##
Updated at UTC 2025-07-06T23:13:28.206080
CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
---|---|---|---|---|---|---|---|
CVE-2025-7096 | 8.1 | 0.00% | 2 | 0 | 2025-07-06T22:15:25.067000 | A vulnerability classified as critical was found in Comodo Internet Security Pre | |
CVE-2025-5333 | 0 | 0.00% | 2 | 0 | 2025-07-06T14:15:27.573000 | Remote attackers can execute arbitrary code in the context of the vulnerable ser | |
CVE-2025-7079 | 3.7 | 0.00% | 4 | 0 | 2025-07-06T13:15:35.413000 | A vulnerability, which was classified as problematic, has been found in mao888 b | |
CVE-2025-7077 | 8.8 | 0.04% | 1 | 0 | 2025-07-06T07:15:35.383000 | A vulnerability classified as critical has been found in Shenzhen Libituo Techno | |
CVE-2025-27446 | 0 | 0.01% | 3 | 0 | 2025-07-06T06:15:21.587000 | Incorrect Permission Assignment for Critical Resource vulnerability in Apache AP | |
CVE-2025-53603 | 7.5 | 0.04% | 1 | 0 | 2025-07-05T01:15:27.360000 | In Alinto SOPE SOGo 2.0.2 through 5.12.2, sope-core/NGExtensions/NGHashMap.m all | |
CVE-2025-53366 | 0 | 0.04% | 1 | 0 | 2025-07-04T22:15:22.300000 | The MCP Python SDK, called `mcp` on PyPI, is a Python implementation of the Mode | |
CVE-2025-49809 | 7.8 | 0.01% | 1 | 0 | 2025-07-04T13:15:25.780000 | mtr through 0.95, in certain privileged contexts, mishandles execution of a prog | |
CVE-2025-52833 | 9.3 | 0.03% | 1 | 0 | 2025-07-04T12:30:38 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
CVE-2025-52831 | 9.3 | 0.03% | 1 | 0 | 2025-07-04T12:30:38 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
CVE-2025-52832 | 9.3 | 0.03% | 1 | 0 | 2025-07-04T12:30:37 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
CVE-2025-52830 | 9.3 | 0.03% | 1 | 0 | 2025-07-04T12:30:37 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
CVE-2025-49417 | 9.8 | 0.04% | 1 | 0 | 2025-07-04T12:30:33 | Deserialization of Untrusted Data vulnerability in BestWpDeveloper WooCommerce P | |
CVE-2025-49414 | 10.0 | 0.04% | 1 | 0 | 2025-07-04T12:30:33 | Unrestricted Upload of File with Dangerous Type vulnerability in Fastw3b LLC FW | |
CVE-2025-49867 | 9.8 | 0.04% | 1 | 0 | 2025-07-04T12:30:33 | Incorrect Privilege Assignment vulnerability in InspiryThemes RealHomes allows P | |
CVE-2025-28983 | 9.8 | 0.03% | 1 | 0 | 2025-07-04T12:30:33 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
CVE-2025-49302 | 10.0 | 0.05% | 1 | 0 | 2025-07-04T12:30:32 | Improper Control of Generation of Code ('Code Injection') vulnerability in Scott | |
CVE-2025-30933 | 10.0 | 0.04% | 1 | 0 | 2025-07-04T12:30:32 | Unrestricted Upload of File with Dangerous Type vulnerability in LiquidThemes Lo | |
CVE-2025-23970 | 9.8 | 0.04% | 1 | 0 | 2025-07-04T12:30:24 | Incorrect Privilege Assignment vulnerability in aonetheme Service Finder Booking | |
CVE-2025-5372 | 5.0 | 0.04% | 1 | 0 | 2025-07-04T06:30:28 | A flaw was found in libssh versions built with OpenSSL versions older than 3.0, | |
CVE-2025-49826 | 7.5 | 0.01% | 1 | 0 | 2025-07-03T22:15:21.010000 | Next.js is a React framework for building full-stack web applications. From vers | |
CVE-2025-43713 | 6.5 | 0.07% | 1 | 0 | 2025-07-03T15:31:21 | ASNA Assist and ASNA Registrar before 2025-03-31 allow deserialization attacks a | |
CVE-2025-49618 | 5.8 | 0.03% | 1 | 0 | 2025-07-03T15:31:20 | In Plesk Obsidian 18.0.69, unauthenticated requests to /login_up.php can reveal | |
CVE-2025-32463 | 9.3 | 0.01% | 17 | 26 | 2025-07-03T15:14:12.767000 | Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswi | |
CVE-2025-4689 | 9.8 | 0.15% | 1 | 0 | 2025-07-03T15:14:12.767000 | The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for Word | |
CVE-2025-53107 | 7.5 | 0.13% | 1 | 0 | 2025-07-03T15:14:12.767000 | @cyanheads/git-mcp-server is an MCP server designed to interact with Git reposit | |
CVE-2025-53100 | 0 | 0.69% | 1 | 0 | 2025-07-03T15:14:12.767000 | RestDB's Codehooks.io MCP Server is an MCP server on the Codehooks.io platform. | |
CVE-2025-37097 | 7.5 | 0.04% | 1 | 0 | 2025-07-03T15:14:12.767000 | A vulnerability in HPE Insight Remote Support (IRS) prior to v7.15.0.646 may all | |
CVE-2025-34060 | 0 | 0.19% | 1 | 0 | 2025-07-03T15:14:12.767000 | A PHP objection injection vulnerability exists in the Monero Project’s Laravel-b | |
CVE-2025-49490 | 5.4 | 0.04% | 1 | 0 | 2025-07-03T15:14:12.767000 | Resource leak vulnerability in ASR180x in router allows Resource Leak Exposure. | |
CVE-2025-49483 | 5.4 | 0.04% | 1 | 0 | 2025-07-03T15:14:12.767000 | Improper Resource Shutdown or Release vulnerability in ASR180x 、ASR190x in tr069 | |
CVE-2025-49491 | 5.4 | 0.04% | 1 | 0 | 2025-07-03T15:14:12.767000 | Improper Resource Shutdown or Release vulnerability in ASR Falcon_Linux、Kestrel、 | |
CVE-2025-49521 | 8.8 | 0.09% | 1 | 0 | 2025-07-03T15:14:12.767000 | A flaw was found in the EDA component of the Ansible Automation Platform, where | |
CVE-2025-53110 | 0 | 0.06% | 2 | 0 | 2025-07-03T15:13:53.147000 | Model Context Protocol Servers is a collection of reference implementations for | |
CVE-2025-20310 | 6.1 | 0.04% | 1 | 0 | 2025-07-03T15:13:53.147000 | A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could all | |
CVE-2025-34072 | 0 | 0.08% | 1 | 0 | 2025-07-03T15:13:53.147000 | A data exfiltration vulnerability exists in Anthropic’s deprecated Slack Model C | |
CVE-2025-24329 | 6.4 | 0.02% | 1 | 0 | 2025-07-03T15:13:53.147000 | Sending a crafted SOAP "provision" operation message archive field within the Mo | |
CVE-2025-24335 | 2.0 | 0.02% | 1 | 0 | 2025-07-03T15:13:53.147000 | Nokia Single RAN baseband software versions earlier than 24R1-SR 2.1 MP contain | |
CVE-2025-24331 | 6.4 | 0.01% | 1 | 0 | 2025-07-03T15:13:53.147000 | The Single RAN baseband OAM service is intended to run as an unprivileged servic | |
CVE-2025-27025 | 8.8 | 0.36% | 1 | 0 | 2025-07-03T15:13:53.147000 | The target device exposes a service on a specific TCP port with a configured en | |
CVE-2025-1708 | 8.6 | 0.04% | 1 | 0 | 2025-07-03T12:35:09 | The application is vulnerable to SQL injection attacks. An attacker is able to d | |
CVE-2025-53109 | None | 0.06% | 2 | 0 | 2025-07-02T18:56:41 | Versions of Filesystem prior to 0.6.3 & 2025.7.1 could allow access to unintende | |
CVE-2025-53106 | None | 0.04% | 1 | 0 | 2025-07-02T18:55:46 | ### Impact Graylog users can gain elevated privileges by creating and using API | |
CVE-2025-20309 | 10.0 | 0.13% | 9 | 0 | 2025-07-02T18:30:42 | A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco U | |
CVE-2025-20307 | 4.8 | 0.03% | 1 | 0 | 2025-07-02T18:30:42 | A vulnerability in the web-based management interface of Cisco BroadWorks Applic | |
CVE-2025-20308 | 6.0 | 0.02% | 1 | 0 | 2025-07-02T18:30:42 | A vulnerability in Cisco Spaces Connector could allow an authenticated, local at | |
CVE-2025-48928 | 4.0 | 8.89% | 3 | 0 | 2025-07-02T17:55:06.963000 | The TeleMessage service through 2025-05-05 is based on a JSP application in whic | |
CVE-2025-24333 | 6.4 | 0.02% | 1 | 0 | 2025-07-02T15:31:43 | Nokia Single RAN baseband software earlier than 24R1-SR 1.0 MP contains administ | |
CVE-2025-24332 | 7.1 | 0.02% | 1 | 0 | 2025-07-02T15:31:43 | Nokia Single RAN AirScale baseband allows an authenticated administrative user a | |
CVE-2025-24334 | 3.3 | 0.01% | 1 | 0 | 2025-07-02T15:31:43 | The Nokia Single RAN baseband software earlier than 23R2-SR 1.0 MP can be made t | |
CVE-2025-27021 | 7.0 | 0.01% | 1 | 0 | 2025-07-02T15:31:43 | The misconfiguration in the sudoers configuration of the operating system in In | |
CVE-2025-24330 | 6.4 | 0.02% | 1 | 0 | 2025-07-02T15:31:42 | Sending a crafted SOAP "provision" operation message PlanId field within the Mob | |
CVE-2025-24328 | 4.2 | 0.01% | 1 | 0 | 2025-07-02T15:31:37 | Sending a crafted SOAP "set" operation message within the Mobile Network Operato | |
CVE-2025-34067 | None | 0.38% | 2 | 0 | 2025-07-02T15:30:44 | An unauthenticated remote command execution vulnerability exists in the applyCT | |
CVE-2025-34071 | None | 0.28% | 1 | 0 | 2025-07-02T15:30:44 | A remote code execution vulnerability in GFI Kerio Control 9.4.5 allows attacker | |
CVE-2025-34069 | None | 0.14% | 1 | 0 | 2025-07-02T15:30:44 | An authentication bypass vulnerability exists in GFI Kerio Control 9.4.5 due to | |
CVE-2025-34070 | None | 0.12% | 1 | 0 | 2025-07-02T15:30:37 | A missing authentication vulnerability in the GFIAgent component of GFI Kerio Co | |
CVE-2025-48379 | 7.1 | 0.01% | 1 | 0 | 2025-07-02T14:20:25 | There is a heap buffer overflow when writing a sufficiently large (>64k encoded | |
CVE-2025-27022 | 7.5 | 0.06% | 1 | 0 | 2025-07-02T12:33:13 | Path traversal in WebGUI HTTP endpoint in Infinera G42 version R6.1.3 allows re | |
CVE-2025-4679 | 6.5 | 0.05% | 1 | 0 | 2025-07-02T12:33:13 | A vulnerability in Synology Active Backup for Microsoft 365 allows remote authen | |
CVE-2025-27024 | 6.5 | 0.04% | 1 | 0 | 2025-07-02T12:32:17 | Unrestricted access to OS file system in SFTP service in Infinera G42 version R | |
CVE-2025-27023 | 6.5 | 0.07% | 1 | 0 | 2025-07-02T12:32:17 | Lack or insufficent input validation in WebGUI CLI web in Infinera G42 version | |
CVE-2024-13786 | 9.8 | 0.11% | 1 | 0 | 2025-07-02T09:30:34 | The education theme for WordPress is vulnerable to PHP Object Injection in all v | |
CVE-2025-6463 | 8.8 | 0.14% | 4 | 0 | 2025-07-02T06:30:42 | The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin f | |
CVE-2025-37099 | 9.8 | 0.18% | 1 | 0 | 2025-07-01T18:30:47 | A remote code execution vulnerability exists in HPE Insight Remote Support (IRS) | |
CVE-2025-6543 | 9.8 | 16.12% | 4 | 3 | 2025-07-01T18:19:45.547000 | Memory overflow vulnerability leading to unintended control flow and Denial of S | |
CVE-2025-47176 | 7.8 | 0.06% | 3 | 0 | 2025-07-01T16:50:53.030000 | '.../...//' in Microsoft Office Outlook allows an authorized attacker to execute | |
CVE-2025-6897 | 5.5 | 0.23% | 1 | 0 | 2025-07-01T16:30:28.957000 | A vulnerability classified as critical was found in D-Link DI-7300G+ 19.12.25A1. | |
CVE-2025-6554 | 8.1 | 6.66% | 24 | 3 | 2025-07-01T15:32:11 | Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote at | |
CVE-2025-34064 | None | 0.04% | 1 | 0 | 2025-07-01T15:31:16 | A cloud infrastructure misconfiguration in OneLogin AD Connector results in log | |
CVE-2025-37098 | 7.5 | 0.04% | 1 | 0 | 2025-07-01T15:31:16 | A path traversal vulnerability exists in HPE Insight Remote Support (IRS) prior | |
CVE-2025-34063 | None | 0.10% | 1 | 0 | 2025-07-01T15:31:10 | A cryptographic authentication bypass vulnerability exists in OneLogin AD Connec | |
CVE-2025-49480 | 7.4 | 0.04% | 1 | 0 | 2025-07-01T12:31:05 | Out-of-bounds access in ASR180x 、ASR190x in lte-telephony, This vulnerability | |
CVE-2025-49481 | 5.4 | 0.04% | 1 | 0 | 2025-07-01T12:31:05 | Improper Resource Shutdown or Release vulnerability in ASR180x 、ASR190x in route | |
CVE-2025-49488 | 5.4 | 0.04% | 1 | 0 | 2025-07-01T12:31:05 | Improper Resource Shutdown or Release vulnerability in ASR180x 、ASR190x in route | |
CVE-2025-49492 | 7.4 | 0.04% | 1 | 0 | 2025-07-01T12:31:05 | Out-of-bounds write in ASR180x in lte-telephony, May cause a buffer underrun. | |
CVE-2025-49482 | 5.4 | 0.04% | 1 | 0 | 2025-07-01T12:31:05 | Improper Resource Shutdown or Release vulnerability in ASR180x 、ASR190x in tr069 | |
CVE-2025-49489 | 5.4 | 0.04% | 1 | 0 | 2025-07-01T12:31:05 | Improper Resource Shutdown or Release vulnerability in ASR Falcon_Linux、Kestrel、 | |
CVE-2025-5072 | 5.4 | 0.04% | 1 | 0 | 2025-07-01T09:30:40 | Resource leak vulnerability in ASR180x、ASR190x in con_mgr allows Resource Leak E | |
CVE-2025-41656 | 10.0 | 0.14% | 1 | 0 | 2025-07-01T09:30:40 | An unauthenticated remote attacker can run arbitrary commands on the affected de | |
CVE-2025-41648 | 9.8 | 0.06% | 1 | 0 | 2025-07-01T09:30:40 | An unauthenticated remote attacker can bypass the login to the web application o | |
CVE-2025-6824 | 8.8 | 0.17% | 1 | 0 | 2025-07-01T03:31:37 | A vulnerability classified as critical has been found in TOTOLINK X15 up to 1.0. | |
CVE-2025-49520 | 8.8 | 0.09% | 1 | 0 | 2025-07-01T03:31:36 | A flaw was found in Ansible Automation Platform’s EDA component where user-suppl | |
CVE-2025-26074 | 9.8 | 0.15% | 1 | 0 | 2025-06-30T22:16:54 | Orkes Conductor v3.21.11 allows remote attackers to execute arbitrary OS command | |
CVE-2025-32462 | 2.8 | 0.02% | 11 | 7 | 2025-06-30T21:30:54 | Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that i | |
CVE-2025-6916 | 8.8 | 0.07% | 1 | 1 | 2025-06-30T21:15:32.730000 | A vulnerability, which was classified as critical, was found in TOTOLINK T6 4.1. | |
CVE-2025-45931 | 9.8 | 0.35% | 1 | 0 | 2025-06-30T19:15:24.117000 | An issue D-Link DIR-816-A2 DIR-816A2_FWv1.10CNB05_R1B011D88210 allows a remote a | |
CVE-2025-47824 | 2.0 | 0.01% | 1 | 0 | 2025-06-30T18:38:48.477000 | Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have c | |
CVE-2025-6881 | 8.8 | 0.05% | 1 | 0 | 2025-06-30T18:38:23.493000 | A vulnerability was found in D-Link DI-8100 16.07.21. It has been rated as criti | |
CVE-2025-6825 | 8.8 | 0.16% | 1 | 0 | 2025-06-30T18:38:23.493000 | A vulnerability classified as critical was found in TOTOLINK A702R up to 4.0.0-B | |
CVE-2025-6522 | 5.4 | 0.04% | 1 | 0 | 2025-06-30T18:38:23.493000 | Unauthenticated users on an adjacent network with the Sight Bulb Pro can run sh | |
CVE-2025-53391 | 9.3 | 0.01% | 1 | 0 | 2025-06-30T18:38:23.493000 | The Debian zuluPolkit/CMakeLists.txt file for zuluCrypt through the zulucrypt_6. | |
CVE-2025-24290 | 9.9 | 0.04% | 1 | 0 | 2025-06-30T15:30:38 | Multiple Authenticated SQL Injection vulnerabilities found in UISP Application ( | |
CVE-2025-6899 | 6.3 | 0.84% | 1 | 0 | 2025-06-30T09:30:35 | A vulnerability, which was classified as critical, was found in D-Link DI-7300G+ | |
CVE-2025-6898 | 6.3 | 0.84% | 1 | 0 | 2025-06-30T09:30:30 | A vulnerability, which was classified as critical, has been found in D-Link DI-7 | |
CVE-2025-6896 | 6.3 | 0.84% | 1 | 0 | 2025-06-30T09:30:30 | A vulnerability classified as critical has been found in D-Link DI-7300G+ 19.12. | |
CVE-2025-6887 | 8.8 | 0.08% | 1 | 0 | 2025-06-30T06:30:33 | A vulnerability was found in Tenda AC5 15.03.06.47 and classified as critical. A | |
CVE-2025-6886 | 8.8 | 0.08% | 2 | 0 | 2025-06-30T06:30:33 | A vulnerability has been found in Tenda AC5 15.03.06.47 and classified as critic | |
CVE-2025-6882 | 8.8 | 0.05% | 1 | 0 | 2025-06-30T03:30:39 | A vulnerability classified as critical has been found in D-Link DIR-513 1.0. Thi | |
