CVE Feeds
Latest Critical CVEs
Updates on the latest high and critical severity vulnerabilities.
-
CVE-2025-13191 - D-Link DIR-816L soap.cgi soapcgi_main stack-based overflow
CVE ID :CVE-2025-13191
Published : Nov. 15, 2025, 7:15 a.m. | 2 hours, 3 minutes ago
Description :A vulnerability was determined in D-Link DIR-816L 2_06_b09_beta. This issue affects the function soapcgi_main of the file /soap.cgi. This manipulation causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-13190 - D-Link DIR-816L __ajax_exporer.sgi scandir_main stack-based overflow
CVE ID :CVE-2025-13190
Published : Nov. 15, 2025, 7:15 a.m. | 2 hours, 3 minutes ago
Description :A vulnerability was found in D-Link DIR-816L 2_06_b09_beta. This vulnerability affects the function scandir_main of the file /portal/__ajax_exporer.sgi. The manipulation of the argument en results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-13189 - D-Link DIR-816L gena.cgi genacgi_main stack-based overflow
CVE ID :CVE-2025-13189
Published : Nov. 15, 2025, 6:15 a.m. | 3 hours, 3 minutes ago
Description :A vulnerability has been found in D-Link DIR-816L 2_06_b09_beta. This affects the function genacgi_main of the file gena.cgi. The manipulation of the argument SERVER_ID/HTTP_SID leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-9317 - AVEVA Edge Use of a Broken or Risky Cryptographic Algorithm
CVE ID :CVE-2025-9317
Published : Nov. 15, 2025, 12:15 a.m. | 9 hours, 3 minutes ago
Description :The vulnerability, if exploited, could allow a miscreant with read access to Edge Project files or Edge Offline Cache files to reverse engineer Edge users' app-native or Active Directory passwords through computational brute-forcing of weak hashes.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-64309 - Brightpick Mission Control / Internal Logic Control Unprotected Transport of Credentials
CVE ID :CVE-2025-64309
Published : Nov. 15, 2025, 12:15 a.m. | 9 hours, 3 minutes ago
Description :Brightpick Mission Control discloses device telemetry, configuration, and credential information via WebSocket traffic to unauthenticated users when they connect to a specific URL. The unauthenticated URL can be discovered through basic network scanning techniques.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-58083 - General Industrial Controls Lynx+ Gateway Missing Authentication for Critical Function
CVE ID :CVE-2025-58083
Published : Nov. 15, 2025, 12:15 a.m. | 9 hours, 3 minutes ago
Description :General Industrial Controls Lynx+ Gateway is missing critical authentication in the embedded web server which could allow an attacker to remotely reset the device.
Severity: 10.0 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-55034 - General Industrial Controls Lynx+ Gateway Weak Password Requirements
CVE ID :CVE-2025-55034
Published : Nov. 15, 2025, 12:15 a.m. | 9 hours, 3 minutes ago
Description :General Industrial Controls Lynx+ Gateway is vulnerable to a weak password requirement vulnerability, which may allow an attacker to execute a brute-force attack resulting in unauthorized access and login.
Severity: 8.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-13188 - D-Link DIR-816L authentication.cgi authenticationcgi_main stack-based overflow
CVE ID :CVE-2025-13188
Published : Nov. 14, 2025, 11:15 p.m. | 10 hours, 3 minutes ago
Description :A vulnerability was detected in D-Link DIR-816L 2_06_b09_beta. Affected by this vulnerability is the function authenticationcgi_main of the file /authentication.cgi. Performing manipulation of the argument Password results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Severity: 10.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2022-4985 - Vodafone H500s WiFi Password Disclosure via activation.json
CVE ID :CVE-2022-4985
Published : Nov. 14, 2025, 11:15 p.m. | 10 hours, 3 minutes ago
Description :Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2021-4471 - TG8 Firewall Unauthenticated User Password Disclosure
CVE ID :CVE-2021-4471
Published : Nov. 14, 2025, 11:15 p.m. | 10 hours, 3 minutes ago
Description :TG8 Firewall exposes a directory such as /data/ over HTTP without authentication. This directory stores credential files for previously logged-in users. A remote unauthenticated attacker can enumerate and download files within the directory to obtain valid account usernames and passwords, leading to loss of confidentiality and further unauthorized access.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2021-4470 - TG8 Firewall Unauthenticated RCE via runphpcmd.php
CVE ID :CVE-2021-4470
Published : Nov. 14, 2025, 11:15 p.m. | 10 hours, 3 minutes ago
Description :TG8 Firewall contains a pre-authentication remote code execution vulnerability in the runphpcmd.php endpoint. The syscmd POST parameter is passed directly to a system command without validation and executed with root privileges. A remote, unauthenticated attacker can supply crafted values to execute arbitrary operating system commands as root, resulting in full device compromise.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2021-4469 - Denver SHO-110 IP Camera Unauthenticated Snapshot Access
CVE ID :CVE-2021-4469
Published : Nov. 14, 2025, 11:15 p.m. | 10 hours, 3 minutes ago
Description :Denver SHO-110 IP cameras expose a secondary HTTP service on TCP port 8001 that provides access to a '/snapshot' endpoint without authentication. While the primary web interface on port 80 enforces authentication, the backdoor service allows any remote attacker to retrieve image snapshots by directly requesting the 'snapshot' endpoint. An attacker can repeatedly collect snapshots and reconstruct the camera stream, compromising the confidentiality of the monitored environment.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2021-4468 - PLANEX CS-QP50F-ING2 Smart Camera Remote Configuration Disclosure
