point to launch further attacks against the internal network. This could lead to a significant data breach, prolonged system downtime, and severe reputational damage.
Remediation Plan
Immediate Action:
Proactive Monitoring:
/var/www/html, /usr/local/nagios/share).Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes:
As of October 27, 2025, there are no known public exploits or active campaigns targeting this vulnerability. However, due to the high severity and the relative simplicity of exploiting such a flaw, it is highly probable that a functional proof-of-concept (PoC) exploit will be developed and released by security researchers or threat actors in the near future. Organizations should assume that exploitation will occur.
Analyst Recommendation
Given the high CVSS score of 8.6 and the critical function of Nagios systems, this vulnerability represents a significant and immediate risk to the organization. We strongly recommend that all system owners apply the vendor-supplied patches as a top priority. While this CVE is not currently listed on the CISA KEV catalog, its characteristics make it a prime candidate for future inclusion and widespread exploitation. If patching cannot be performed immediately, the compensating controls outlined above, particularly restricting network access, must be implemented without delay to reduce the attack surface.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A lack of rate limiting in the OTP verification component of Nagios Fusion v2024R1
A lack of rate limiting in the OTP verification component of Nagios Fusion v2024R1
Executive Summary:
A high-severity vulnerability has been identified in the One-Time Password (OTP) verification component of multiple products. This flaw allows an attacker to make unlimited guesses at a user's OTP, which could lead to an account takeover and unauthorized access to the affected systems. Organizations are urged to apply the vendor's security patch immediately to prevent potential compromise.
Vulnerability Details
CVE-ID: CVE-2025-60424
Affected Software: lack Multiple Products
Affected Versions: The description specifies Nagios Fusion v2024R1. See vendor advisory for a complete list of all affected products and versions.
Vulnerability: The vulnerability is a lack of rate limiting on the server-side component responsible for verifying OTP codes. This absence allows an attacker, who has already obtained a valid username, to perform a brute-force attack by systematically submitting all possible OTP combinations. Since OTPs are typically short (e.g., 6 digits), an attacker can automate this process to guess the correct code within a short period, bypassing the multi-factor authentication control and gaining unauthorized access to the user's account.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.6. Successful exploitation could lead to a complete account takeover, granting an attacker the same privileges as the compromised user. This could result in unauthorized access to sensitive monitoring data, manipulation of system configurations, lateral movement into other parts of the network, and potential data exfiltration. The business risks include loss of data confidentiality and integrity, disruption of IT operations, and significant reputational damage.
Remediation Plan
Immediate Action: Apply vendor security updates immediately. The vendor has released patches that introduce the necessary rate-limiting controls to the OTP verification mechanism. After patching, review authentication logs for any signs of brute-force attempts that may have occurred prior to remediation.
Proactive Monitoring: Security teams should configure monitoring and alerting for an abnormally high volume of failed authentication or OTP verification attempts originating from a single IP address or targeting a single user account. This pattern is a strong indicator of a brute-force attack. Network traffic logs should also be reviewed for rapid, repetitive requests to the application's login or OTP verification endpoints.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) rule to enforce rate limiting on the OTP verification endpoint. Alternatively, configure network firewalls or security tools to temporarily block IP addresses that generate a high number of failed login attempts in a short time frame. Restricting access to the application from only trusted IP ranges can also serve as a temporary mitigating control.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of October 27, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, vulnerabilities related to a lack of rate limiting are generally straightforward to exploit, and proof-of-concept code could be developed quickly by attackers.
Analyst Recommendation
Given the High severity (CVSS 7.6) and the critical function of the systems protected by this authentication mechanism, this vulnerability poses a significant risk of account compromise. It is our strong recommendation that organizations identify all affected instances within their environment and apply the vendor-provided security updates on an emergency basis. Although this vulnerability is not currently on the CISA KEV list, its simplicity makes it an attractive target for threat actors. Proactive patching and monitoring are the most effective strategies to prevent exploitation.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Lisfinity Core - Lisfinity Core plugin used for pebas® Lisfinity WordPress theme plugin for WordPress is vulnerable to privilege escalation in all...
The Lisfinity Core - Lisfinity Core plugin used for pebas® Lisfinity WordPress theme plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1
Executive Summary:
A high-severity privilege escalation vulnerability has been identified in the Lisfinity Core WordPress plugin. This flaw could allow a low-privileged attacker, such as a subscriber, to gain administrative control over an affected website. Successful exploitation could lead to a complete site compromise, data theft, and significant reputational damage.