CVE-2025-45729 | 6.3 | 0.07% | 1 | 0 | 2025-06-27T21:31:30 | D-Link DIR-823-Pro 1.02 has improper permission control, allowing unauthorized u | |
CVE-2025-6620 | 6.3 | 2.28% | 1 | 0 | 2025-06-27T18:31:47 | A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been rated as c | |
CVE-2025-6618 | 6.3 | 2.28% | 1 | 0 | 2025-06-27T18:31:47 | A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been classified | |
CVE-2025-6621 | 6.3 | 2.28% | 1 | 0 | 2025-06-27T18:31:47 | A vulnerability classified as critical has been found in TOTOLINK CA300-PoE 6.2c | |
CVE-2025-6619 | 6.3 | 2.28% | 1 | 0 | 2025-06-27T18:31:47 | A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been declared a | |
CVE-2025-6568 | 8.8 | 0.17% | 1 | 0 | 2025-06-27T18:30:43 | A vulnerability classified as critical has been found in TOTOLINK EX1200T 4.1.2c | |
CVE-2025-6705 | None | 0.05% | 1 | 0 | 2025-06-27T15:31:41 | On open-vsx.org http://open-vsx.org/ it was possible to run an arbitrary build | |
CVE-2024-51978 | 9.8 | 2.68% | 1 | 1 | template | 2025-06-27T14:15:32.593000 | An unauthenticated attacker who knows the target device's serial number, can gen |
CVE-2024-54085 | 9.8 | 9.47% | 1 | 1 | 2025-06-27T12:32:19 | AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authe | |
CVE-2025-6752 | 8.8 | 0.09% | 1 | 0 | 2025-06-27T06:31:22 | A vulnerability has been found in Linksys WRT1900ACS, EA7200, EA7450 and EA7500 | |
CVE-2025-6751 | 8.8 | 0.09% | 1 | 0 | 2025-06-27T06:31:22 | A vulnerability, which was classified as critical, was found in Linksys E8450 up | |
CVE-2025-47819 | 6.4 | 0.02% | 1 | 0 | 2025-06-27T03:30:47 | Flock Safety Gunshot Detection devices before 1.3 have an on-chip debug interfac | |
CVE-2025-47821 | 2.2 | 0.02% | 1 | 0 | 2025-06-27T03:30:47 | Flock Safety Gunshot Detection devices before 1.3 have a hardcoded password for | |
CVE-2025-47822 | 6.4 | 0.02% | 1 | 0 | 2025-06-27T03:30:47 | Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have a | |
CVE-2025-47823 | 2.2 | 0.02% | 1 | 0 | 2025-06-27T03:30:47 | Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have a | |
CVE-2025-47818 | 2.2 | 0.02% | 1 | 0 | 2025-06-27T03:30:41 | Flock Safety Gunshot Detection devices before 1.3 have a hard-coded password for | |
CVE-2025-6734 | 8.8 | 0.05% | 1 | 0 | 2025-06-27T00:32:15 | A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been rate | |
CVE-2025-6732 | 8.8 | 0.05% | 1 | 0 | 2025-06-27T00:32:15 | A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been clas | |
CVE-2025-6627 | 8.8 | 0.16% | 1 | 0 | 2025-06-26T21:31:22 | A vulnerability has been found in TOTOLINK A702R 4.0.0-B20230721.1521 and classi | |
CVE-2025-6616 | 8.8 | 0.09% | 1 | 0 | 2025-06-26T21:31:21 | A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as crit | |
CVE-2025-6614 | 8.8 | 0.09% | 1 | 0 | 2025-06-26T21:31:20 | A vulnerability, which was classified as critical, has been found in D-Link DIR- | |
CVE-2025-20281 | 9.8 | 0.14% | 1 | 4 | 2025-06-26T21:31:20 | A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an | |
CVE-2025-6615 | 8.8 | 0.09% | 1 | 0 | 2025-06-26T21:31:13 | A vulnerability, which was classified as critical, was found in D-Link DIR-619L | |
CVE-2025-20282 | 10.0 | 0.14% | 1 | 0 | 2025-06-26T21:31:13 | A vulnerability in an internal API of Cisco ISE and Cisco ISE-PIC could allow an | |
CVE-2025-32977 | 9.7 | 0.02% | 1 | 0 | 2025-06-26T21:31:13 | Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef | |
CVE-2025-6565 | 8.8 | 0.19% | 1 | 0 | 2025-06-26T21:31:09 | A vulnerability was found in Netgear WNCE3001 1.0.0.50. It has been classified a | |
CVE-2025-36537 | 7.0 | 0.01% | 1 | 0 | 2025-06-26T21:31:09 | Incorrect Permission Assignment for Critical Resource in the TeamViewer Client ( | |
CVE-2025-32976 | 8.8 | 0.10% | 1 | 0 | 2025-06-26T21:31:09 | Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef | |
CVE-2025-34037 | None | 2.46% | 1 | 0 | 2025-06-26T21:31:08 | An OS command injection vulnerability exists in various models of E-Series Links | |
CVE-2025-6559 | 9.8 | 0.62% | 1 | 0 | 2025-06-26T21:31:08 | Multiple wireless router models from Sapido have an OS Command Injection vulnera | |
CVE-2025-32975 | 10.0 | 0.12% | 1 | 0 | 2025-06-26T21:31:08 | Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef | |
CVE-2025-34034 | None | 0.05% | 1 | 0 | 2025-06-26T21:31:08 | A hardcoded credential vulnerability exists in the Blue Angel Software Suite dep | |
CVE-2025-34041 | None | 1.03% | 1 | 0 | 2025-06-26T21:31:08 | An OS command injection vulnerability exists in the Chinese versions of Sangfor | |
CVE-2025-6560 | 9.8 | 0.11% | 1 | 0 | 2025-06-26T18:58:14.280000 | Multiple wireless router models from Sapido have an Exposure of Sensitive Inform | |
CVE-2025-48469 | 9.6 | 0.04% | 1 | 0 | 2025-06-26T18:58:14.280000 | Successful exploitation of the vulnerability could allow an unauthenticated atta | |
CVE-2025-52570 | 0 | 0.06% | 1 | 0 | 2025-06-26T18:58:14.280000 | Letmein is an authenticating port knocker. Prior to version 10.2.1, The connecti | |
CVE-2025-52562 | 10.0 | 1.48% | 1 | 0 | 2025-06-26T18:58:14.280000 | Convoy is a KVM server management panel for hosting businesses. In versions 3.9. | |
CVE-2025-32978 | 7.5 | 0.06% | 1 | 0 | 2025-06-26T18:58:14.280000 | Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef | |
CVE-2025-34049 | 0 | 0.63% | 1 | 0 | 2025-06-26T18:57:43.670000 | An OS command injection vulnerability exists in the OptiLink ONT1GEW GPON router | |
CVE-2025-34042 | 0 | 0.66% | 1 | 0 | 2025-06-26T18:57:43.670000 | An authenticated command injection vulnerability exists in the Beward N100 IP Ca | |
CVE-2025-6617 | 8.8 | 0.09% | 1 | 0 | 2025-06-26T18:57:43.670000 | A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. | |
CVE-2025-36038 | 9.0 | 0.24% | 1 | 0 | 2025-06-26T18:57:43.670000 | IBM WebSphere Application Server 8.5 and 9.0 could allow a remote attacker to ex | |
CVE-2024-6174 | 8.8 | 0.02% | 1 | 0 | 2025-06-26T18:57:43.670000 | When a non-x86 platform is detected, cloud-init grants root access to a hardcode | |
CVE-2025-34043 | None | 0.40% | 1 | 0 | 2025-06-26T18:31:35 | A remote command injection vulnerability exists in Vacron Network Video Recorder | |
CVE-2025-34044 | None | 0.12% | 1 | 0 | 2025-06-26T18:31:34 | A remote command injection vulnerability exists in the confirm.php interface of | |
CVE-2025-34048 | None | 0.26% | 1 | 0 | 2025-06-26T18:31:34 | A path traversal vulnerability exists in the web management interface of D-Link | |
CVE-2025-6400 | 8.8 | 0.17% | 1 | 0 | 2025-06-25T20:13:52.420000 | A vulnerability was found in TOTOLINK N300RH 6.1c.1390_B20191101 and classified | |
CVE-2025-6399 | 8.8 | 0.17% | 1 | 0 | 2025-06-25T20:13:30.100000 | A vulnerability, which was classified as critical, was found in TOTOLINK X15 1.0 | |
CVE-2025-6372 | 8.8 | 0.03% | 1 | 0 | 2025-06-25T20:09:56.243000 | A vulnerability, which was classified as critical, was found in D-Link DIR-619L | |
CVE-2025-6369 | 8.8 | 0.03% | 1 | 0 | 2025-06-25T20:09:28.010000 | A vulnerability classified as critical has been found in D-Link DIR-619L 2.06B01 | |
CVE-2025-44531 | 7.5 | 0.05% | 1 | 0 | 2025-06-24T21:30:28 | An issue in Realtek RTL8762EKF-EVB RTL8762E SDK v1.4.0 allows attackers to cause | |
CVE-2024-56731 | 10.0 | 0.33% | 1 | 0 | 2025-06-24T19:00:21 | ### Summary Due to the insufficient patch for the CVE-2024-39931, it's still pos | |
CVE-2025-6374 | 8.8 | 0.03% | 1 | 0 | 2025-06-23T21:31:56 | A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. | |
CVE-2025-6402 | 8.8 | 0.16% | 1 | 0 | 2025-06-23T21:31:56 | A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been decl | |
CVE-2025-6511 | 8.8 | 0.19% | 1 | 0 | 2025-06-23T20:16:21.633000 | A vulnerability classified as critical has been found in Netgear EX6150 1.0.0.46 | |
CVE-2025-34029 | 0 | 1.10% | 1 | 0 | 2025-06-23T20:16:21.633000 | An OS command injection vulnerability exists in the Edimax EW-7438RPn Mini firmw | |
CVE-2025-34021 | 0 | 0.06% | 1 | 0 | 2025-06-23T20:16:21.633000 | A server-side request forgery (SSRF) vulnerability exists in multiple Selea Targ | |
CVE-2025-27636 | 5.6 | 43.34% | 2 | 2 | 2025-06-23T18:54:52.400000 | Bypass/Injection vulnerability in Apache Camel components under particular condi | |
CVE-2025-6510 | 8.8 | 0.19% | 1 | 0 | 2025-06-23T18:30:33 | A vulnerability was found in Netgear EX6100 1.0.2.28_1.1.138. It has been rated | |
CVE-2025-6393 | 8.8 | 0.65% | 1 | 0 | 2025-06-23T15:31:43 | A vulnerability was found in TOTOLINK A702R, A3002R, A3002RU and EX1200T 3.0.0-B | |
CVE-2025-6486 | 8.8 | 0.14% | 1 | 0 | 2025-06-22T18:30:39 | A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been d | |
CVE-2025-6487 | 8.8 | 0.14% | 1 | 0 | 2025-06-22T18:30:31 | A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been r | |
CVE-2025-6371 | 8.8 | 0.06% | 1 | 0 | 2025-06-21T00:30:38 | A vulnerability, which was classified as critical, has been found in D-Link DIR- | |
CVE-2025-6370 | 8.8 | 0.03% | 1 | 0 | 2025-06-21T00:30:38 | A vulnerability classified as critical was found in D-Link DIR-619L 2.06B01. Aff | |
CVE-2025-6368 | 8.8 | 0.03% | 1 | 0 | 2025-06-21T00:30:37 | A vulnerability was found in D-Link DIR-619L 2.06B01. It has been rated as criti | |
CVE-2025-6373 | 8.8 | 0.03% | 1 | 0 | 2025-06-21T00:30:37 | A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as crit | |
CVE-2025-49132 | 10.0 | 23.69% | 1 | 6 | template | 2025-06-20T22:21:17 | ## Impact Using the `/locales/locale.json` with the `locale` and `namespace` qu |
CVE-2025-6367 | 8.8 | 0.03% | 1 | 0 | 2025-06-20T21:32:14 | A vulnerability was found in D-Link DIR-619L 2.06B01. It has been declared as cr | |
CVE-2025-34024 | None | 0.64% | 1 | 0 | 2025-06-20T21:32:14 | An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware v | |
CVE-2025-34022 | None | 0.26% | 1 | 0 | 2025-06-20T21:32:13 | A path traversal vulnerability exists in multiple models of Selea Targa IP OCR-A | |
CVE-2025-5777 | None | 4.17% | 17 | 6 | template | 2025-06-17T15:31:16 | Insufficient input validation leading to memory overread on the NetScaler Manage |
CVE-2025-49596 | None | 0.52% | 2 | 1 | 2025-06-13T22:15:27 | Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution d | |
CVE-2025-22157 | 8.8 | 0.05% | 1 | 0 | 2025-06-12T18:31:14 | This High severity PrivEsc (Privilege Escalation) vulnerability was introduced i | |
CVE-2025-33073 | 8.8 | 0.39% | 1 | 2 | 2025-06-12T16:06:39.330000 | Improper access control in Windows SMB allows an authorized attacker to elevate | |
CVE-2025-48927 | 5.3 | 11.15% | 3 | 0 | 2025-05-28T18:33:28 | The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with | |
CVE-2010-2772 | 7.8 | 0.08% | 1 | 0 | 2025-04-11T00:51:21.963000 | Siemens Simatic WinCC and PCS 7 SCADA system uses a hard-coded password, which a | |
CVE-2025-24813 | 9.8 | 93.98% | 2 | 37 | template | 2025-04-03T13:23:54 | Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution an |
CVE-2025-29891 | 4.2 | 0.09% | 2 | 0 | 2025-03-19T15:44:53 | Bypass/Injection vulnerability in Apache Camel. This issue affects Apache Camel | |
CVE-2025-1094 | 8.1 | 83.63% | 1 | 5 | 2025-02-21T18:31:09 | Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescape | |
CVE-2024-55591 | 9.8 | 94.25% | 1 | 10 | template | 2025-01-14T15:31:02 | An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-2 |
CVE-2019-11932 | 8.8 | 80.16% | 1 | 21 | 2025-01-13T15:21:41 | A double free vulnerability in the DDGifSlurp function in decoding.c in the andr | |
CVE-2024-56337 | None | 9.71% | 2 | 1 | 2025-01-08T16:05:13 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat | |
CVE-2024-50379 | 9.8 | 88.89% | 1 | 16 | 2025-01-03T12:30:31 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compi | |
CVE-2024-12856 | 7.2 | 77.16% | 1 | 1 | 2024-12-27T18:15:23.677000 | The Four-Faith router models F3x24 and F3x36 are affected by an operating system | |
CVE-2024-39931 | 10.0 | 1.37% | 1 | 0 | 2024-12-23T20:38:21 | ### Impact Unprivileged user accounts can execute arbitrary commands on the Gog | |
CVE-2024-6874 | 4.3 | 0.24% | 2 | 0 | 2024-11-21T09:50:26.493000 | libcurl's URL API function [curl_url_get()](https://curl.se/libcurl/c/curl_url_g | |
CVE-2024-3721 | 6.3 | 57.40% | 1 | 0 | 2024-04-13T12:30:30 | A vulnerability was found in TBK DVR-4104 and DVR-4216 up to 20240412 and classi | |
CVE-2023-36934 | 9.1 | 93.06% | 1 | 0 | template | 2024-04-04T05:23:52 | In Progress MOVEit Transfer before 2020.1.11 (12.1.11), 2021.0.9 (13.0.9), 2021. |
CVE-2023-34362 | 9.8 | 94.48% | 2 | 11 | template | 2024-04-04T04:29:06 | In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0. |
CVE-2022-38392 | 5.3 | 0.08% | 1 | 0 | 2023-09-18T05:03:19 | A certain 5400 RPM OEM hard drive, as shipped with laptop PCs in approximately 2 | |
CVE-2025-48952 | 0 | 0.06% | 3 | 0 | N/A | ||
CVE-2025-1735 | 0 | 0.00% | 1 | 0 | N/A | ||
CVE-2025-47812 | 0 | 0.00% | 4 | 4 | template | N/A | |
CVE-2025-53367 | 0 | 0.01% | 2 | 0 | N/A | ||
CVE-2025-52891 | 0 | 0.05% | 1 | 0 | N/A | ||
CVE-2025-0038 | 0 | 0.00% | 1 | 0 | N/A | ||
CVE-2025-49588 | 0 | 0.04% | 1 | 0 | N/A | ||
CVE-2025-48703 | 0 | 0.00% | 1 | 2 | N/A | ||
CVE-2025-49144 | 0 | 0.01% | 2 | 6 | N/A | ||
CVE-2025-53104 | 0 | 0.27% | 1 | 0 | N/A | ||
CVE-2025-53094 | 0 | 0.06% | 1 | 0 | N/A |
updated 2025-07-06T22:15:25.067000
2 posts
https://drive.google.com/file/d/1qnWarYsTSc5_sV6o8ULv0LBvGfKKXPxn/view
sev:CRIT 9.2 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
##A vulnerability classified as critical was found in Comodo Internet Security Premium 12.3.4.8162. This vulnerability affects unknown code of the file cis_update_x64.xml of the component Manifest File Handler. The manipulation leads to improper validation of integrity check value. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
https://drive.google.com/file/d/1qnWarYsTSc5_sV6o8ULv0LBvGfKKXPxn/view
sev:CRIT 9.2 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
##A vulnerability classified as critical was found in Comodo Internet Security Premium 12.3.4.8162. This vulnerability affects unknown code of the file cis_update_x64.xml of the component Manifest File Handler. The manipulation leads to improper validation of integrity check value. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
updated 2025-07-06T14:15:27.573000
2 posts
Fuck Broadcom. I would love to provide more details but I don't have a login. Go hack some Symantec IT Management Suite shit.
sev:CRIT 9.5 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:I/V:C/RE:L/U:Red
##Remote attackers can execute arbitrary code in the context of the vulnerable service process.