CVE ID :CVE-2021-4468
Published : Nov. 14, 2025, 11:15 p.m. | 10 hours, 3 minutes ago
Description :PLANEX CS-QP50F-ING2 smart cameras expose a configuration backup interface over HTTP that does not require authentication. A remote, unauthenticated attacker can directly retrieve a compressed configuration backup file from the device. The backup contains sensitive configuration information, including credentials, allowing an attacker to obtain administrative access to the camera and compromise the confidentiality of the monitored environment.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2021-4467 - Positive Technologies MaxPatrol 8 & XSpider Remote DoS
CVE ID :CVE-2021-4467
Published : Nov. 14, 2025, 11:15 p.m. | 10 hours, 3 minutes ago
Description :Positive Technologies MaxPatrol 8 and XSpider contain a remote denial-of-service vulnerability in the client communication service on TCP port 2002. The service generates a new session identifier for each incoming connection without adequately limiting concurrent requests. An unauthenticated remote attacker can repeatedly issue HTTPS requests to the service, causing excessive allocation of session identifiers. Under load, session identifier collisions may occur, forcing active client sessions to disconnect and resulting in service disruption.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2021-4466 - IPCop RCE
CVE ID :CVE-2021-4466
Published : Nov. 14, 2025, 11:15 p.m. | 10 hours, 3 minutes ago
Description :IPCop versions up to and including 2.1.9 contain an authenticated remote code execution vulnerability within the web-based administration interface. The email configuration component inserts user-controlled values, including the EMAIL_PW parameter, directly into system-level operations without proper input sanitation. By modifying the email password field to include shell metacharacters and issuing a save-and-test-mail action, an authenticated attacker can execute arbitrary operating system commands with the privileges of the web interface, resulting in full system compromise.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2021-4465 - ReQuest Serious Play F3 Media Server
CVE ID :CVE-2021-4465
Published : Nov. 14, 2025, 11:15 p.m. | 10 hours, 3 minutes ago
Description :ReQuest Serious Play F3 Media Server versions 7.0.3.4968 (Pro), 7.0.2.4954, 6.5.2.4954, 6.4.2.4681, 6.3.2.4203, and 2.0.1.823 contain a remote denial-of-service vulnerability. The device can be shut down or rebooted by an unauthenticated attacker through a single crafted HTTP GET request, allowing remote interruption of service availability.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2018-25125 - Netis DL4322D RTK 2.1.1 FTP Service DoS
CVE ID :CVE-2018-25125
Published : Nov. 14, 2025, 11:15 p.m. | 10 hours, 3 minutes ago
Description :Netis ADSL Router DL4322D firmware RTK 2.1.1 contains a buffer overflow vulnerability in the embedded FTP service that allows an authenticated remote user to trigger a denial of service. After logging in to the FTP service, sending an FTP command such as ABOR with an excessively long argument causes the service, and in practice the router, to crash or become unresponsive, resulting in a loss of availability for the device and connected users.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2016-15056 - Ubee EVW3226 Unauthenticated Backup File Disclosure
CVE ID :CVE-2016-15056
Published : Nov. 14, 2025, 11:15 p.m. | 10 hours, 3 minutes ago
Description :Ubee EVW3226 cable modem/routers firmware versions up to and including 1.0.20 store configuration backup files in the web root after they are generated for download. These backup files remain accessible without authentication until the next reboot. A remote attacker on the local network can request 'Configuration_file.cfg' directly to obtain the backup archive. Because backup files are not encrypted, they expose sensitive information including the plaintext admin password, allowing full compromise of the device.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-63680 - Nero BackItUp ShellExecuteW Path Traversal Vulnerability
CVE ID :CVE-2025-63680
Published : Nov. 14, 2025, 7:16 p.m. | 14 hours, 3 minutes ago
Description :Nero BackItUp in the Nero Productline is vulnerable to a path parsing/UI rendering flaw (CWE-22) that, in combination with Windows ShellExecuteW fallback extension resolution, leads to arbitrary code execution when a user clicks a crafted entry. By creating a trailing-dot folder and placing a same-basename script, Nero BackItUp renders the file as a folder icon and then invokes ShellExecuteW, which executes the script via PATHEXT fallback (.COM/.EXE/.BAT/.CMD). The issue affects recent Nero BackItUp product lines (2019-2025 and earlier) and has been acknowledged by the vendor.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-54343 - Desktop Alert PingAlert Remote Escalation of Privileges Access Control Vulnerability
CVE ID :CVE-2025-54343
Published : Nov. 14, 2025, 6:15 p.m. | 15 hours, 3 minutes ago
Description :An Incorrect Access Control vulnerability was found in the Application Server of Desktop Alert PingAlert version 6.1.0.11 to 6.1.1.2 exploitable remotely for Escalation of Privileges.
Severity: 9.6 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Information
Vortech Consulting is a network security and design consulting firm originally founded in 1997. Over our nearly 30 year history we have provided security services and products for a wide variety of companies around the globe.
Company
Who's Online
We have 50846 guests and no members online