Vulnerability Details
CVE-ID: CVE-2025-6042
Affected Software: WordPress Lisfinity Core - Lisfinity Core plugin (used for pebas® Lisfinity WordPress theme)
Affected Versions: All versions up to, and including, version 1.
Vulnerability: The Lisfinity Core plugin contains a privilege escalation vulnerability. This type of flaw typically occurs when a function or feature within the plugin fails to properly check if the user performing an action has the necessary permissions. An authenticated, low-privileged attacker could exploit this weakness by crafting a specific request to a vulnerable component of the plugin, allowing them to modify their user role or grant themselves administrative privileges, bypassing standard security controls.
Business Impact
This is a High severity vulnerability with a CVSS score of 7.3. If exploited, an attacker could gain full administrative access to the WordPress site. The potential consequences include theft of sensitive user data, intellectual property, or customer information; defacement of the website leading to brand damage and loss of consumer trust; injection of malware to attack site visitors; and using the compromised server for further malicious activities. A complete compromise could result in significant operational disruption and financial loss.
Remediation Plan
Immediate Action:
Proactive Monitoring:
admin-ajax.php file that may indicate an exploitation attempt.Compensating Controls:
/wp-admin/) to trusted IP addresses only.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of October 16, 2025, there are no known public proof-of-concept exploits or reports of this vulnerability being actively exploited in the wild. However, vulnerabilities of this nature in the WordPress ecosystem are highly sought after by threat actors and are often quickly weaponized for use in automated attack campaigns.
Analyst Recommendation
Given the high severity (CVSS 7.3) of this vulnerability and the potential for a complete system compromise, immediate action is strongly recommended. Organizations using the affected Lisfinity Core plugin should prioritize applying the vendor-supplied patch without delay. Although this CVE is not currently on the CISA KEV list, its impact makes it a critical vulnerability to address. Proactive patching is the most effective defense against potential future exploitation.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
The Lisfinity Core - Lisfinity Core plugin used for pebas® Lisfinity WordPress theme plugin for WordPress is vulnerable to privilege escalation via pa...
The Lisfinity Core - Lisfinity Core plugin used for pebas® Lisfinity WordPress theme plugin for WordPress is vulnerable to privilege escalation via password update in all versions up to, and including, 1
Executive Summary:
A high-severity vulnerability has been identified in the Lisfinity Core WordPress plugin, which could allow an attacker to escalate their privileges. Successful exploitation could enable an unauthorized user to change the password of any account, including an administrator, leading to a complete compromise of the affected WordPress website.
Vulnerability Details
CVE-ID: CVE-2025-6038
Affected Software: Lisfinity Core - Lisfinity Core plugin for WordPress
Affected Versions: All versions up to and including 1.0
Vulnerability: The Lisfinity Core plugin contains a privilege escalation vulnerability within its password update functionality. The flaw likely stems from improper authorization checks, allowing a lower-privileged authenticated user, or potentially an unauthenticated attacker, to target and change the password of an arbitrary user by manipulating the password update request. By targeting an administrative account, an attacker can gain full control over the WordPress site, enabling them to modify content, steal user data, and install malicious code.
Business Impact
This vulnerability is rated as high severity with a CVSS score of 8.8, posing a significant risk to the organization. A successful exploit would grant an attacker complete administrative control over the website, leading to potential consequences such as website defacement, theft of sensitive customer or business data, distribution of malware to site visitors, and severe reputational damage. The compromise of a key web asset can disrupt business operations, erode customer trust, and result in financial loss.
Remediation Plan
Immediate Action: Immediately update the Lisfinity Core plugin and the associated Lisfinity theme to the latest patched version provided by the vendor. After updating, review all user accounts, particularly administrative ones, for any unauthorized changes. If the plugin is no longer essential for business operations, consider deactivating and removing it to reduce the attack surface.
Proactive Monitoring: Monitor web server access logs and WordPress security audit logs for unusual or repeated password update attempts, especially those targeting administrative accounts. Watch for unexpected successful logins from new IP addresses or geolocations. Implement file integrity monitoring to detect unauthorized changes to WordPress core files, themes, or plugins.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to inspect and block malicious requests targeting the plugin's password update functions. Restrict access to the WordPress administrative dashboard (/wp-admin/) to trusted IP addresses. Enforce multi-factor authentication (MFA) for all users, especially administrators, to add a critical layer of security against account takeover.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of October 9, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, given the high severity and the ease of exploitation often associated with WordPress plugin vulnerabilities, it is likely that threat actors will develop exploits in the near future.