Fuck Broadcom. I would love to provide more details but I don't have a login. Go hack some Symantec IT Management Suite shit.
sev:CRIT 9.5 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:I/V:C/RE:L/U:Red
##Remote attackers can execute arbitrary code in the context of the vulnerable service process.
updated 2025-07-06T13:15:35.413000
4 posts
@cR0w is that the correct CVE link? CVE-2025-7079 seems unrelated to Broadcom
##Since the latest release is two years old, I don't expect many people use this. But have another hardcoded JWT secret.
https://github.com/mao888/bluebell-plus/issues/35
##A vulnerability, which was classified as problematic, has been found in mao888 bluebell-plus up to 2.3.0. This issue affects some unknown processing of the file bluebell_backend/pkg/jwt/jwt.go of the component JWT Token Handler. The manipulation of the argument mySecret with the input bluebell-plus leads to use of hard-coded password. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
@cR0w is that the correct CVE link? CVE-2025-7079 seems unrelated to Broadcom
##Since the latest release is two years old, I don't expect many people use this. But have another hardcoded JWT secret.
https://github.com/mao888/bluebell-plus/issues/35
##A vulnerability, which was classified as problematic, has been found in mao888 bluebell-plus up to 2.3.0. This issue affects some unknown processing of the file bluebell_backend/pkg/jwt/jwt.go of the component JWT Token Handler. The manipulation of the argument mySecret with the input bluebell-plus leads to use of hard-coded password. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
updated 2025-07-06T07:15:35.383000
1 posts
🔎 High severity buffer overflow (CVSS 8.7) in Shenzhen Libituo LBT-T300-T310 (2.2.3.0–2.2.3.6). Remote exploit via /appy.cgi—no patch yet, public exploit disclosed. Restrict access & monitor now. CVE-2025-7077 https://radar.offseq.com/threat/cve-2025-7077-buffer-overflow-in-shenzhen-libituo--9f728dec #OffSeq #IoTSecurity #BufferOverflow
##updated 2025-07-06T06:15:21.587000
3 posts
PrivEsc in Apache APISIX.
https://lists.apache.org/thread/qwxnxolt0j5nvjfpr0mlz6h7nrtvyzng
##Incorrect Permission Assignment for Critical Resource vulnerability in Apache APISIX(java-plugin-runner).
Local listening file permissions in APISIX plugin runner allow a local attacker to elevate privileges.
This issue affects Apache APISIX(java-plugin-runner): from 0.2.0 through 0.5.0.Users are recommended to upgrade to version 0.6.0 or higher, which fixes the issue.
🛡️ HIGH severity: CVE-2025-27446 in Apache APISIX Java Plugin Runner (0.2.0–0.5.0) allows local privilege escalation via incorrect file permissions. Upgrade to 0.6.0+ ASAP. https://radar.offseq.com/threat/cve-2025-27446-cwe-732-incorrect-permission-assign-287204e3 #OffSeq #Apache #Vuln #PrivilegeEscalation
##PrivEsc in Apache APISIX.
https://lists.apache.org/thread/qwxnxolt0j5nvjfpr0mlz6h7nrtvyzng
##Incorrect Permission Assignment for Critical Resource vulnerability in Apache APISIX(java-plugin-runner).
Local listening file permissions in APISIX plugin runner allow a local attacker to elevate privileges.
This issue affects Apache APISIX(java-plugin-runner): from 0.2.0 through 0.5.0.Users are recommended to upgrade to version 0.6.0 or higher, which fixes the issue.
updated 2025-07-05T01:15:27.360000
1 posts
🛑 HIGH severity: Alinto SOPE SOGo (2.0.2–5.12.2) is vulnerable to remote DoS (CVE-2025-53603) via NULL pointer dereference in sope-core/NGHashMap.m. No auth required. Patch pending—use WAF/rate limits. More info: https://radar.offseq.com/threat/cve-2025-53603-cwe-476-null-pointer-dereference-in-cea1526a #OffSeq #SOGo #Vuln #InfoSec
##updated 2025-07-04T22:15:22.300000
1 posts
⚠️ MCP Python SDK (<1.9.4) has a HIGH severity vuln (CVE-2025-53366): malformed requests can crash services via uncaught exceptions (DoS). Patch by upgrading to 1.9.4+ and boost input validation! https://radar.offseq.com/threat/cve-2025-53366-cwe-248-uncaught-exception-in-model-bed56cf4 #OffSeq #Python #Vuln #DoS
##updated 2025-07-04T13:15:25.780000
1 posts
Never had this problem with traceroute. ducks
https://github.com/Homebrew/homebrew-core/issues/35085
sev:HIGH 7.8 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
##mtr through 0.95, in certain privileged contexts, mishandles execution of a program specified by the MTR_PACKET environment variable. NOTE: mtr on macOS may often have Sudo rules, as an indirect consequence of Homebrew not installing setuid binaries.
updated 2025-07-04T12:30:38
1 posts
🔴 CRITICAL: CVE-2025-52833 (CVSS 9.3) hits designthemes LMS ≤9.1. Remote SQL Injection—no patch yet. Protect user data: enable WAFs, validate inputs, monitor queries. More: https://radar.offseq.com/threat/cve-2025-52833-cwe-89-improper-neutralization-of-s-b2058fec #OffSeq #SQLi #infosec
##updated 2025-07-04T12:30:38
1 posts
⚠️ CRITICAL: CVE-2025-52831 in thanhtungtnt Video List Manager (≤1.7) enables unauthenticated SQL Injection—data theft risk, no patch yet. Restrict access, use WAF, and monitor traffic! https://radar.offseq.com/threat/cve-2025-52831-cwe-89-improper-neutralization-of-s-08b04f8a #OffSeq #SQLInjection #Vuln #Infosec
##updated 2025-07-04T12:30:37
1 posts
🚨 CVE-2025-52832: CRITICAL SQLi in wpo-HR NGG Smart Image Search (≤3.4.1). No patch yet—disable plugin, use WAF, monitor logs. High risk to sensitive data & compliance. https://radar.offseq.com/threat/cve-2025-52832-cwe-89-improper-neutralization-of-s-4745dfce #OffSeq #WordPress #SQLi #ThreatIntel
##updated 2025-07-04T12:30:37
1 posts
🛡️ CRITICAL SQL Injection (CVE-2025-52830) in bSecure – Your Universal Checkout ≤1.7.9. Blind SQLi enables remote data exposure—no auth needed. E-commerce risk is high! Mitigate ASAP: WAF, DB least-priv, input validation. https://radar.offseq.com/threat/cve-2025-52830-cwe-89-improper-neutralization-of-s-be7bf20a #OffSeq #SQLi #InfoSec #Ecommerce
##updated 2025-07-04T12:30:33
1 posts
🚩 CRITICAL: CVE-2025-49417 in BestWpDeveloper WooCommerce Product Multi-Action (≤1.3) enables unauthenticated object injection via unsafe deserialization. Full site compromise possible—disable plugin now! https://radar.offseq.com/threat/cve-2025-49417-cwe-502-deserialization-of-untruste-ebae4036 #OffSeq #infosec #WordPress #WooCommerce
##updated 2025-07-04T12:30:33
1 posts
🚨 CVE-2025-49414: CRITICAL vuln in Fastw3b FW Gallery (<=8.0.0). Unrestricted file upload flaw can lead to full server compromise—no patch yet. Disable uploads & enforce strict validation! https://radar.offseq.com/threat/cve-2025-49414-cwe-434-unrestricted-upload-of-file-2c9acc37 #OffSeq #infosec #cybersecurity #CVE
##updated 2025-07-04T12:30:33
1 posts
⚠️ CVE-2025-49867: CRITICAL privilege escalation in InspiryThemes RealHomes ≤4.4.0. Unauthenticated remote attackers can gain admin rights. Restrict admin access, monitor logs, deploy WAF rules until patch. https://radar.offseq.com/threat/cve-2025-49867-cwe-266-incorrect-privilege-assignm-27f695bf #OffSeq #WordPress #Infosec #PrivilegeEscalation
##updated 2025-07-04T12:30:33
1 posts
🔴 CRITICAL (CVSS 9.8) SQL Injection in Click & Pledge Connect (v25.04010101–WP6.8) enables unauthenticated privilege escalation & data access. No patch yet—deploy WAF, restrict access, monitor closely. CVE-2025-28983 https://radar.offseq.com/threat/cve-2025-28983-cwe-89-improper-neutralization-of-s-bcae9037 #OffSeq #SQLi #Infosec #Vulnerability
##updated 2025-07-04T12:30:32
1 posts
🚨 CVE-2025-49302: CRITICAL code injection in Easy Stripe (≤1.1). Allows unauth RCE—no patch yet. Isolate systems, deploy WAFs, monitor for exploit attempts, & consider disabling. Details: https://radar.offseq.com/threat/cve-2025-49302-cwe-94-improper-control-of-generati-57375efd #OffSeq #Vuln #RCE #CVE202549302
##updated 2025-07-04T12:30:32
1 posts
🚨 CVE-2025-30933 (CRITICAL, CVSS 10): LiquidThemes LogisticsHub ≤1.1.6 is vulnerable to unrestricted file uploads. Remote attackers can deploy web shells for total server compromise. Disable uploads & monitor now! https://radar.offseq.com/threat/cve-2025-30933-cwe-434-unrestricted-upload-of-file-6d6f85e5 #OffSeq #Vuln #WebAppSec #BlueTeam
##updated 2025-07-04T12:30:24
1 posts
CVE-2025-23970: CRITICAL flaw in Service Finder Booking (≤6.0) allows unauth’d privilege escalation 🚨. No patch yet—restrict access, deploy WAF, monitor logs. Major risk for EU orgs handling bookings! https://radar.offseq.com/threat/cve-2025-23970-cwe-266-incorrect-privilege-assignm-247631f8 #OffSeq #vuln #cybersecurity #CVE202523970
##updated 2025-07-04T06:30:28
1 posts
Okay, this one's kind of funny. 1s and 0s are hard.
https://access.redhat.com/security/cve/CVE-2025-5372
sev:MED 5.0 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
##A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
updated 2025-07-03T22:15:21.010000
1 posts
sev:HIGH
cache poisoning vuln in next dot js.
https://github.com/vercel/next.js/security/advisories/GHSA-67rr-84xm-4c7r
A vulnerability affecting Next.js has been addressed. It impacted versions >=15.1.0 <15.1.8 and involved a cache poisoning bug leading to a Denial of Service (DoS) condition.
Edit to add the CVE: https://www.cve.org/CVERecord?id=CVE-2025-49826
##updated 2025-07-03T15:31:21
1 posts
https://www.asna.com/en/kb/security-update
##This vulnerability affects only our Windows-based products. DataGate for IBM i is not affected. Our Visual RPG (for .NET and Classic), Wings, Mobile RPG, and DataGate for SQL Server are affected by this vulnerability and need to be updated.
The vulnerability exists only on the network where Windows machines are running the affected ASNA Assist or ASNA Registrar services. The threat is present only when these vulnerable services are running and an untrusted user has Windows network access (e.g., via a malicious intruder or a disgruntled employee).
ASNA Assist and ASNA Registrar before 2025-03-31 allow deserialization attacks against .NET remoting. These are Windows system services that support license key management and deprecated Windows network authentication. The services are implemented with .NET remoting and can be exploited via well-known deserialization techniques inherent in the technology. Because the services run with SYSTEM-level rights, exploits can be crafted to achieve escalation of privilege and arbitrary code execution. This affects DataGate for SQL Server 17.0.36.0 and 16.0.89.0, DataGate Component Suite 17.0.36.0 and 16.0.89.0, DataGate Monitor 17.0.26.0 and 16.0.65.0, DataGate WebPak 17.0.37.0 and 16.0.90.0, Monarch for .NET 11.4.50.0 and 10.0.62.0, Encore RPG 4.1.36.0, Visual RPG .NET FW 17.0.37.0 and 16.0.90.0, Visual RPG .NET FW Windows Deployment 17.0.36.0 and 16.0.89.0, WingsRPG 11.0.38.0 and 10.0.95.0, Mobile RPG 11.0.35.0 and 10.0.94.0, Monarch Framework for .NET FW 11.0.36.0 and 10.0.89.0, Browser Terminal 17.0.37.0 and 16.0.90.0, Visual RPG Classic 5.2.7.0 and 5.1.17.0, Visual RPG Deployment 5.2.7.0 and 5.1.17.0, and DataGate Studio 17.0.38.0 and 16.0.104.0.
updated 2025-07-03T15:31:20
1 posts
Oh my.
sev:MED 5.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
##In Plesk Obsidian 18.0.69, unauthenticated requests to /login_up.php can reveal an AWS accessKeyId, secretAccessKey, region, and endpoint.
updated 2025-07-03T15:14:12.767000
17 posts
26 repos
https://github.com/4f-kira/CVE-2025-32463
https://github.com/nflatrea/CVE-2025-32463
https://github.com/cyberpoul/CVE-2025-32463-POC
https://github.com/SkylerMC/CVE-2025-32463
https://github.com/pr0v3rbs/CVE-2025-32463_chwoot
https://github.com/Mikivirus0/sudoinjection
https://github.com/ill-deed/CVE-2025-32463_illdeed
https://github.com/robbert1978/CVE-2025-32463_POC
https://github.com/mirchr/CVE-2025-32463-sudo-chwoot
https://github.com/pevinkumar10/CVE-2025-32463
https://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOIT
https://github.com/K1tt3h/CVE-2025-32463-POC
https://github.com/yeremeu/CVE-2025-32463_chwoot
https://github.com/zinzloun/CVE-2025-32463
https://github.com/zhaduchanhzz/CVE-2025-32463_POC
https://github.com/junxian428/CVE-2025-32463
https://github.com/CIA911/sudo_patch_CVE-2025-32463
https://github.com/Adonijah01/cve-2025-32463-lab
https://github.com/0xAkarii/CVE-2025-32463
https://github.com/FreeDurok/CVE-2025-32463-PoC
https://github.com/B1ack4sh/Blackash-CVE-2025-32463
https://github.com/san8383/CVE-2025-32463
https://github.com/kh4sh3i/CVE-2025-32463
https://github.com/Chocapikk/CVE-2025-32463-lab
Wow, this sudo priv escalation bug works perfectly on Fedora 42.
Woops! No distro patch available atm :/
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
##Linux – Obtenez un accès root avec ces deux failles dans sudo : CVE-2025-32462 et CVE-2025-32463 https://www.it-connect.fr/linux-acces-root-avec-deux-failles-dans-sudo-cve-2025-32462-et-cve-2025-32463/ #ActuCybersécurité #Vulnérabilités #Cybersécurité #Linux
##A critical Linux vulnerability (CVE-2025-32463) in Sudo lets any local unprivileged user gain root via the --chroot (-R) option
🔒 Affects default configs on Ubuntu, Fedora & others — no Sudo rules needed
🛠️ Fix: Update to Sudo 1.9.17p1+ (no workarounds)
👀 CVSS: 9.8 (Critical)
Highlights persistent risks in open-source privilege handling 🧩
https://cybersecuritynews.com/linux-sudo-chroot-vulnerability/
#Linux #Sudo #FOSS #CyberSecurity #InfoSec #OpenSource #Vulnerability #Root #Exploit #SysAdmin #DevSecOps
##It is important you make sure you keep your software up to date on all devices where you can.
In this case, the core tool "sudo" found on most Linux systems had a bug with CVSS severity score 9.3 (where 10 is worst) was found, allowing local users to become "root" (the most, fully privileged user) and has fixed versions being distributed as part of operating system updates.
https://www.sudo.ws/security/advisories/chroot_bug/
https://www.cve.org/CVERecord?id=CVE-2025-32463
https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html
CVE-2025-32463 and CVE-2025-32462: Sudo Local Privilege Escalation Vulnerabilities Threaten Linux Environments – Source: socprime.com https://ciso2ciso.com/cve-2025-32463-and-cve-2025-32462-sudo-local-privilege-escalation-vulnerabilities-threaten-linux-environments-source-socprime-com/ #rssfeedpostgeneratorecho #PrivilageEscalation #CyberSecurityNews #CVE-2025-32462 #CVE-2025-32463 #Latestthreats #Vulnerability #socprimecom #socprime #Blog #CVE
##Local Privilege Escalation to Root via Sudo Chroot in Linux https://github.com/kh4sh3i/CVE-2025-32463
##Vulnerability Advisory: Sudo chroot Elevation of Privilege https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
##Kurzer Check bei mir, welche Distros die kritische #sudo Lücke CVE-2025-32463 bis jetzt behoben haben:
- Alpine 3.22: OK
- Arch Linux: OK
- Debian 12 / Devuan 5: OK
- Fedora 42: FAIL
- Void Linux: OK
I think I boosted information about these sudo EoP vulns yesterday but in case I didn't, here's some basic info on them.
https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host
sev:LOW 2.8 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.
https://nvd.nist.gov/vuln/detail/CVE-2025-32462
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
sev:CRIT 9.3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463) https://www.helpnetsecurity.com/2025/07/01/sudo-local-privilege-escalation-vulnerabilities-fixed-cve-2025-32462-cve-2025-32463/ #vulnerability #Stratascale #Don'tmiss #Hotstuff #Debian #Ubuntu #Linux #macOS #News #SUSE
##Critical Sudo vulnerabilities enable local privilege escalation to root
The Stratascale Cyber Research Unit are reporting two vulnerabilities in the Sudo utility, including a critical flaw (CVE-2025-32463) that allows unprivileged users to escalate to root privileges through the chroot option by exploiting NSS library loading mechanisms.
**This is a nasty flaw. If you have multiple user roles on your linux systems or are running services as non-root, make sure to update your Linux systems' Sudo utility to version 1.9.17p1 or later. The exploit vector is possible if someone already has local access to the system, which can either be through direct credentials or through breaching a vulnerable service that's running as non-root.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-sudo-vulnerabilities-enable-local-privilege-escalation-to-root-o-x-8-6-q/gD2P6Ple2L
Maybe controversial, but I think it is bad to do this
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
Turns out sudo -f was implemented as sudo -R...
https://leahneukirchen.org/blog/archive/2011/04/sudo-f.html
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
##CVE-2025-32463 Vulnerability Advisory: Sudo chroot Elevation of Privilege https://lobste.rs/s/srcfxn #linux #security
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
Sudo versions 1.9.14 to 1.9.17 (inclusive) have two critical vulnerabilities:
- local privilege escalation via chroot option (CVE-2025-32463) https://www.openwall.com/lists/oss-security/2025/06/30/3
- local privilege escalation via host option (CVE-2025-32462) https://www.openwall.com/lists/oss-security/2025/06/30/2
updated 2025-07-03T15:14:12.767000
1 posts
EUVD: Critical CVE-2024-13786: the education theme for WordPress is vulnerable to PHP Object Injection in all versions https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-54721
- CVE-2025-4689: Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to RCE Local File Inclusion https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-19688 @euvdfeed #cybersecurity #infosec #WordPress
##updated 2025-07-03T15:14:12.767000
1 posts
Go hack more MCP shit.
https://github.com/cyanheads/git-mcp-server/security/advisories/GHSA-3q26-f695-pp76
sev:HIGH 7.5 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
##@cyanheads/git-mcp-server is an MCP server designed to interact with Git repositories. Prior to version 2.1.5, there is a command injection vulnerability caused by the unsanitized use of input parameters within a call to child_process.exec, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (|, >, &&, etc.). An MCP Client can be instructed to execute additional actions for example via indirect prompt injection when asked to read git logs. This issue has been patched in version 2.1.5.
updated 2025-07-03T15:14:12.767000
1 posts
Go hack more MCP shit.
https://github.com/RestDB/codehooks-mcp-server/security/advisories/GHSA-fhq6-jf5q-qxvq
sev:HIGH 8.6 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
##RestDB's Codehooks.io MCP Server is an MCP server on the Codehooks.io platform. Prior to version 0.2.2, the MCP server is written in a way that is vulnerable to command injection attacks as part of some of its MCP Server tools definition and implementation. This could result in a user initiated remote command injection attack on a running MCP Server. This issue has been patched in version 0.2.2.
updated 2025-07-03T15:14:12.767000
1 posts
Go hack more remote support shit.
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04878en_us&docLocale=en_US
Multiple security vulnerabilities have been identified in HPE Insight Remote Support. These vulnerabilities could remotely allow a directory traversal, disclosure of information, or code execution.
CVE-2025-37097 ( sev:MED 7.5 - :CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )
CVE-2025-37098 ( sev:MED 6.5 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
CVE-2025-37099 ( sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )
updated 2025-07-03T15:14:12.767000
1 posts
Perfect 10 in Monero forums. 🥳
https://swap.gs/posts/monero-forums/
https://github.com/monero-project/monero-forum
sev:CRIT 10.0 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
##A PHP objection injection vulnerability exists in the Monero Project’s Laravel-based forum software due to unsafe handling of untrusted input in the /get/image/ endpoint. The application passes a user-supplied link parameter directly to file_get_contents() without validation. MIME type checks using PHP’s finfo can be bypassed via crafted stream filter chains that prepend spoofed headers, allowing access to internal Laravel configuration files. An attacker can extract the APP_KEY from config/app.php, forge encrypted cookies, and trigger unsafe unserialize() calls, leading to reliable remote code execution.
updated 2025-07-03T15:14:12.767000
1 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH
by ASR, though the CVSS scores are eight sev:MED
and two sev:HIGH
.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-03T15:14:12.767000
1 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH
by ASR, though the CVSS scores are eight sev:MED
and two sev:HIGH
.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-03T15:14:12.767000
1 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH
by ASR, though the CVSS scores are eight sev:MED
and two sev:HIGH
.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-03T15:14:12.767000
1 posts
Post-auth sev:HIGH
code injection and argument injection vulns in Ansible Automation Platform.
A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability allows an authenticated attacker to inject arguments and execute arbitrary commands on the EDA worker. In Kubernetes/OpenShift environments, this can lead to service account token theft and cluster access.
https://bugzilla.redhat.com/show_bug.cgi?id=2370812
https://nvd.nist.gov/vuln/detail/CVE-2025-49520
##A flaw was found in the EDA component of the Ansible Automation Platform, where user-supplied Git branch or refspec values are evaluated as Jinja2 templates. This vulnerability allows authenticated users to inject expressions that execute commands or access sensitive files on the EDA worker. In OpenShift, it can lead to service account token theft.
updated 2025-07-03T15:13:53.147000
2 posts
🟥𝐋𝐂𝐒𝐂-𝐈𝐄 𝐃𝐚𝐢𝐥𝐲 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐅𝐢𝐧𝐝𝐢𝐧𝐠𝐬-𝟑 𝐉𝐮𝐥𝐲 𝟐𝟎𝟐𝟓🟥
𝐍𝐞𝐰𝐬:
1. Microsoft to Lay Off 9,000 Employees, Affecting 4% of Workforce
2. Hunters International Ransomware Shuts Down, Offers Free Decryptors to Victims
3. UK charity bank branded a 'disaster' after platform migration goes wrong
https://www.theregister.com/2025/07/03/uk_charity_bank_migration_disaster/
4. Police warn of SMS scams following prison sentence for criminal who conducted smishing campaign
5. Large Language Models (LLMs) Are Falling for Phishing Scams: What Happens When AI Gives You the Wrong URL?
https://www.netcraft.com/blog/large-language-models-are-falling-for-phishing-scams
6. Russia’s Cyber Warriors Assail NATO-Linked Private Companies
https://cepa.org/article/russias-cyber-warriors-assail-nato-linked-private-companies/
7. US probes negotiator suspected of taking crypto ransomware money
https://cointelegraph.com/news/digitalmint-employee-under-investigation-by-us-justice-department
8. Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
9. Spain arrests hackers who targeted politicians and journalists
https://policia.es/_es/comunicacion_prensa_detalle.php?ID=16602
10. A third of organisations take more than 90 days to remediate threats
---
𝐆𝐥𝐨𝐛𝐚𝐥 𝐁𝐫𝐞𝐚𝐜𝐡 𝐍𝐞𝐰𝐬 𝐚𝐧𝐝 𝐃𝐚𝐭𝐚 𝐋𝐞𝐚𝐤𝐬:
1. Irish Eyecare software firm Ocuco investigating cyber-attack
https://thecurrency.news/articles/194653/eyecare-software-firm-ocuco-investigating-cyber-attack/
---
𝐓𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐑𝐞𝐩𝐨𝐫𝐭𝐬 𝐰𝐢𝐭𝐡 𝐈𝐎𝐂𝐬:
1. Apache Under the Lens: Tomcat’s Partial PUT and Camel’s Header Hijack
https://unit42.paloaltonetworks.com/apache-cve-2025-24813-cve-2025-27636-cve-2025-29891/
2. Snake Keyloggers Exploit Java Tools to Bypass Security – Active IOCs
3. Who are DragonForce Ransomware Group?
https://www.bridewell.com/insights/blogs/detail/who-are-dragonforce-ransomware-group
4. Silent Push Uncovers Chinese Fake Marketplace e-Commerce Phishing Campaign Using Thousands of Websites to Spoof Popular Retail Brands
5. Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
https://www.wiz.io/blog/exposed-jdwp-exploited-in-the-wild
6. Malvertising Campaign Delivers Oyster/Broomstick Backdoor via SEO Poisoning and Trojanized Tools
7. North Korean APT Kimsuky aka Black Banshee – Active IOCs
https://rewterz.com/threat-advisory/north-korean-apt-kimsuky-aka-black-banshee-active-iocs-52
8. DarkTortilla Malware – Active IOCs
https://rewterz.com/threat-advisory/darktortilla-malware-active-iocs-2
---
𝐀𝐏𝐓 𝐈𝐎𝐂𝐬:
1. Lazarus: Source VT
yourdomainhost[.]store
api[.]yourdomainhost[.]store
2. Kimsuky: Source Validin
Accounts-mysticete[.]servepics[.]com
freedrive[.]servehttp[.]com
login-accounts[.]servehttp[.]com
myaccounts-profile[.]servehttp[.]com
mydocs[.]onthewifi[.]com
securedrive-mofa[.]servehttp[.]com
translate[.]onthewifi[.]com
undocs[.]ddns[.]net
undocs[.]myvnc[.]com
undocs[.]servehttp[.]com
---
𝐓𝐡𝐫𝐞𝐚𝐭 𝐇𝐮𝐧𝐭𝐢𝐧𝐠 / 𝐃𝐅𝐈𝐑 / 𝐌𝐚𝐥𝐰𝐚𝐫𝐞:
1. Automating macOS Incident Response: DFIR-as-Code in Action Against AppleProcessHub
2. Using Staging Folders For Threat Hunting
https://www.knowyouradversary.ru/2025/07/183-using-staging-folders-for-threat.html
3. PDFs: Portable documents, or perfect deliveries for phish?
https://blog.talosintelligence.com/pdfs-portable-documents-or-perfect-deliveries-for-phish/
4. EscapeRoute: Breaking the Scope of Anthropic’s Filesystem MCP Server
(CVE-2025-53109 & CVE-2025-53110)
5. Yet another ZIP trick
https://hackarcana.com/article/yet-another-zip-trick
6. Malware development trick 48: leveraging Office macros for malware. Simple VBA example.
https://cocomelonc.github.io/malware/2025/07/01/malware-tricks-48.html
7. Hijacked by a Text: Understanding and Preventing SIM Swapping Attack
https://www.bitsight.com/blog/what-is-sim-swapping
8. CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries
9. DanaBot Lab Analysis
https://omer-secure.medium.com/danabot-lab-analysis-7dbaa179f3e4
10. ClickFix Campaign: How Clipboard Injection Leads to RAT Infection (Part 1)
11. Release Notes: Detonation Actions, Enhanced QR Extraction, and 1,400+ New Detection Rules
https://any.run/cybersecurity-blog/release-notes-june-2025/
12. Inside Android Malware Development: Building a C2 Exfiltrator from the UI to the Network
---
𝐋𝐢𝐠𝐡𝐭 𝐑𝐞𝐚𝐝𝐢𝐧𝐠:
1. Pro-Russian hacktivism: Shifting alliances, new groups and risks
https://intel471.com/blog/pro-russian-hacktivism-shifting-alliances-new-groups-and-risks
2. Insider Risk Lessons from the DPRK IT Worker Crackdown
https://www.dtexsystems.com/blog/insider-risk-lessons-from-dprk-crackdown/
3. Calling Out Russia: France’s Shift on Public Attribution
https://warontherocks.com/2025/07/calling-out-russia-frances-shift-on-public-attribution/
4. Outsourced Trust: How Coinbase's $400M Problem Started in an Indian Call Center
https://www.reco.ai/blog/coinbase-breach
---
##EscapeRoute: How we found 2 vulnerabilities in Anthropic’s Filesystem MCP Server (CVE-2025-53109 & CVE-2025-53110) https://cymulate.com/blog/cve-2025-53109-53110-escaperoute-anthropic/?utm_source=linkedin&utm_medium=social&utm_campaign=2025-q3-cve-2025-53109-53110-escaperoute-anthropic-blog&utm_term=blog
##updated 2025-07-03T15:13:53.147000
1 posts
New.
CVE-2025-20309 (critical): Cisco Unified Communications Manager Static SSH Credentials Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-ssh-m4UBdpE7
- Cisco Spaces Connector Privilege Escalation Vulnerability - CVE-2025-20308 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spaces-conn-privesc-kgD2CcDU
- Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability - CVE-2025-20310 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CbtKtEYc
- Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability - CVE-2025-20307 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-O696ymRA @TalosSecurity #cybersecurity #infosec #Cisco
##updated 2025-07-03T15:13:53.147000
1 posts
That one is a sev:CRIT 9.3
in case you're wondering: https://nvd.nist.gov/vuln/detail/CVE-2025-34072
updated 2025-07-03T15:13:53.147000
1 posts
A bunch of Infinera and Nokia vulns got published today. Could be worth checking out based on where these specific systems tend to sit.
Infinera G42:
https://nvd.nist.gov/vuln/detail/CVE-2025-27021
https://nvd.nist.gov/vuln/detail/CVE-2025-27022
https://nvd.nist.gov/vuln/detail/CVE-2025-27023
https://nvd.nist.gov/vuln/detail/CVE-2025-27024
https://nvd.nist.gov/vuln/detail/CVE-2025-27025
Nokia Single RAN:
https://nvd.nist.gov/vuln/detail/CVE-2025-24328
https://nvd.nist.gov/vuln/detail/CVE-2025-24329
https://nvd.nist.gov/vuln/detail/CVE-2025-24330
https://nvd.nist.gov/vuln/detail/CVE-2025-24331
https://nvd.nist.gov/vuln/detail/CVE-2025-24332
https://nvd.nist.gov/vuln/detail/CVE-2025-24333
##updated 2025-07-03T15:13:53.147000
1 posts
A bunch of Infinera and Nokia vulns got published today. Could be worth checking out based on where these specific systems tend to sit.
Infinera G42:
https://nvd.nist.gov/vuln/detail/CVE-2025-27021
https://nvd.nist.gov/vuln/detail/CVE-2025-27022
https://nvd.nist.gov/vuln/detail/CVE-2025-27023
https://nvd.nist.gov/vuln/detail/CVE-2025-27024
https://nvd.nist.gov/vuln/detail/CVE-2025-27025
Nokia Single RAN:
https://nvd.nist.gov/vuln/detail/CVE-2025-24328
https://nvd.nist.gov/vuln/detail/CVE-2025-24329
https://nvd.nist.gov/vuln/detail/CVE-2025-24330
https://nvd.nist.gov/vuln/detail/CVE-2025-24331
https://nvd.nist.gov/vuln/detail/CVE-2025-24332
https://nvd.nist.gov/vuln/detail/CVE-2025-24333
##updated 2025-07-03T15:13:53.147000
1 posts
A bunch of Infinera and Nokia vulns got published today. Could be worth checking out based on where these specific systems tend to sit.
Infinera G42:
https://nvd.nist.gov/vuln/detail/CVE-2025-27021
https://nvd.nist.gov/vuln/detail/CVE-2025-27022
https://nvd.nist.gov/vuln/detail/CVE-2025-27023
https://nvd.nist.gov/vuln/detail/CVE-2025-27024
https://nvd.nist.gov/vuln/detail/CVE-2025-27025
Nokia Single RAN:
https://nvd.nist.gov/vuln/detail/CVE-2025-24328
https://nvd.nist.gov/vuln/detail/CVE-2025-24329
https://nvd.nist.gov/vuln/detail/CVE-2025-24330
https://nvd.nist.gov/vuln/detail/CVE-2025-24331
https://nvd.nist.gov/vuln/detail/CVE-2025-24332
https://nvd.nist.gov/vuln/detail/CVE-2025-24333
##updated 2025-07-03T15:13:53.147000
1 posts
A bunch of Infinera and Nokia vulns got published today. Could be worth checking out based on where these specific systems tend to sit.
Infinera G42:
https://nvd.nist.gov/vuln/detail/CVE-2025-27021
https://nvd.nist.gov/vuln/detail/CVE-2025-27022
https://nvd.nist.gov/vuln/detail/CVE-2025-27023
https://nvd.nist.gov/vuln/detail/CVE-2025-27024
https://nvd.nist.gov/vuln/detail/CVE-2025-27025
Nokia Single RAN:
https://nvd.nist.gov/vuln/detail/CVE-2025-24328
https://nvd.nist.gov/vuln/detail/CVE-2025-24329
https://nvd.nist.gov/vuln/detail/CVE-2025-24330
https://nvd.nist.gov/vuln/detail/CVE-2025-24331
https://nvd.nist.gov/vuln/detail/CVE-2025-24332
https://nvd.nist.gov/vuln/detail/CVE-2025-24333
##updated 2025-07-03T12:35:09
1 posts
updated 2025-07-02T18:56:41
2 posts
🟥𝐋𝐂𝐒𝐂-𝐈𝐄 𝐃𝐚𝐢𝐥𝐲 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐅𝐢𝐧𝐝𝐢𝐧𝐠𝐬-𝟑 𝐉𝐮𝐥𝐲 𝟐𝟎𝟐𝟓🟥
𝐍𝐞𝐰𝐬:
1. Microsoft to Lay Off 9,000 Employees, Affecting 4% of Workforce
2. Hunters International Ransomware Shuts Down, Offers Free Decryptors to Victims
3. UK charity bank branded a 'disaster' after platform migration goes wrong
https://www.theregister.com/2025/07/03/uk_charity_bank_migration_disaster/
4. Police warn of SMS scams following prison sentence for criminal who conducted smishing campaign
5. Large Language Models (LLMs) Are Falling for Phishing Scams: What Happens When AI Gives You the Wrong URL?
https://www.netcraft.com/blog/large-language-models-are-falling-for-phishing-scams
6. Russia’s Cyber Warriors Assail NATO-Linked Private Companies
https://cepa.org/article/russias-cyber-warriors-assail-nato-linked-private-companies/
7. US probes negotiator suspected of taking crypto ransomware money
https://cointelegraph.com/news/digitalmint-employee-under-investigation-by-us-justice-department
8. Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
9. Spain arrests hackers who targeted politicians and journalists
https://policia.es/_es/comunicacion_prensa_detalle.php?ID=16602
10. A third of organisations take more than 90 days to remediate threats
---
𝐆𝐥𝐨𝐛𝐚𝐥 𝐁𝐫𝐞𝐚𝐜𝐡 𝐍𝐞𝐰𝐬 𝐚𝐧𝐝 𝐃𝐚𝐭𝐚 𝐋𝐞𝐚𝐤𝐬:
1. Irish Eyecare software firm Ocuco investigating cyber-attack
https://thecurrency.news/articles/194653/eyecare-software-firm-ocuco-investigating-cyber-attack/
---
𝐓𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐑𝐞𝐩𝐨𝐫𝐭𝐬 𝐰𝐢𝐭𝐡 𝐈𝐎𝐂𝐬:
1. Apache Under the Lens: Tomcat’s Partial PUT and Camel’s Header Hijack
https://unit42.paloaltonetworks.com/apache-cve-2025-24813-cve-2025-27636-cve-2025-29891/
2. Snake Keyloggers Exploit Java Tools to Bypass Security – Active IOCs
3. Who are DragonForce Ransomware Group?
https://www.bridewell.com/insights/blogs/detail/who-are-dragonforce-ransomware-group
4. Silent Push Uncovers Chinese Fake Marketplace e-Commerce Phishing Campaign Using Thousands of Websites to Spoof Popular Retail Brands
5. Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
https://www.wiz.io/blog/exposed-jdwp-exploited-in-the-wild
6. Malvertising Campaign Delivers Oyster/Broomstick Backdoor via SEO Poisoning and Trojanized Tools
7. North Korean APT Kimsuky aka Black Banshee – Active IOCs
https://rewterz.com/threat-advisory/north-korean-apt-kimsuky-aka-black-banshee-active-iocs-52
8. DarkTortilla Malware – Active IOCs
https://rewterz.com/threat-advisory/darktortilla-malware-active-iocs-2
---
𝐀𝐏𝐓 𝐈𝐎𝐂𝐬:
1. Lazarus: Source VT
yourdomainhost[.]store
api[.]yourdomainhost[.]store
2. Kimsuky: Source Validin
Accounts-mysticete[.]servepics[.]com
freedrive[.]servehttp[.]com
login-accounts[.]servehttp[.]com
myaccounts-profile[.]servehttp[.]com
mydocs[.]onthewifi[.]com
securedrive-mofa[.]servehttp[.]com
translate[.]onthewifi[.]com
undocs[.]ddns[.]net
undocs[.]myvnc[.]com
undocs[.]servehttp[.]com
---
𝐓𝐡𝐫𝐞𝐚𝐭 𝐇𝐮𝐧𝐭𝐢𝐧𝐠 / 𝐃𝐅𝐈𝐑 / 𝐌𝐚𝐥𝐰𝐚𝐫𝐞:
1. Automating macOS Incident Response: DFIR-as-Code in Action Against AppleProcessHub
2. Using Staging Folders For Threat Hunting
https://www.knowyouradversary.ru/2025/07/183-using-staging-folders-for-threat.html
3. PDFs: Portable documents, or perfect deliveries for phish?
https://blog.talosintelligence.com/pdfs-portable-documents-or-perfect-deliveries-for-phish/
4. EscapeRoute: Breaking the Scope of Anthropic’s Filesystem MCP Server
(CVE-2025-53109 & CVE-2025-53110)
5. Yet another ZIP trick
https://hackarcana.com/article/yet-another-zip-trick
6. Malware development trick 48: leveraging Office macros for malware. Simple VBA example.
https://cocomelonc.github.io/malware/2025/07/01/malware-tricks-48.html
7. Hijacked by a Text: Understanding and Preventing SIM Swapping Attack
https://www.bitsight.com/blog/what-is-sim-swapping
8. CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries
9. DanaBot Lab Analysis
https://omer-secure.medium.com/danabot-lab-analysis-7dbaa179f3e4
10. ClickFix Campaign: How Clipboard Injection Leads to RAT Infection (Part 1)
11. Release Notes: Detonation Actions, Enhanced QR Extraction, and 1,400+ New Detection Rules
https://any.run/cybersecurity-blog/release-notes-june-2025/
12. Inside Android Malware Development: Building a C2 Exfiltrator from the UI to the Network
---
𝐋𝐢𝐠𝐡𝐭 𝐑𝐞𝐚𝐝𝐢𝐧𝐠:
1. Pro-Russian hacktivism: Shifting alliances, new groups and risks
https://intel471.com/blog/pro-russian-hacktivism-shifting-alliances-new-groups-and-risks
2. Insider Risk Lessons from the DPRK IT Worker Crackdown
https://www.dtexsystems.com/blog/insider-risk-lessons-from-dprk-crackdown/
3. Calling Out Russia: France’s Shift on Public Attribution
https://warontherocks.com/2025/07/calling-out-russia-frances-shift-on-public-attribution/
4. Outsourced Trust: How Coinbase's $400M Problem Started in an Indian Call Center
https://www.reco.ai/blog/coinbase-breach
---
##EscapeRoute: How we found 2 vulnerabilities in Anthropic’s Filesystem MCP Server (CVE-2025-53109 & CVE-2025-53110) https://cymulate.com/blog/cve-2025-53109-53110-escaperoute-anthropic/?utm_source=linkedin&utm_medium=social&utm_campaign=2025-q3-cve-2025-53109-53110-escaperoute-anthropic-blog&utm_term=blog
##updated 2025-07-02T18:55:46
1 posts
PrivEsc in Graylog.