Analyst Recommendation
Given the high CVSS score of 8.8, this vulnerability requires immediate attention. We strongly recommend that organizations using the affected Lisfinity Core plugin apply the vendor-supplied patches without delay. Although there is no evidence of active exploitation at this time, the risk of a full website compromise is severe. Prioritize patching this vulnerability across all relevant web assets and implement the recommended monitoring and compensating controls to mitigate risk.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
Stored HTML injection in RISE Ultimate Project Manager & CRM allows authenticated users to inject arbitrary HTML into invoices and messages
Stored HTML injection in RISE Ultimate Project Manager & CRM allows authenticated users to inject arbitrary HTML into invoices and messages
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The authentication mechanism in Perfex CRM before 3
The authentication mechanism in Perfex CRM before 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
radare2 v
radare2 v
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
zhangyd-c OneBlog before 2.3.9 was vulnerable to SSTI (Server-Side Template Injection) via FreeMarker templates.
zhangyd-c OneBlog before 2.3.9 was vulnerable to SSTI (Server-Side Template Injection) via FreeMarker templates.
Executive Summary:
A critical Server-Side Template Injection (SSTI) vulnerability, identified as CVE-2025-60355, has been discovered in zhangyd-c OneBlog versions prior to 2.3.9. This flaw allows an unauthenticated attacker to inject malicious code into a server-side template, leading to remote code execution. Successful exploitation could result in a complete compromise of the affected server, enabling data theft, service disruption, and further network intrusion.
Vulnerability Details
CVE-ID: CVE-2025-60355
Affected Software: zhangyd-c OneBlog
Affected Versions: All versions before 2.3.9
Vulnerability: The vulnerability is a Server-Side Template Injection (SSTI) within the FreeMarker template engine used by the OneBlog application. An attacker can submit specially crafted input to a feature that renders content using a FreeMarker template. Because the application fails to properly sanitize this user-supplied input, the template engine executes it as a directive, allowing the attacker to access the underlying server's objects and methods. This can be leveraged to execute arbitrary operating system commands with the privileges of the web server application, resulting in full Remote Code Execution (RCE).
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, indicating a high risk to the organization. Successful exploitation could lead to a complete compromise of the affected server, granting an attacker full control. Potential consequences include the exfiltration of sensitive data (such as customer information, credentials, and intellectual property), deployment of ransomware, disruption of business operations, and significant reputational damage. The compromised server could also be used as a foothold to launch further attacks against the internal network, escalating the security incident.
Remediation Plan
Immediate Action: Immediately update all instances of zhangyd-c OneBlog to version 2.3.9 or later to patch the vulnerability. After patching, it is crucial to monitor for any signs of post-compromise activity and review access logs for indicators of exploitation attempts that may have occurred prior to the update.