https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-3m86-c9x3-vwm9
sev:HIGH 8.8 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
##Graylog is a free and open log management platform. In versions 6.2.0 to before 6.2.4 and 6.3.0-alpha.1 to before 6.3.0-rc.2, Graylog users can gain elevated privileges by creating and using API tokens for the local Administrator or any other user for whom the malicious user knows the ID. For the attack to succeed, the attacker needs a user account in Graylog. They can then proceed to issue hand-crafted requests to the Graylog REST API and exploit a weak permission check for token creation. This issue has been patched in versions 6.2.4 and 6.3.0-rc.2. A workaround involves disabling the respective configuration found in System > Configuration > Users > "Allow users to create personal access tokens".
updated 2025-07-02T18:30:42
9 posts
🟥𝐋𝐂𝐒𝐂-𝐈𝐄 𝐃𝐚𝐢𝐥𝐲 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐅𝐢𝐧𝐝𝐢𝐧𝐠𝐬-𝟒 𝐉𝐮𝐥𝐲 𝟐𝟎𝟐𝟓🟥
𝐍𝐞𝐰𝐬:
1. Ekco Ireland grows headcount to more than 1,000 with Adapt IT acquisition
https://www.siliconrepublic.com/business/ekco-adapt-it-acquisition-growth-expansion-cybersecurity
2. Estonia’s cyber ambassador on digitalization, punching upwards and outing GRU spies
https://therecord.media/estonia-cyber-ambassador-interview
3. Why cybersecurity should be seen as a business enabler, not a blocker
https://www.siliconrepublic.com/enterprise/bitdefender-leadership-cybersecurity-tech-ai
4. South Korea penalises 'negligent' SK Telecom over major data leak
5. Russia jails man for 16 years over pro-Ukraine cyberattacks on critical infrastructure
https://therecord.media/russia-jails-man-over-pro-ukraine-cyberattacks
6. CVE-2025-20309: Cisco Unified Communications Manager Static SSH Credentials Maximum Severity Vulnerability
7. Criminals Sending QR Codes in Phishing, Malware Campaigns
https://www.darkreading.com/endpoint-security/criminals-send-qr-codes-phishing
8. Interpol identifies West Africa as potential new hotspot for cybercrime compounds
https://therecord.media/interpol-west-africa-cybercrime-compounds
---
𝐆𝐥𝐨𝐛𝐚𝐥 𝐁𝐫𝐞𝐚𝐜𝐡 𝐍𝐞𝐰𝐬 𝐚𝐧𝐝 𝐃𝐚𝐭𝐚 𝐋𝐞𝐚𝐤𝐬:
1. Allianz Seguros Spain Allegedly Breached – Database of 4.6 Million Offered for Sale
---
𝐓𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐑𝐞𝐩𝐨𝐫𝐭𝐬 𝐰𝐢𝐭𝐡 𝐈𝐎𝐂𝐬:
1. Taking SHELLTER: a commercial evasion framework abused in- the- wild
https://www.elastic.co/security-labs/taking-shellter
2. Threat Actors Recompile SonicWall's NetExtender to Include SilentRoute Backdoor
3. RondoDox Unveiled: Breaking Down a New Botnet Threat
https://www.fortinet.com/blog/threat-research/rondobox-unveiled-breaking-down-a-botnet-threat
4. Hpingbot: A New Botnet Family Based on Pastebin Payload Delivery Chain and Hping3 DDoS Module
5. 8 More Malicious Firefox Extensions: Exploiting Popular Game Recognition, Hijacking User Sessions, and Stealing OAuth Credentials
https://socket.dev/blog/8-more-malicious-firefox-extensions
6. Satori Threat Intelligence Alert: IconAds Conceals Source of Ad Fraud from Users
https://www.humansecurity.com/learn/blog/satori-threat-intelligence-alert-iconads/
7. When Installers Turn Evil: The Pascal Script Behind Inno Setup Malware Campaign
https://www.splunk.com/en_us/blog/security/inno-setup-malware-redline-stealer-campaign.html
---
𝐓𝐡𝐫𝐞𝐚𝐭 𝐇𝐮𝐧𝐭𝐢𝐧𝐠 / 𝐃𝐅𝐈𝐑 / 𝐌𝐚𝐥𝐰𝐚𝐫𝐞:
1. The Future of Threat Hunting and Investigation : ELK MCP Server
2. Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
3. Researchers Defeat Content Security Policy Protections via HTML Injection
https://jorianwoltjer.com/blog/p/research/nonce-csp-bypass-using-disk-cache
4. Cl0p Ransomware’s Exfiltration Process Exposes RCE Vulnerability
https://infosec.exchange/@adulau/114777339291449811
5. Identifying and abusing Azure Arc for hybrid escalation and persistence
https://www.ibm.com/think/x-force/identifying-abusing-azure-arc-for-hybrid-escalation-persistence
6. Detecting Attacks in Real-Time with Falco and Grafana: A Beginner’s Guide
7. How I Bypassed a WAF | Why Documentation matters | RGHX
https://rghx.medium.com/how-i-bypassed-a-waf-why-documentation-matters-rghx-62dc301e39f1
8. One attack, one alert: From thousands of signals to one clear story
https://www.group-ib.com/blog/one-attack-one-alert/
9. Azure Honeypot with Live Traffic
https://medium.com/@rajesh.p3807/azure-honeypot-with-live-traffic-6de04990e651
10. dnSpy—Static Analysis of a .NET Malware
https://medium.com/@tarunrd77/dnspy-static-analysis-of-a-net-malware-012806424acf
11. Part 3: In-Memory Execution Methods — How Malware Lives Rent-Free in Your System
12. Using Process Parent and Children Relationships for Detection and Hunting
https://www.knowyouradversary.ru/2025/07/185-using-process-parent-and-children.html
13. Taking over 60k spyware user accounts with SQL injection
https://ericdaigle.ca/posts/taking-over-60k-spyware-user-accounts/
14. Logwatcher’s Zenit #05: Beginner Mistakes in KQL
15. Custom AnyDesk Abuse: A Stealthy Way Adversaries Take Over Your System
---
𝐋𝐢𝐠𝐡𝐭 𝐑𝐞𝐚𝐝𝐢𝐧𝐠:
1. The Evolving Threat Landscape: A Comprehensive Report on Scattered Spider
https://falconfeeds.io/blogs/scattered-spider-evolving-cyber-threat-report
2. Exclusive disclosure of the attack activities of the APT group NightEagle
3. Iran's Intelligence Group 13
https://dti.domaintools.com/irans-intelligence-group-13/
4. Beneath the Waves and Beyond: How Cybersecurity and Undersea Defense Stocks Are Rising to Meet Russia's Hybrid Threats
5. PLA’s Multi-Domain Reorganization: Cyberspace, Aerospace, and Information Support Forces Reshape the Threat Landscape
6. First Quarter 2025 Ransomware Trends
https://www.optiv.com/insights/discover/blog/first-quarter-2025-ransomware-trends
---
##Another static, unchangable root password in Cisco gear. In 2025.
##Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309) https://www.helpnetsecurity.com/2025/07/03/cisco-fixes-maximum-severity-flaw-in-enterprise-unified-comms-platform-cve-2025-20309/ #communication #vulnerability #enterprise #Don'tmiss #Hotstuff #Cisco #News #SMBs
##Cisco patches critical hardcoded credentials vulnerability in Unified Communications Manager
Cisco reports a maximum-severity vulnerability (CVE-2025-20309) in its Unified Communications Manager platforms caused by hardcoded static SSH credentials for the root account. The flaw allows unauthenticated remote attackers to gain complete administrative control over enterprise IP telephony networks.
**Obvious first step - isolate the SSH port of your CUCM and make it accessible from trusted networks only. Then VERY QUICLY update to versions 15.0.1.13010-1 through 15.0.1.13017-1, or apply the patches. Just isolating the CUCM isn't enough - the hardcoded password can be abused by malicious insiders, or other devices with access to trusted networks can be breached and the attackers can then breach CUCM.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/cisco-patches-critical-hardcoded-credentials-vulnerability-in-unified-communications-manager-i-k-5-m-e/gD2P6Ple2L
Cisco Issues Urgent Patch for Critical Unified CM Vulnerability (CVE-2025-20309) https://thecyberexpress.com/cisco-patches-cve-2025-20309-vulnerability/ #TheCyberExpressNews #Ciscovulnerability #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202520309 #UnifiedCMSME #CyberNews #UnifiedCM
##A note on the security advisory for CVE-2025-20309
in Cisco Unified Communications Manager which covers hard coded credentials - as I understand it this only impacts a special version of the product that users would have to contact TAC to get. If that is a correct understanding then I would expect this to limit the likelihood that organizations are running the impacted versions.
Quoting from the advisory:
##This vulnerability affects Cisco Unified CM and Unified CM SME Engineering Special (ES) releases 15.0.1.13010-1 through 15.0.1.13017-1, regardless of device configuration.
Note: ES releases are limited fix releases that are distributed only by the Cisco Technical Assistance Center (TAC).
@_newick NIST hasn't published it then. It's also available here: https://www.cve.org/CVERecord?id=CVE-2025-20309
##New.
CVE-2025-20309 (critical): Cisco Unified Communications Manager Static SSH Credentials Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-ssh-m4UBdpE7
- Cisco Spaces Connector Privilege Escalation Vulnerability - CVE-2025-20308 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spaces-conn-privesc-kgD2CcDU
- Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability - CVE-2025-20310 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CbtKtEYc
- Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability - CVE-2025-20307 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-O696ymRA @TalosSecurity #cybersecurity #infosec #Cisco
##Are you fucking kidding me Cisco? Again?
sev:CRIT 10.0
🥳
##A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted.
updated 2025-07-02T18:30:42
1 posts
New.
CVE-2025-20309 (critical): Cisco Unified Communications Manager Static SSH Credentials Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-ssh-m4UBdpE7
- Cisco Spaces Connector Privilege Escalation Vulnerability - CVE-2025-20308 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spaces-conn-privesc-kgD2CcDU
- Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability - CVE-2025-20310 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CbtKtEYc
- Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability - CVE-2025-20307 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-O696ymRA @TalosSecurity #cybersecurity #infosec #Cisco
##updated 2025-07-02T18:30:42
1 posts
New.
CVE-2025-20309 (critical): Cisco Unified Communications Manager Static SSH Credentials Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-ssh-m4UBdpE7
- Cisco Spaces Connector Privilege Escalation Vulnerability - CVE-2025-20308 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spaces-conn-privesc-kgD2CcDU
- Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability - CVE-2025-20310 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CbtKtEYc
- Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability - CVE-2025-20307 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-O696ymRA @TalosSecurity #cybersecurity #infosec #Cisco
##updated 2025-07-02T17:55:06.963000
3 posts
CISA warns of active attacks on Signal clone TeleMessage
CISA has issued a warning about two actively exploited vulnerabilities in TeleMessage TM SGNL, a Signal clone used by national security staffers and government officials, including a Spring Boot Actuator misconfiguration (CVE-2025-48927) that exposes memory dumps and a local access vulnerability (CVE-2025-48928) enabling password extraction.
**If you're using TeleMessage TM SGNL, start patching it today, because it's being actively exploited. Alternatively, stop using the software entirely. Switch back to standard Signal or another approved properly encrypted messaging app since TM SGNL has already been breached and continues to be attacked.**
#cybersecurity #infosec #attack #activeattack
https://beyondmachines.net/event_details/cisa-warns-of-active-attacks-on-signal-clone-telemessage-6-j-0-0-k/gD2P6Ple2L
CISA has added to the KEV catalogue:
- CVE-2025-48927: TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-48927
- CVE-2025-48928: TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-48928
From yesterday:
- CVE-2025-6543: Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-6543 #CISA #cybersecurity #infosec
##CVE ID: CVE-2025-48928
Vendor: TeleMessage
Product: TM SGNL
Date Added: 2025-07-01
Notes: It is recommended that mitigations be applied per vendor instructions if available. If these instructions cannot be located or if mitigations are unavailable, discontinue use of the product. ; https://nvd.nist.gov/vuln/detail/CVE-2025-48928
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-48928
updated 2025-07-02T15:31:43
1 posts
A bunch of Infinera and Nokia vulns got published today. Could be worth checking out based on where these specific systems tend to sit.
Infinera G42:
https://nvd.nist.gov/vuln/detail/CVE-2025-27021
https://nvd.nist.gov/vuln/detail/CVE-2025-27022
https://nvd.nist.gov/vuln/detail/CVE-2025-27023
https://nvd.nist.gov/vuln/detail/CVE-2025-27024
https://nvd.nist.gov/vuln/detail/CVE-2025-27025
Nokia Single RAN:
https://nvd.nist.gov/vuln/detail/CVE-2025-24328
https://nvd.nist.gov/vuln/detail/CVE-2025-24329
https://nvd.nist.gov/vuln/detail/CVE-2025-24330
https://nvd.nist.gov/vuln/detail/CVE-2025-24331
https://nvd.nist.gov/vuln/detail/CVE-2025-24332
https://nvd.nist.gov/vuln/detail/CVE-2025-24333
##updated 2025-07-02T15:31:43
1 posts
A bunch of Infinera and Nokia vulns got published today. Could be worth checking out based on where these specific systems tend to sit.
Infinera G42:
https://nvd.nist.gov/vuln/detail/CVE-2025-27021
https://nvd.nist.gov/vuln/detail/CVE-2025-27022
https://nvd.nist.gov/vuln/detail/CVE-2025-27023
https://nvd.nist.gov/vuln/detail/CVE-2025-27024
https://nvd.nist.gov/vuln/detail/CVE-2025-27025
Nokia Single RAN:
https://nvd.nist.gov/vuln/detail/CVE-2025-24328
https://nvd.nist.gov/vuln/detail/CVE-2025-24329
https://nvd.nist.gov/vuln/detail/CVE-2025-24330
https://nvd.nist.gov/vuln/detail/CVE-2025-24331
https://nvd.nist.gov/vuln/detail/CVE-2025-24332
https://nvd.nist.gov/vuln/detail/CVE-2025-24333
##updated 2025-07-02T15:31:43
1 posts
A bunch of Infinera and Nokia vulns got published today. Could be worth checking out based on where these specific systems tend to sit.
Infinera G42:
https://nvd.nist.gov/vuln/detail/CVE-2025-27021
https://nvd.nist.gov/vuln/detail/CVE-2025-27022
https://nvd.nist.gov/vuln/detail/CVE-2025-27023
https://nvd.nist.gov/vuln/detail/CVE-2025-27024
https://nvd.nist.gov/vuln/detail/CVE-2025-27025
Nokia Single RAN:
https://nvd.nist.gov/vuln/detail/CVE-2025-24328
https://nvd.nist.gov/vuln/detail/CVE-2025-24329
https://nvd.nist.gov/vuln/detail/CVE-2025-24330
https://nvd.nist.gov/vuln/detail/CVE-2025-24331
https://nvd.nist.gov/vuln/detail/CVE-2025-24332
https://nvd.nist.gov/vuln/detail/CVE-2025-24333
##updated 2025-07-02T15:31:43
1 posts
A bunch of Infinera and Nokia vulns got published today. Could be worth checking out based on where these specific systems tend to sit.
Infinera G42:
https://nvd.nist.gov/vuln/detail/CVE-2025-27021
https://nvd.nist.gov/vuln/detail/CVE-2025-27022
https://nvd.nist.gov/vuln/detail/CVE-2025-27023
https://nvd.nist.gov/vuln/detail/CVE-2025-27024
https://nvd.nist.gov/vuln/detail/CVE-2025-27025
Nokia Single RAN:
https://nvd.nist.gov/vuln/detail/CVE-2025-24328
https://nvd.nist.gov/vuln/detail/CVE-2025-24329
https://nvd.nist.gov/vuln/detail/CVE-2025-24330
https://nvd.nist.gov/vuln/detail/CVE-2025-24331
https://nvd.nist.gov/vuln/detail/CVE-2025-24332
https://nvd.nist.gov/vuln/detail/CVE-2025-24333
##updated 2025-07-02T15:31:42
1 posts
A bunch of Infinera and Nokia vulns got published today. Could be worth checking out based on where these specific systems tend to sit.
Infinera G42:
https://nvd.nist.gov/vuln/detail/CVE-2025-27021
https://nvd.nist.gov/vuln/detail/CVE-2025-27022
https://nvd.nist.gov/vuln/detail/CVE-2025-27023
https://nvd.nist.gov/vuln/detail/CVE-2025-27024
https://nvd.nist.gov/vuln/detail/CVE-2025-27025
Nokia Single RAN:
https://nvd.nist.gov/vuln/detail/CVE-2025-24328
https://nvd.nist.gov/vuln/detail/CVE-2025-24329
https://nvd.nist.gov/vuln/detail/CVE-2025-24330
https://nvd.nist.gov/vuln/detail/CVE-2025-24331
https://nvd.nist.gov/vuln/detail/CVE-2025-24332
https://nvd.nist.gov/vuln/detail/CVE-2025-24333
##updated 2025-07-02T15:31:37
1 posts
A bunch of Infinera and Nokia vulns got published today. Could be worth checking out based on where these specific systems tend to sit.
Infinera G42:
https://nvd.nist.gov/vuln/detail/CVE-2025-27021
https://nvd.nist.gov/vuln/detail/CVE-2025-27022
https://nvd.nist.gov/vuln/detail/CVE-2025-27023
https://nvd.nist.gov/vuln/detail/CVE-2025-27024
https://nvd.nist.gov/vuln/detail/CVE-2025-27025
Nokia Single RAN:
https://nvd.nist.gov/vuln/detail/CVE-2025-24328
https://nvd.nist.gov/vuln/detail/CVE-2025-24329
https://nvd.nist.gov/vuln/detail/CVE-2025-24330
https://nvd.nist.gov/vuln/detail/CVE-2025-24331
https://nvd.nist.gov/vuln/detail/CVE-2025-24332
https://nvd.nist.gov/vuln/detail/CVE-2025-24333
##updated 2025-07-02T15:30:44
2 posts
Remote code execution flaw reported in HIKVISION Security Management Platforms
HIKVISION reports a maximum-severity vulnerability (CVE-2025-34067) in its applyCT security management platform that allows unauthenticated remote code execution through a vulnerable Fastjson library, enabling attackers arbitrary code execution.
**If you have HIKVISION HikCentral security management systems, make sure it's isolated it from the internet and accessible only from trusted networks. Also block outbound LDAP connections, and then plan a quick patch cycle. Because isolation will never be enough with maximum severity flaw.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/remote-code-execution-flaw-reported-in-hikvision-security-management-platforms-6-d-6-l-l/gD2P6Ple2L
Remote code execution flaw reported in HIKVISION Security Management Platforms
HIKVISION reports a maximum-severity vulnerability (CVE-2025-34067) in its applyCT security management platform that allows unauthenticated remote code execution through a vulnerable Fastjson library, enabling attackers arbitrary code execution.
**If you have HIKVISION HikCentral security management systems, make sure it's isolated it from the internet and accessible only from trusted networks. Also block outbound LDAP connections, and then plan a quick patch cycle. Because isolation will never be enough with maximum severity flaw.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/remote-code-execution-flaw-reported-in-hikvision-security-management-platforms-6-d-6-l-l/gD2P6Ple2L
updated 2025-07-02T15:30:44
1 posts
IDK how old this disclosure is because once again, there's no date on the post. But the CVEs were just published today. Happy hacking.
https://ssd-disclosure.com/ssd-advisory-kerio-control-authentication-bypass-and-rce/
An analysis primarily of Kerio Control revealed a design flaw in the implementation of the communication with GFI AppManager, leading to an authentication bypass vulnerability in the product under audit. Once the authentication bypass is achieved, the attacker can cause the execution of arbitrary code and commands.
sev:CRIT 9.5 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
- https://nvd.nist.gov/vuln/detail/CVE-2025-34069
sev:CRIT 10.0 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
- https://nvd.nist.gov/vuln/detail/CVE-2025-34070
sev:CRIT 9.4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
- https://nvd.nist.gov/vuln/detail/CVE-2025-34071
updated 2025-07-02T15:30:44
1 posts
IDK how old this disclosure is because once again, there's no date on the post. But the CVEs were just published today. Happy hacking.
https://ssd-disclosure.com/ssd-advisory-kerio-control-authentication-bypass-and-rce/
An analysis primarily of Kerio Control revealed a design flaw in the implementation of the communication with GFI AppManager, leading to an authentication bypass vulnerability in the product under audit. Once the authentication bypass is achieved, the attacker can cause the execution of arbitrary code and commands.
sev:CRIT 9.5 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
- https://nvd.nist.gov/vuln/detail/CVE-2025-34069
sev:CRIT 10.0 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
- https://nvd.nist.gov/vuln/detail/CVE-2025-34070
sev:CRIT 9.4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
- https://nvd.nist.gov/vuln/detail/CVE-2025-34071
updated 2025-07-02T15:30:37
1 posts
IDK how old this disclosure is because once again, there's no date on the post. But the CVEs were just published today. Happy hacking.
https://ssd-disclosure.com/ssd-advisory-kerio-control-authentication-bypass-and-rce/
An analysis primarily of Kerio Control revealed a design flaw in the implementation of the communication with GFI AppManager, leading to an authentication bypass vulnerability in the product under audit. Once the authentication bypass is achieved, the attacker can cause the execution of arbitrary code and commands.
sev:CRIT 9.5 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
- https://nvd.nist.gov/vuln/detail/CVE-2025-34069
sev:CRIT 10.0 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
- https://nvd.nist.gov/vuln/detail/CVE-2025-34070
sev:CRIT 9.4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
- https://nvd.nist.gov/vuln/detail/CVE-2025-34071
updated 2025-07-02T14:20:25
1 posts
BoF in Python Pillow.
https://github.com/python-pillow/Pillow/security/advisories/GHSA-xg8h-j46f-w952
sev:HIGH 7.1 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
##Pillow is a Python imaging library. In versions 11.2.0 to before 11.3.0, there is a heap buffer overflow when writing a sufficiently large (>64k encoded with default settings) image in the DDS format due to writing into a buffer without checking for available space. This only affects users who save untrusted data as a compressed DDS image. This issue has been patched in version 11.3.0.
updated 2025-07-02T12:33:13
1 posts
A bunch of Infinera and Nokia vulns got published today. Could be worth checking out based on where these specific systems tend to sit.
Infinera G42:
https://nvd.nist.gov/vuln/detail/CVE-2025-27021
https://nvd.nist.gov/vuln/detail/CVE-2025-27022
https://nvd.nist.gov/vuln/detail/CVE-2025-27023
https://nvd.nist.gov/vuln/detail/CVE-2025-27024
https://nvd.nist.gov/vuln/detail/CVE-2025-27025
Nokia Single RAN:
https://nvd.nist.gov/vuln/detail/CVE-2025-24328
https://nvd.nist.gov/vuln/detail/CVE-2025-24329
https://nvd.nist.gov/vuln/detail/CVE-2025-24330
https://nvd.nist.gov/vuln/detail/CVE-2025-24331
https://nvd.nist.gov/vuln/detail/CVE-2025-24332
https://nvd.nist.gov/vuln/detail/CVE-2025-24333
##updated 2025-07-02T12:33:13
1 posts
Vulnerability in Synology Active Backup for Microsoft 365 exposes credentials, enables unauthorized access to Teams chats
Security researchers discovered a vulnerability (CVE-2025-4679) in Synology's Active Backup for Microsoft 365 that exposed a master credential in HTTP redirects, allowing attackers to gain unauthorized access to sensitive Microsoft 365 data across all organizations using the popular backup solution with over 1.2 million installations.
**If you use Synology's Active Backup for Microsoft 365, be aware that a critical flaw exposed your Microsoft 365 data to potential unauthorized access until recently. Even though Synology says they've fixed it, check your Microsoft 365 audit logs for any suspicious access and ensure your Synology system is fully updated. If developing applications, check if any of your responses contains secrets that shouldn't be there.**
#cybersecurity #infosec #advisory #databreach
https://beyondmachines.net/event_details/vulnerability-in-synology-active-backup-for-microsoft-365-exposes-credentials-enables-unauthorized-access-to-teams-chats-k-0-f-g-g/gD2P6Ple2L
updated 2025-07-02T12:32:17
1 posts
A bunch of Infinera and Nokia vulns got published today. Could be worth checking out based on where these specific systems tend to sit.
Infinera G42:
https://nvd.nist.gov/vuln/detail/CVE-2025-27021
https://nvd.nist.gov/vuln/detail/CVE-2025-27022
https://nvd.nist.gov/vuln/detail/CVE-2025-27023
https://nvd.nist.gov/vuln/detail/CVE-2025-27024
https://nvd.nist.gov/vuln/detail/CVE-2025-27025
Nokia Single RAN:
https://nvd.nist.gov/vuln/detail/CVE-2025-24328
https://nvd.nist.gov/vuln/detail/CVE-2025-24329
https://nvd.nist.gov/vuln/detail/CVE-2025-24330
https://nvd.nist.gov/vuln/detail/CVE-2025-24331
https://nvd.nist.gov/vuln/detail/CVE-2025-24332
https://nvd.nist.gov/vuln/detail/CVE-2025-24333
##updated 2025-07-02T12:32:17
1 posts
A bunch of Infinera and Nokia vulns got published today. Could be worth checking out based on where these specific systems tend to sit.
Infinera G42:
https://nvd.nist.gov/vuln/detail/CVE-2025-27021
https://nvd.nist.gov/vuln/detail/CVE-2025-27022
https://nvd.nist.gov/vuln/detail/CVE-2025-27023
https://nvd.nist.gov/vuln/detail/CVE-2025-27024
https://nvd.nist.gov/vuln/detail/CVE-2025-27025
Nokia Single RAN:
https://nvd.nist.gov/vuln/detail/CVE-2025-24328
https://nvd.nist.gov/vuln/detail/CVE-2025-24329
https://nvd.nist.gov/vuln/detail/CVE-2025-24330
https://nvd.nist.gov/vuln/detail/CVE-2025-24331
https://nvd.nist.gov/vuln/detail/CVE-2025-24332
https://nvd.nist.gov/vuln/detail/CVE-2025-24333
##updated 2025-07-02T09:30:34
1 posts
EUVD: Critical CVE-2024-13786: the education theme for WordPress is vulnerable to PHP Object Injection in all versions https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-54721
- CVE-2025-4689: Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to RCE Local File Inclusion https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-19688 @euvdfeed #cybersecurity #infosec #WordPress
##updated 2025-07-02T06:30:42
4 posts
Grave vulnerabilità di un plugin WordPress: oltre 600.000 siti a rischio.
Una grave vulnerabilità sta mettendo in allarme la comunità di WordPress, con oltre 600.000 siti web a rischio a causa di una falla nel plugin Forminator. L’exploit, identificato con il codice CVE-2025-6463, è stato classificato con un indice di gravità di 8.8 su 10 secondo il sistema CVSS, evidenziando il suo elevato grado di pericolosità.
#wordpress #vulnerabilita #wordpressplugin
https://www.ilsoftware.it/grave-vulnerabilita-di-un-plugin-wordpress-oltre-600-000-siti-a-rischio/
##WordPress – CVE-2025-6463 : cette faille dans le plugin Forminator menace plus de 400 000 sites Web ! https://www.it-connect.fr/wordpress-cve-2025-6463-cette-faille-dans-le-plugin-forminator-menace-plus-de-400-000-sites-web/ #ActuCybersécurité #Cybersécurité #Wordpress #Web
##WordPress Plugin flaw exposes over 600,000 websites to potential remote takeover
A critical vulnerability (CVE-2025-6463) in the Forminator WordPress plugin affecting over 600,000 installations allows unauthenticated attackers to delete arbitrary files, including critical WordPress files like wp-config.php. The flaw enable site takeover by forcing installations into setup mode after deleting wp-config.php and then connecting to a database they control.
**If you're using the Forminator WordPress plugin, immediately update to version 1.44.3 or later. Your WordPress site is exposed to the internet by design, so attackers will find it very quickly. Don't delay, updating a plugin in WordPress is quite easy. Then check your form submission logs for any suspicious entries that might indicate your site was already targeted.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/wordpress-plugin-flaw-exposes-over-600000-websites-to-potential-remote-takeover-l-f-1-0-v/gD2P6Ple2L
updated 2025-07-01T18:30:47
1 posts
Go hack more remote support shit.
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04878en_us&docLocale=en_US
Multiple security vulnerabilities have been identified in HPE Insight Remote Support. These vulnerabilities could remotely allow a directory traversal, disclosure of information, or code execution.
CVE-2025-37097 ( sev:MED 7.5 - :CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )
CVE-2025-37098 ( sev:MED 6.5 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
CVE-2025-37099 ( sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )
updated 2025-07-01T18:19:45.547000
4 posts
3 repos
https://github.com/grupooruss/Citrix-cve-2025-6543
https://github.com/seabed-atavism/CVE-2025-6543
https://github.com/abrewer251/CVE-2025-6543_CitrixNetScaler_PoC
CISA has added to the KEV catalogue:
- CVE-2025-48927: TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-48927
- CVE-2025-48928: TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-48928
From yesterday:
- CVE-2025-6543: Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-6543 #CISA #cybersecurity #infosec
##Citrix blog on CVE-2025-5777 and some other ones https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/
##CVE ID: CVE-2025-6543
Vendor: Citrix
Product: NetScaler ADC and Gateway
Date Added: 2025-06-30
Notes: https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 ; https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CVE-2025-6543 (citrix 🩸) hit KEV. that means confirmed exploitation with receipts. will wash dishes for payloads. bob [@] greynoise [.] io (some mastodon clients really bork email addresses) if you have'm.
##updated 2025-07-01T16:50:53.030000
3 posts
PoC for last month's ../ in Outlook.
##https://www.nu11secur1ty.com/2025/07/cve-2025-47176-microsoft-outlook-remote.html
##PoC for last month's ../ in Outlook.
##updated 2025-07-01T16:30:28.957000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-07-01T15:32:11
24 posts
3 repos
https://github.com/windz3r0day/CVE-2025-6554
🚨 The Cyber Intel Brief is live! 🚨
This week, suspected nation-state threat actors wasted no time exploiting a Chrome zero-day (CVE-2025-6554). Iranian cyber operations are escalating, AI-enhanced malware evasion techniques emerge and Scattered Spider is hitting aviation.
Check out the full breakdown and analysis 👇
https://bit.ly/3Tnumh3
#zeroday #Iran #cyberthreats #cyberthreatintelligence #cybersecurity
##CVE-2025-6554 is the fourth Chrome zero-day patched by Google in 2025 – Source: securityaffairs.com https://ciso2ciso.com/cve-2025-6554-is-the-fourth-chrome-zero-day-patched-by-google-in-2025-source-securityaffairs-com/ #rssfeedpostgeneratorecho #informationsecuritynews #ITInformationSecurity #SecurityAffairscom #CyberSecurityNews #PierluigiPaganini #SecurityAffairs #SecurityAffairs #BreakingNews #SecurityNews #hacking #Chrome
##Supposed PoC: https://github.com/DarkNavySecurity/PoC/blob/main/CVE-2025-6554/poc.js
##CVE ID: CVE-2025-6554
Vendor: Google
Product: Chromium V8
Date Added: 2025-07-02
Notes: https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html?m=1 ; https://nvd.nist.gov/vuln/detail/CVE-2025-6554
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-6554
CISA has added to the KEV catalogue.
- CVE-2025-6554: Google Chromium V8 Type Confusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-6554 #CISA #Google #cybersecurity #infosec
##Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update https://thehackernews.com/2025/07/google-patches-critical-zero-day-flaw.html
##CVE-2025-6554
该漏洞潜藏于Chrome核心引擎中,只需访问恶意网页,攻击者就能远程控制你的电脑。
网络安全研究人员证实,该漏洞正在真实攻击中被利用,企业数据和个人隐私面临裸奔风险。
@board
Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update – Source:thehackernews.com https://ciso2ciso.com/chrome-zero-day-cve-2025-6554-under-active-attack-google-issues-security-update-sourcethehackernews-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #Chrome
##@beyondmachines1 I know it's pedantic, but the Chrome advisory does not state that it is in fact EITW. It says that there is an exploit in the wild, but not that it's known to have been used successfully.
##Google is aware that an exploit for CVE-2025-6554 exists in the wild.
Google patches actively exploited flaw in Chrome
Google has patched an actively exploited zero-day vulnerability (CVE-2025-6554) in Chrome's V8 JavaScript engine that allows remote attackers to perform arbitrary read/write operations through malicious HTML pages. The flaw was reported by Google's Threat Analysis Group, which typically investigates government-backed attacks, suggesting potential state-sponsored exploitation.
**One more urgent patch for Chrome - Google is again patching an actively exploited flaw in Chrome, and exploitation is just a visit to a malicious site. DONT WAIT! Patch all your Chrome and Chromium browsers (Edge, Opera, Brave, Vivaldi...). Updating the browser is easy, all your tabs reopen after the patch.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/google-patches-actively-exploited-flaw-in-chrome-1-1-a-i-r/gD2P6Ple2L
Google Chrome 138 – CVE-2025-6554 : patchez pour vous protéger de cette nouvelle faille zero-day https://www.it-connect.fr/google-chrome-138-zero-day-cve-2025-6554/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #googlechrome
##Updated today:
NIST: High severity CVE-2025-6554 https://nvd.nist.gov/vuln/detail/CVE-2025-6554
The Hacker New: Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update https://thehackernews.com/2025/07/google-patches-critical-zero-day-flaw.html @thehackernews #Google #cybersecurity #Infosec #Chrome #zeroday
##"Google is aware that an exploit for CVE-2025-6554 exists in the wild," the browser vendor said in a security advisory issued on Monday. https://www.bleepingcomputer.com/news/security/google-fixes-fourth-actively-exploited-chrome-zero-day-of-2025/
##Google patches actively exploited Chrome (CVE‑2025‑6554) https://www.helpnetsecurity.com/2025/07/01/google-patches-actively-exploited-chrome-cve-2025-6554/ #securityupdate #MicrosoftEdge #Don'tmiss #Hotstuff #Vivaldi #Chrome #0-day #Brave #Opera #News
##Chrome patched a sev:HIGH
CVE with an ITW exploit.