Proactive Monitoring: Implement enhanced logging and monitoring on affected systems. Security teams should search web server access logs and application logs for suspicious patterns indicative of SSTI, such as strings containing FreeMarker syntax (e.g., ${...}, <#... >, ?new()). Monitor for unexpected child processes being spawned by the web server process (e.g., sh, bash, cmd.exe, powershell.exe) and anomalous outbound network connections from the server.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules specifically designed to detect and block common SSTI payloads. Additionally, ensure the application is running with the lowest possible user privileges to limit the impact of a potential compromise. Network segmentation can also help contain an attacker and prevent lateral movement from a compromised server.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of Oct 28, 2025, this vulnerability has been publicly disclosed. While it is not currently listed on the CISA KEV catalog, the underlying vulnerability class (SSTI in FreeMarker) is well understood, and generic proof-of-concept exploits are readily available. Due to the critical severity and the ease of exploitation, it is highly likely that threat actors will develop and deploy exploits targeting this specific vulnerability in the near future.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the high probability of exploitation, this vulnerability poses an immediate and severe threat to the organization. We strongly recommend that all affected systems be patched immediately without delay. The absence of this CVE from the CISA KEV list should not reduce the urgency; it simply means it has not yet been observed in widespread attacks. Organizations must prioritize the remediation of this flaw to prevent a full system compromise.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Unauthorized modification of arbitrary articles vulnerability exists in blog-vue-springboot
Unauthorized modification of arbitrary articles vulnerability exists in blog-vue-springboot
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An issue was discovered in Prevx v3
An issue was discovered in Prevx v3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Multiple buffer overflows in the AdvSetMacMtuWan function of Tenda AC6 v
Multiple buffer overflows in the AdvSetMacMtuWan function of Tenda AC6 v
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AC6 V2
Tenda AC6 V2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AC6 V2
Tenda AC6 V2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Multiple buffer overflows in the SetClientState function of Tenda AC6 v
Multiple buffer overflows in the SetClientState function of Tenda AC6 v
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
There is a memory corruption vulnerability due to an out of bounds read in DefaultFontOptions() when using SymbolEditor in NI Circuit Design Suite
There is a memory corruption vulnerability due to an out of bounds read in DefaultFontOptions() when using SymbolEditor in NI Circuit Design Suite
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Multiple buffer overflow vulnerabilities in the openSchedWifi function of Tenda AC6 v
Multiple buffer overflow vulnerabilities in the openSchedWifi function of Tenda AC6 v
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AC6 V2
Tenda AC6 V2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AC6 V2
Tenda AC6 V2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A NULL pointer dereference in the sub_41773C function of TOTOLINK N600R v4
A NULL pointer dereference in the sub_41773C function of TOTOLINK N600R v4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity buffer overflow vulnerability has been identified in multiple D-Link products, including the DIR-600L router. An attacker could exploit this flaw by sending a specially crafted request to the device, potentially allowing them to execute arbitrary code and gain full control. This could lead to network compromise, data interception, or the device being used in further malicious activities.
Vulnerability Details
CVE-ID: CVE-2025-60570
Affected Software: D-Link Multiple Products
Affected Versions: D-Link DIR-600L Ax firmware version 1.16WWb01. See vendor advisory for a complete list of affected products and versions.
Vulnerability: This vulnerability is a classic buffer overflow that exists in the
formLogDnsqueryfunction. An attacker can exploit this by sending a request containing an overly long string in thecurTimeparameter. The function does not properly validate the length of this input, causing it to write data beyond the boundaries of the allocated memory buffer, which can overwrite adjacent memory structures. A successful exploit could lead to arbitrary code execution with the privileges of the device's firmware, or it could cause a denial-of-service condition by crashing the device.Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation could allow an unauthenticated attacker to execute arbitrary code on the affected D-Link device, leading to a complete system compromise. The potential business impact includes the interception of sensitive network traffic, unauthorized access to the internal network, and the use of the compromised device as a pivot point for further attacks or as part of a botnet. This poses a significant risk to data confidentiality, network integrity, and business continuity.
Remediation Plan
Immediate Action: Apply the security updates released by D-Link to all affected devices without delay. After patching, it is critical to monitor for any signs of exploitation attempts and thoroughly review system and access logs for suspicious activity that may have occurred prior to the patch application.
Proactive Monitoring: Security teams should monitor for unusual traffic patterns or malformed requests directed at the device's web management interface, specifically targeting the
formLogDnsqueryfunction or containing an abnormally longcurTimeparameter. Implement IDS/IPS signatures designed to detect buffer overflow attempts. Review device logs for unexpected reboots, crashes, or error messages which could indicate failed exploitation attempts.Compensating Controls: If immediate patching is not feasible, restrict access to the device's management interface to a trusted internal network or specific administrative IP addresses. Disable remote (WAN) administration unless it is absolutely essential. Consider placing the device behind a Web Application Firewall (WAF) or an Intrusion Prevention System (IPS) that can inspect and block malicious requests targeting this vulnerability.
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of the publication date, October 24, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, vulnerabilities in widely deployed SOHO/SME router products like those from D-Link are frequently targeted by threat actors. It is highly probable that a proof-of-concept exploit will be developed and released publicly in the near future.
Analyst Recommendation
Given the high severity (CVSS 7.5) of this vulnerability and the potential for a complete device compromise, organizations must prioritize the immediate patching of all affected D-Link devices. While this CVE is not currently listed on the CISA KEV catalog, its nature as a buffer overflow makes it an attractive and reliable target for attackers. Organizations should treat this as a critical priority and implement the recommended remediation and monitoring actions to prevent a potential network breach.