Google is aware that an exploit for CVE-2025-6554 exists in the wild.
https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html
##updated 2025-07-01T15:31:16
1 posts
I don't understand the issue here. It's literally in the name of the company. 🥳
sev:CRIT 10.0 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
A cryptographic authentication bypass vulnerability exists in OneLogin AD Connector prior to 6.1.5 due to the exposure of a tenant’s SSO JWT signing key via the /api/adc/v4/configuration endpoint. An attacker in possession of the signing key can craft valid JWT tokens impersonating arbitrary users within a OneLogin tenant. The tokens allow authentication to the OneLogin SSO portal and all downstream applications federated via SAML or OIDC. This allows full unauthorized access across the victim’s SaaS environment.
https://nvd.nist.gov/vuln/detail/CVE-2025-34063
sev:CRIT 9.0 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N
##A cloud infrastructure misconfiguration in OneLogin AD Connector results in log data being sent to a hardcoded S3 bucket (onelogin-adc-logs-production) without validating bucket ownership. An attacker who registers this unclaimed bucket can begin receiving log files from other OneLogin tenants. These logs may contain sensitive data such as directory tokens, user metadata, and environment configuration. This enables cross-tenant leakage of secrets, potentially allowing JWT signing key recovery and user impersonation.
updated 2025-07-01T15:31:16
1 posts
Go hack more remote support shit.
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04878en_us&docLocale=en_US
Multiple security vulnerabilities have been identified in HPE Insight Remote Support. These vulnerabilities could remotely allow a directory traversal, disclosure of information, or code execution.
CVE-2025-37097 ( sev:MED 7.5 - :CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )
CVE-2025-37098 ( sev:MED 6.5 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
CVE-2025-37099 ( sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )
updated 2025-07-01T15:31:10
1 posts
I don't understand the issue here. It's literally in the name of the company. 🥳
sev:CRIT 10.0 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
A cryptographic authentication bypass vulnerability exists in OneLogin AD Connector prior to 6.1.5 due to the exposure of a tenant’s SSO JWT signing key via the /api/adc/v4/configuration endpoint. An attacker in possession of the signing key can craft valid JWT tokens impersonating arbitrary users within a OneLogin tenant. The tokens allow authentication to the OneLogin SSO portal and all downstream applications federated via SAML or OIDC. This allows full unauthorized access across the victim’s SaaS environment.
https://nvd.nist.gov/vuln/detail/CVE-2025-34063
sev:CRIT 9.0 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N
##A cloud infrastructure misconfiguration in OneLogin AD Connector results in log data being sent to a hardcoded S3 bucket (onelogin-adc-logs-production) without validating bucket ownership. An attacker who registers this unclaimed bucket can begin receiving log files from other OneLogin tenants. These logs may contain sensitive data such as directory tokens, user metadata, and environment configuration. This enables cross-tenant leakage of secrets, potentially allowing JWT signing key recovery and user impersonation.
updated 2025-07-01T12:31:05
1 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH
by ASR, though the CVSS scores are eight sev:MED
and two sev:HIGH
.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T12:31:05
1 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH
by ASR, though the CVSS scores are eight sev:MED
and two sev:HIGH
.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T12:31:05
1 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH
by ASR, though the CVSS scores are eight sev:MED
and two sev:HIGH
.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T12:31:05
1 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH
by ASR, though the CVSS scores are eight sev:MED
and two sev:HIGH
.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T12:31:05
1 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH
by ASR, though the CVSS scores are eight sev:MED
and two sev:HIGH
.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T12:31:05
1 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH
by ASR, though the CVSS scores are eight sev:MED
and two sev:HIGH
.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T09:30:40
1 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH
by ASR, though the CVSS scores are eight sev:MED
and two sev:HIGH
.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T09:30:40
1 posts
July is starting off with a perfect 10 in some OT kit. 🥳
https://certvde.com/en/advisories/VDE-2025-045/
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.
https://nvd.nist.gov/vuln/detail/CVE-2025-41656
https://certvde.com/en/advisories/VDE-2025-039/
sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##An unauthenticated remote attacker can bypass the login to the web application of the affected devices making it possible to access and change all available settings of the IndustrialPI.
updated 2025-07-01T09:30:40
1 posts
July is starting off with a perfect 10 in some OT kit. 🥳
https://certvde.com/en/advisories/VDE-2025-045/
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.
https://nvd.nist.gov/vuln/detail/CVE-2025-41656
https://certvde.com/en/advisories/VDE-2025-039/
sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##An unauthenticated remote attacker can bypass the login to the web application of the affected devices making it possible to access and change all available settings of the IndustrialPI.
updated 2025-07-01T03:31:37
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-07-01T03:31:36
1 posts
Post-auth sev:HIGH
code injection and argument injection vulns in Ansible Automation Platform.
A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability allows an authenticated attacker to inject arguments and execute arbitrary commands on the EDA worker. In Kubernetes/OpenShift environments, this can lead to service account token theft and cluster access.
https://bugzilla.redhat.com/show_bug.cgi?id=2370812
https://nvd.nist.gov/vuln/detail/CVE-2025-49520
##A flaw was found in the EDA component of the Ansible Automation Platform, where user-supplied Git branch or refspec values are evaluated as Jinja2 templates. This vulnerability allows authenticated users to inject expressions that execute commands or access sensitive files on the EDA worker. In OpenShift, it can lead to service account token theft.
updated 2025-06-30T22:16:54
1 posts
Not yet evaluated means no risk yet, right?
##Orkes Conductor v3.21.11 allows remote attackers to execute arbitrary OS commands through unrestricted access to Java classes.
updated 2025-06-30T21:30:54
11 posts
7 repos
https://github.com/mylovem313/CVE-2025-32462
https://github.com/cybersentinelx1/CVE-2025-32462-Exploit
https://github.com/Hacksparo/CVE-2025-32462
https://github.com/CryingN/CVE-2025-32462
https://github.com/SpongeBob-369/cve-2025-32462
Who is right with this sudo vulnerability? The CVSS reported or the VLAI severity model?
#sudo #vulnerability #vulnerabilitymanagement #threatintel
🔗 https://vulnerability.circl.lu/vuln/CVE-2025-32462#sightings
##Linux – Obtenez un accès root avec ces deux failles dans sudo : CVE-2025-32462 et CVE-2025-32463 https://www.it-connect.fr/linux-acces-root-avec-deux-failles-dans-sudo-cve-2025-32462-et-cve-2025-32463/ #ActuCybersécurité #Vulnérabilités #Cybersécurité #Linux
##CVE-2025-32462: sudo: LPE via host option https://access.redhat.com/security/cve/cve-2025-32462
##CVE-2025-32463 and CVE-2025-32462: Sudo Local Privilege Escalation Vulnerabilities Threaten Linux Environments – Source: socprime.com https://ciso2ciso.com/cve-2025-32463-and-cve-2025-32462-sudo-local-privilege-escalation-vulnerabilities-threaten-linux-environments-source-socprime-com/ #rssfeedpostgeneratorecho #PrivilageEscalation #CyberSecurityNews #CVE-2025-32462 #CVE-2025-32463 #Latestthreats #Vulnerability #socprimecom #socprime #Blog #CVE
##update sudo yall https://nvd.nist.gov/vuln/detail/CVE-2025-32462
##I think I boosted information about these sudo EoP vulns yesterday but in case I didn't, here's some basic info on them.
https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host
sev:LOW 2.8 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.
https://nvd.nist.gov/vuln/detail/CVE-2025-32462
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
sev:CRIT 9.3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463) https://www.helpnetsecurity.com/2025/07/01/sudo-local-privilege-escalation-vulnerabilities-fixed-cve-2025-32462-cve-2025-32463/ #vulnerability #Stratascale #Don'tmiss #Hotstuff #Debian #Ubuntu #Linux #macOS #News #SUSE
##Sudo versions 1.9.14 to 1.9.17 (inclusive) have two critical vulnerabilities:
- local privilege escalation via chroot option (CVE-2025-32463) https://www.openwall.com/lists/oss-security/2025/06/30/3
- local privilege escalation via host option (CVE-2025-32462) https://www.openwall.com/lists/oss-security/2025/06/30/2
𝐬𝐮𝐝𝐨 -𝐡 𝐡𝐨𝐬𝐭
Turns out the "h" stands for "hold my beer". 🍺 😅
⬇️
Local Privilege Escalation via host option
Sudo’s host (-h or --host) option is intended to be used in conjunction with the list option (-l or --list) to list a user’s sudo privileges on a host other than the current one. However, due to a bug it was not restricted to listing privileges and could be used when running a command via sudo or editing a file with sudoedit. Depending on the rules present in the sudoers file this could allow a local privilege escalation attack.
Sudo versions 1.8.8 to 1.9.17 inclusive are affected.
👇
https://www.sudo.ws/security/advisories/host_any/
[related]
Vulnerability Advisory: Sudo Host Option Elevation of Privilege
👇
https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host
Setting up sudo (1.9.13p3-1+deb12u2) ...
Et hop, CVE-2025-32462 ne passera pas par moi. https://tracker.debian.org/news/1649978/accepted-sudo-1913p3-1deb12u2-source-into-stable-security/
##updated 2025-06-30T21:15:32.730000
1 posts
1 repos
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T19:15:24.117000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T18:38:48.477000
1 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-30T18:38:23.493000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T18:38:23.493000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T18:38:23.493000
1 posts
Internet. Of. Shit.
##Unauthenticated users on an adjacent network with the Sight Bulb Pro can run shell commands as root through a vulnerable proprietary TCP protocol available on Port 16668. This vulnerability allows an attacker to run arbitrary commands on the Sight Bulb Pro by passing a well formed JSON string.
updated 2025-06-30T18:38:23.493000
1 posts
That's kind of a fun PrivEsc.
sev:CRIT 9.3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##The Debian zuluPolkit/CMakeLists.txt file for zuluCrypt through the zulucrypt_6.2.0-1 package has insecure PolicyKit allow_any/allow_inactive/allow_active settings that allow a local user to escalate their privileges to root.
updated 2025-06-30T15:30:38
1 posts
Fucking Ubiquiti showing they're the Tesla of networking yet again.
sev:CRIT 9.9 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
##Multiple Authenticated SQL Injection vulnerabilities found in UISP Application (Version 2.4.206 and earlier) could allow a malicious actor with low privileges to escalate privileges.
updated 2025-06-30T09:30:35
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T09:30:30
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T09:30:30
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T06:30:33
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T06:30:33
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##🚨 HIGH severity vuln: Tenda AC5 (15.03.06.47) stack buffer overflow in /goform/openSchedWifi (CVE-2025-6886). Remote exploit public. Restrict access & monitor for fixes! https://radar.offseq.com/threat/cve-2025-6886-stack-based-buffer-overflow-in-tenda-25c90c53 #OffSeq #Vuln #IoT #Tenda
##updated 2025-06-30T03:30:39
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T21:31:30
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T18:31:47
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T18:31:47
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T18:31:47
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T18:31:47
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T18:30:43
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T15:31:41
1 posts
Researchers report flaw in Open VSX Registry that can compromise VS Code extensions marketplace
Cybersecurity researchers disclosed a critical vulnerability (CVE-2025-6705) in the Open VSX Registry that could have allowed attackers to gain complete control over the Visual Studio Code extensions marketplace by exploiting the automated publishing mechanism to steal high-privilege tokens and distribute malicious updates to millions of developer environments. The Eclipse Foundation patched the vulnerability on June 25, 2025.
**When designing your CI/CD system, review what code will it run and whether it will expose your API keys and other secrets to untrusted third party code that may be malicious. If your CI/CD will run such code, consider levels of isolation or use API keys that are for that session only with limited permissions. Yes, this is very difficult, but it's part of the complexity of running any code from anyone.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/researchers-report-flaw-in-open-vsx-registry-that-can-compromise-vs-code-extensions-marketplace-b-8-f-8-r/gD2P6Ple2L
updated 2025-06-27T14:15:32.593000
1 posts
1 repos
More information on printer security, since they are often a cybersecurity blind spot!
Last week, we shared a warning about the unpatchable Brother printer vulnerability (CVE-2024-51978) that puts millions of devices at risk. If you haven’t updated your default admin passwords, do it now.
Since there was a lot of interest in this topic, we're sharing our classic, but still very relevant, on-demand webinar, "How I met your printer": https://youtu.be/b6d6RO2AFgw
@tompohl shares real-world techniques attackers use to exploit printers for initial access and lateral movement—exactly what we see in our penetration tests all the time.
If you haven’t tested your print infrastructure, now’s the time. Need help? Our pentest team can assess your network and highlight hidden vulnerabilities.
#Cybersecurity #CISO #PrinterSecurity #PenetrationTesting #LMGSecurity #NetworkSecurity #Infosec #ITsecurity
#penetrationtesting #pentest #pentesting
updated 2025-06-27T12:32:19
1 posts
1 repos
Cette faille critique dans MegaRAC menace des milliers de serveurs, y compris ceux éteints ! https://www.it-connect.fr/faille-ami-megarac-cve-2024-54085/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##updated 2025-06-27T06:31:22
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T06:31:22
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T03:30:47
1 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-27T03:30:47
1 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-27T03:30:47
1 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-27T03:30:47
1 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-27T03:30:41
1 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-27T00:32:15
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T00:32:15
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:22
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:21
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:20
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:20
1 posts
4 repos
https://github.com/grupooruss/CVE-2025-20281-Cisco
https://github.com/ill-deed/Cisco-CVE-2025-20281-illdeed
https://github.com/abrewer251/CVE-2025-20281-2-Cisco-ISE-RCE
🚨CVE-2025-20281 & CVE-2025-20282: Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC
• CVSS: 10
• ZoomEye Dork: app="Cisco ISE"
• Results: 1,937
• Advisory:
github.com/advisories/GHSA-rc4f-42xm-hvjwgithub.com/advisories/GHSA-w8p2-wjjr-hr24
• PoC: github.com/abrewer251/CVE-2025-20281-2-Citrix-ISE-RCE
• ZoomEye Search: zoomeye.ai/searchResult?q=YXBwPSJDaXNjbyBJU0Ui
—————
Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership. 💙
##updated 2025-06-26T21:31:13
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:13
1 posts
🚨CVE-2025-20281 & CVE-2025-20282: Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC
• CVSS: 10
• ZoomEye Dork: app="Cisco ISE"
• Results: 1,937
• Advisory:
github.com/advisories/GHSA-rc4f-42xm-hvjwgithub.com/advisories/GHSA-w8p2-wjjr-hr24
• PoC: github.com/abrewer251/CVE-2025-20281-2-Citrix-ISE-RCE
• ZoomEye Search: zoomeye.ai/searchResult?q=YXBwPSJDaXNjbyBJU0Ui
—————
Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership. 💙
##updated 2025-06-26T21:31:13
1 posts
updated 2025-06-26T21:31:09
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:09
1 posts
Oh hey, now if the baddies get your box, you can privesc to get it back.
https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1002/
##Incorrect Permission Assignment for Critical Resource in the TeamViewer Client (Full and Host) of TeamViewer Remote and Tensor prior Version 15.67 on Windows allows a local unprivileged user to trigger arbitrary file deletion with SYSTEM privileges via leveraging the MSI rollback mechanism. The vulnerability only applies to the Remote Management features: Backup, Monitoring, and Patch Management.
updated 2025-06-26T21:31:09
1 posts
updated 2025-06-26T21:31:08
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:08
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:08
1 posts
updated 2025-06-26T21:31:08
1 posts
sigh
sev:CRIT 9.3 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
A hardcoded credential vulnerability exists in the Blue Angel Software Suite deployed on embedded Linux systems. The application contains multiple known default and hardcoded user accounts that are not disclosed in public documentation. These accounts allow unauthenticated or low-privilege attackers to gain administrative access to the device’s web interface.
And those creds are:
##
blueangel:blueangel
root:abnareum10
root:Admin@tbroad
root:superuser
user:user
guest:guest
updated 2025-06-26T21:31:08
1 posts
LMAO. It's an older vuln and was added to CNVD in 2020 but just got a CVE last week. 🥳
sev:CRIT 10.0 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
An OS command injection vulnerability exists in the Chinese versions of Sangfor Endpoint Detection and Response (EDR) management platform versions 3.2.16, 3.2.17, and 3.2.19. The vulnerability allows unauthenticated attackers to construct and send malicious HTTP requests to the EDR Manager interface, leading to arbitrary command execution with elevated privileges. This flaw only affects the Chinese-language EDR builds.
https://www.cnvd.org.cn/flaw/show/CNVD-2020-46552
https://nvd.nist.gov/vuln/detail/CVE-2025-34041
And FWIW, ShadowServer shows EITW in CN.
##updated 2025-06-26T18:58:14.280000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:58:14.280000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:58:14.280000
1 posts
Wait, we're still doing port knocking? I thought that was a lost art that got snuffed out by the "obscurity does not provide security" nerds.
https://github.com/mbuesch/letmein/security/advisories/GHSA-jpv7-p47h-f43j
##Letmein is an authenticating port knocker. Prior to version 10.2.1, The connection limiter is implemented incorrectly. It allows an arbitrary amount of simultaneously incoming connections (TCP, UDP and Unix socket) for the services letmeind and letmeinfwd. Therefore, the command line option num-connections is not effective and does not limit the number of simultaneously incoming connections. This issue has been patched in version 10.2.1.
updated 2025-06-26T18:58:14.280000
1 posts
Oh my. Perfect 10 ../
in a KVM server management panel.
https://github.com/ConvoyPanel/panel/security/advisories/GHSA-43g3-qpwq-hfgg
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##Convoy is a KVM server management panel for hosting businesses. In versions 3.9.0-rc3 to before 4.4.1, there is a directory traversal vulnerability in the LocaleController component of Performave Convoy. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious locale and namespace parameters. This allows the attacker to include and execute arbitrary PHP files on the server. This issue has been patched in version 4.4.1. A temporary workaround involves implementing strict Web Application Firewall (WAF) rules to incoming requests targeting the vulnerable endpoints.
updated 2025-06-26T18:58:14.280000
1 posts
updated 2025-06-26T18:57:43.670000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:57:43.670000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:57:43.670000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:57:43.670000
1 posts
Oof.
https://www.ibm.com/support/pages/node/7237967
sev:CRIT 9.0 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
##IBM WebSphere Application Server 8.5 and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially crafted sequence of serialized objects.
updated 2025-06-26T18:57:43.670000
1 posts
Wat
sev:HIGH 8.8 - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform enumeration.
updated 2025-06-26T18:31:35
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:31:34
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:31:34
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-25T20:13:52.420000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-25T20:13:30.100000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-25T20:09:56.243000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-25T20:09:28.010000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-24T21:30:28
1 posts
Get your Flippers out.
##An issue in Realtek RTL8762EKF-EVB RTL8762E SDK v1.4.0 allows attackers to cause a Denial of Service (DoS) via sending a crafted before a pairing public key is received during a Bluetooth connection attempt.
updated 2025-06-24T19:00:21
1 posts
Woohoo! Another perfect 10 from last week. And this could hit hard. 🥳
https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users' code hosted on the same instance. This issue has been patched in version 0.13.3.
updated 2025-06-23T21:31:56
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T21:31:56
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T20:16:21.633000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T20:16:21.633000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T20:16:21.633000
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T18:54:52.400000
2 posts
2 repos
https://github.com/enochgitgamefied/CVE-2025-27636-Practical-Lab
Unit42 has a good write-up on some ITW Tomcat and Camel shenanigans exploiting CVE-2025-24813, CVE-2025-27636, and CVE-2025-29891. IOCs in the post.
But does anyone know if this is a typo by the article or if there are actual files with the .sesson
extension? Seems like a good indicator to search on if it's not a typo.
As noted in our earlier analysis, exploits for CVE-2025-24813 use a name appended by
.sesson
in the initial HTTP request. This.session
file contains the code the vulnerable host will run if an exploit is successful.
Edit: Confirmed typo per this response: https://infosec.exchange/@0xThiebaut/114789994690646411
https://unit42.paloaltonetworks.com/apache-cve-2025-24813-cve-2025-27636-cve-2025-29891/
##🟥𝐋𝐂𝐒𝐂-𝐈𝐄 𝐃𝐚𝐢𝐥𝐲 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐅𝐢𝐧𝐝𝐢𝐧𝐠𝐬-𝟑 𝐉𝐮𝐥𝐲 𝟐𝟎𝟐𝟓🟥
𝐍𝐞𝐰𝐬:
1. Microsoft to Lay Off 9,000 Employees, Affecting 4% of Workforce
2. Hunters International Ransomware Shuts Down, Offers Free Decryptors to Victims
3. UK charity bank branded a 'disaster' after platform migration goes wrong
https://www.theregister.com/2025/07/03/uk_charity_bank_migration_disaster/
4. Police warn of SMS scams following prison sentence for criminal who conducted smishing campaign
5. Large Language Models (LLMs) Are Falling for Phishing Scams: What Happens When AI Gives You the Wrong URL?
https://www.netcraft.com/blog/large-language-models-are-falling-for-phishing-scams
6. Russia’s Cyber Warriors Assail NATO-Linked Private Companies
https://cepa.org/article/russias-cyber-warriors-assail-nato-linked-private-companies/
7. US probes negotiator suspected of taking crypto ransomware money
https://cointelegraph.com/news/digitalmint-employee-under-investigation-by-us-justice-department
8. Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
9. Spain arrests hackers who targeted politicians and journalists
https://policia.es/_es/comunicacion_prensa_detalle.php?ID=16602
10. A third of organisations take more than 90 days to remediate threats
---
𝐆𝐥𝐨𝐛𝐚𝐥 𝐁𝐫𝐞𝐚𝐜𝐡 𝐍𝐞𝐰𝐬 𝐚𝐧𝐝 𝐃𝐚𝐭𝐚 𝐋𝐞𝐚𝐤𝐬:
1. Irish Eyecare software firm Ocuco investigating cyber-attack
https://thecurrency.news/articles/194653/eyecare-software-firm-ocuco-investigating-cyber-attack/
---
𝐓𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐑𝐞𝐩𝐨𝐫𝐭𝐬 𝐰𝐢𝐭𝐡 𝐈𝐎𝐂𝐬:
1. Apache Under the Lens: Tomcat’s Partial PUT and Camel’s Header Hijack
https://unit42.paloaltonetworks.com/apache-cve-2025-24813-cve-2025-27636-cve-2025-29891/
2. Snake Keyloggers Exploit Java Tools to Bypass Security – Active IOCs
3. Who are DragonForce Ransomware Group?
https://www.bridewell.com/insights/blogs/detail/who-are-dragonforce-ransomware-group
4. Silent Push Uncovers Chinese Fake Marketplace e-Commerce Phishing Campaign Using Thousands of Websites to Spoof Popular Retail Brands
5. Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
https://www.wiz.io/blog/exposed-jdwp-exploited-in-the-wild
6. Malvertising Campaign Delivers Oyster/Broomstick Backdoor via SEO Poisoning and Trojanized Tools
7. North Korean APT Kimsuky aka Black Banshee – Active IOCs
https://rewterz.com/threat-advisory/north-korean-apt-kimsuky-aka-black-banshee-active-iocs-52
8. DarkTortilla Malware – Active IOCs
https://rewterz.com/threat-advisory/darktortilla-malware-active-iocs-2
---
𝐀𝐏𝐓 𝐈𝐎𝐂𝐬:
1. Lazarus: Source VT
yourdomainhost[.]store
api[.]yourdomainhost[.]store
2. Kimsuky: Source Validin
Accounts-mysticete[.]servepics[.]com
freedrive[.]servehttp[.]com
login-accounts[.]servehttp[.]com
myaccounts-profile[.]servehttp[.]com
mydocs[.]onthewifi[.]com
securedrive-mofa[.]servehttp[.]com
translate[.]onthewifi[.]com
undocs[.]ddns[.]net
undocs[.]myvnc[.]com
undocs[.]servehttp[.]com
---
𝐓𝐡𝐫𝐞𝐚𝐭 𝐇𝐮𝐧𝐭𝐢𝐧𝐠 / 𝐃𝐅𝐈𝐑 / 𝐌𝐚𝐥𝐰𝐚𝐫𝐞:
1. Automating macOS Incident Response: DFIR-as-Code in Action Against AppleProcessHub
2. Using Staging Folders For Threat Hunting
https://www.knowyouradversary.ru/2025/07/183-using-staging-folders-for-threat.html
3. PDFs: Portable documents, or perfect deliveries for phish?
https://blog.talosintelligence.com/pdfs-portable-documents-or-perfect-deliveries-for-phish/
4. EscapeRoute: Breaking the Scope of Anthropic’s Filesystem MCP Server
(CVE-2025-53109 & CVE-2025-53110)
5. Yet another ZIP trick
https://hackarcana.com/article/yet-another-zip-trick
6. Malware development trick 48: leveraging Office macros for malware. Simple VBA example.
https://cocomelonc.github.io/malware/2025/07/01/malware-tricks-48.html
7. Hijacked by a Text: Understanding and Preventing SIM Swapping Attack
https://www.bitsight.com/blog/what-is-sim-swapping
8. CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries
9. DanaBot Lab Analysis
https://omer-secure.medium.com/danabot-lab-analysis-7dbaa179f3e4
10. ClickFix Campaign: How Clipboard Injection Leads to RAT Infection (Part 1)
11. Release Notes: Detonation Actions, Enhanced QR Extraction, and 1,400+ New Detection Rules
https://any.run/cybersecurity-blog/release-notes-june-2025/
12. Inside Android Malware Development: Building a C2 Exfiltrator from the UI to the Network
---
𝐋𝐢𝐠𝐡𝐭 𝐑𝐞𝐚𝐝𝐢𝐧𝐠:
1. Pro-Russian hacktivism: Shifting alliances, new groups and risks
https://intel471.com/blog/pro-russian-hacktivism-shifting-alliances-new-groups-and-risks
2. Insider Risk Lessons from the DPRK IT Worker Crackdown
https://www.dtexsystems.com/blog/insider-risk-lessons-from-dprk-crackdown/
3. Calling Out Russia: France’s Shift on Public Attribution
https://warontherocks.com/2025/07/calling-out-russia-frances-shift-on-public-attribution/
4. Outsourced Trust: How Coinbase's $400M Problem Started in an Indian Call Center
https://www.reco.ai/blog/coinbase-breach
---
##updated 2025-06-23T18:30:33
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T15:31:43
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-22T18:30:39
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-22T18:30:31
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-21T00:30:38
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-21T00:30:38
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-21T00:30:37
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-21T00:30:37
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-20T22:21:17
1 posts
6 repos
https://github.com/63square/CVE-2025-49132
https://github.com/melonlonmeo/CVE-2025-49132
https://github.com/Zen-kun04/CVE-2025-49132
https://github.com/nfoltc/CVE-2025-49132
FYI: There is a ton of scanning for this one for some reason.
/locales/locale.json?locale=../../../pterodactyl&namespace=config/database
/locales/locale.json?locale=../../config/&namespace=database
updated 2025-06-20T21:32:14
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-20T21:32:14
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-20T21:32:13
1 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-17T15:31:16
17 posts
6 repos
https://github.com/RaR1991/citrix_bleed_2
https://github.com/RickGeex/CVE-2025-5777-CitrixBleed
https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
https://github.com/orange0Mint/CitrixBleed-2-CVE-2025-5777
Updated scan results for CVE-2025-5777: https://github.com/GossiTheDog/scanning/blob/main/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt
It's still partial due to bugs, but about 18k servers.
##Posted yesterday.
WatchTower: How Much More Must We Bleed? - Citrix NetScaler Memory Disclosure (CitrixBleed 2 CVE-2025-5777) https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/ @watchtower #Citrix #cybersecurity #infosec
##Updated scan results for CVE-2025-5777: https://github.com/GossiTheDog/scanning/blob/main/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt
It's still partial due to bugs, but about 18k servers.
##Posted yesterday.
WatchTower: How Much More Must We Bleed? - Citrix NetScaler Memory Disclosure (CitrixBleed 2 CVE-2025-5777) https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/ @watchtower #Citrix #cybersecurity #infosec
##CVE-2025-5777 Detection: A New Critical Vulnerability Dubbed “CitrixBleed 2” in NetScaler ADC Faces Exploitation Risk – Source: socprime.com https://ciso2ciso.com/cve-2025-5777-detection-a-new-critical-vulnerability-dubbed-citrixbleed-2-in-netscaler-adc-faces-exploitation-risk-source-socprime-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #CVE-2025-5777 #Latestthreats #Vulnerability #CitrixBleed2 #socprimecom #socprime #Blog #CVE
##First exploitation details for CVE-2025-5777 - the Netscaler vuln - are out. https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/
If you call the login page, it leaks memory in the response 🤣
I don’t want to specify too much extra technical info on this yet - but if you keep leaking the memory via requests, there’s a way to reestablish existing ICA sessions from the leaked memory.
##Have not read this yet, but I'm going to assume it's good... and entertaining.
@GossiTheDog This is what you were talking about right? 🙂
##How Much More Must We Bleed? - Citrix NetScaler Memory Disclosure (CitrixBleed 2 CVE-2025-5777) - watchTowr Labs https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/
##Heads up—CitrixBleed 2 reopens old wounds! CVE-2025-5777 puts NetScaler ADC at high risk, enabling user session hijacks & auth bypass. Detect potential exploitation attempts with the latest Sigma rule from SOC Prime Platform.
##I've published my scan in progress of CVE-2025-5777 patching status, listing IPs, hostnames, Citrix Netscaler build numbers and if they're vulnerable to CitrixBleed2.
The scan isn't finished yet so these are only about a quarter of the results - unfortunately my coding skills are shite and it's really slow - should be finished over weekend or early next week.
Also, the SSL certificate hostnames are separated by comma which throws out CSV - sorry, I'll fix that later.
##Further suggestions CVE-2025-5777 details will release next week. https://xcancel.com/Horizon3Attack/status/1940879804221522279 via https://horizon3.ai
##I expect technical details of CVE-2025-5777 exploitation to become available next week.
##If you see this GitHub PoC for CVE-2025-5777 doing the rounds:
https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
It’s not for CVE-2025-5777. It’s AI generated. The links in the README still have ChatGPT UTM sources.
The PoC itself is for a vuln addressed in 2023 - ChatGPT has hallucinated (made up) the cause of the vuln using an old BishopFox write up of the other vuln.
##Citrix blog on CVE-2025-5777 and some other ones https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/
##CVE ID: CVE-2025-6543
Vendor: Citrix
Product: NetScaler ADC and Gateway
Date Added: 2025-06-30
Notes: https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 ; https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CitrixBleed 2 might be actively exploited (CVE-2025-5777) https://www.helpnetsecurity.com/2025/06/30/citrixbleed-2-might-be-actively-exploited-cve-2025-5777/ #vulnerability #enterprise #ReliaQuest #Don'tmiss #NetScaler #Hotstuff #Censys #Citrix #News
##updated 2025-06-13T22:15:27
2 posts
1 repos
https://github.com/ashiqrehan-21/MCP-Inspector-CVE-2025-49596
Critical remote code execution flaw reported in Anthropic's MCP Inspector tool
Cybersecurity researchers disclosed a critical vulnerability (CVE-2025-49596, CVSS 9.4) in Anthropic's Model Context Protocol (MCP) Inspector debugging tool that allows remote code execution on developer machines through browser-based attacks exploiting the "0.0.0.0 Day" vulnerability and lack of authentication in default configurations. Attackers can compromise developer systems by tricking them into visiting malicious websites that send unauthorized commands to locally running MCP Inspector instances.
**If you're using Anthropic's MCP Inspector for AI development upgrade to version 0.14.1 or later. There is a fairly trivial exploit of your MCP Inspector tool that only requires you to visit a malicious site for your laptop to be fully compromised. So don't ignore this, update your MCP Inspector.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-remote-code-execution-flaw-reported-in-anthropic-s-mcp-inspector-tool-j-z-u-3-t/gD2P6Ple2L
Critical RCE in Anthropic MCP Inspector (CVE-2025-49596) Enables Browser-Based Exploits | Oligo Security https://www.oligo.security/blog/critical-rce-vulnerability-in-anthropic-mcp-inspector-cve-2025-49596
##updated 2025-06-12T18:31:14
1 posts
🚨CVE-2025-22157: Privilege Escalation Vulnerability in Jira Core Data Center
——————
Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership.
##updated 2025-06-12T16:06:39.330000
1 posts
2 repos
Rank 3: CVE-2025-33073
Product: Microsoft Windows
CVSS: High (8.8)
A privilege-escalation vulnerability in Microsoft Windows Kerberos authentication over SMB allows a low-privileged attacker to coerce a Windows host into authenticating to their system and then relay its computer account's Kerberos ticket back to itself, resulting in NT AUTHORITY\SYSTEM access.
Post by @RedTeamPentesting:
https://mastodon.social/@RedTeamPentesting/114663688487284108
updated 2025-05-28T18:33:28
3 posts
CISA warns of active attacks on Signal clone TeleMessage
CISA has issued a warning about two actively exploited vulnerabilities in TeleMessage TM SGNL, a Signal clone used by national security staffers and government officials, including a Spring Boot Actuator misconfiguration (CVE-2025-48927) that exposes memory dumps and a local access vulnerability (CVE-2025-48928) enabling password extraction.
**If you're using TeleMessage TM SGNL, start patching it today, because it's being actively exploited. Alternatively, stop using the software entirely. Switch back to standard Signal or another approved properly encrypted messaging app since TM SGNL has already been breached and continues to be attacked.**
#cybersecurity #infosec #attack #activeattack
https://beyondmachines.net/event_details/cisa-warns-of-active-attacks-on-signal-clone-telemessage-6-j-0-0-k/gD2P6Ple2L
CISA has added to the KEV catalogue:
- CVE-2025-48927: TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-48927
- CVE-2025-48928: TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-48928
From yesterday:
- CVE-2025-6543: Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-6543 #CISA #cybersecurity #infosec
##CVE ID: CVE-2025-48927
Vendor: TeleMessage
Product: TM SGNL
Date Added: 2025-07-01
Notes: It is recommended that mitigations be applied per vendor instructions if available. If these instructions cannot be located or if mitigations are unavailable, discontinue use of the product. ; https://nvd.nist.gov/vuln/detail/CVE-2025-48927
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-48927
updated 2025-04-11T00:51:21.963000
1 posts
Other options:
Exfiltrator
Malicious Payload
CVE-2010-2772
updated 2025-04-03T13:23:54
2 posts
37 repos
https://github.com/iSee857/CVE-2025-24813-PoC
https://github.com/charis3306/CVE-2025-24813
https://github.com/gregk4sec/CVE-2025-24813
https://github.com/Mattb709/CVE-2025-24813-Scanner
https://github.com/beyond-devsecops/CVE-2025-24813
https://github.com/hakankarabacak/CVE-2025-24813
https://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813
https://github.com/Erosion2020/CVE-2025-24813-vulhub
https://github.com/x1ongsec/CVE-2025-24813
https://github.com/maliqto/PoC-CVE-2025-24813
https://github.com/absholi7ly/POC-CVE-2025-24813
https://github.com/u238/Tomcat-CVE_2025_24813
https://github.com/AlperenY-cs/CVE-2025-24813
https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813
https://github.com/manjula-aw/CVE-2025-24813
https://github.com/GadaLuBau1337/CVE-2025-24813
https://github.com/Heimd411/CVE-2025-24813-noPoC
https://github.com/f8l124/CVE-2025-24813-POC
https://github.com/La3B0z/CVE-2025-24813-POC
https://github.com/msadeghkarimi/CVE-2025-24813-Exploit
https://github.com/yaleman/cve-2025-24813-poc
https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE
https://github.com/tonyarris/CVE-2025-24813-PoC
https://github.com/Alaatk/CVE-2025-24813-POC
https://github.com/B1gN0Se/Tomcat-CVE-2025-24813
https://github.com/imbas007/CVE-2025-24813-apache-tomcat
https://github.com/issamjr/CVE-2025-24813-Scanner
https://github.com/horsehacks/CVE-2025-24813-checker
https://github.com/N0c1or/CVE-2025-24813_POC
https://github.com/Eduardo-hardvester/CVE-2025-24813
https://github.com/AsaL1n/CVE-2025-24813
https://github.com/ps-interactive/lab-cve-2025-24813
https://github.com/fatkz/CVE-2025-24813
https://github.com/Franconyu/Poc_for_CVE-2025-24813
Unit42 has a good write-up on some ITW Tomcat and Camel shenanigans exploiting CVE-2025-24813, CVE-2025-27636, and CVE-2025-29891. IOCs in the post.
But does anyone know if this is a typo by the article or if there are actual files with the .sesson
extension? Seems like a good indicator to search on if it's not a typo.
As noted in our earlier analysis, exploits for CVE-2025-24813 use a name appended by
.sesson
in the initial HTTP request. This.session
file contains the code the vulnerable host will run if an exploit is successful.
Edit: Confirmed typo per this response: https://infosec.exchange/@0xThiebaut/114789994690646411
https://unit42.paloaltonetworks.com/apache-cve-2025-24813-cve-2025-27636-cve-2025-29891/
##🟥𝐋𝐂𝐒𝐂-𝐈𝐄 𝐃𝐚𝐢𝐥𝐲 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐅𝐢𝐧𝐝𝐢𝐧𝐠𝐬-𝟑 𝐉𝐮𝐥𝐲 𝟐𝟎𝟐𝟓🟥
𝐍𝐞𝐰𝐬:
1. Microsoft to Lay Off 9,000 Employees, Affecting 4% of Workforce
2. Hunters International Ransomware Shuts Down, Offers Free Decryptors to Victims
3. UK charity bank branded a 'disaster' after platform migration goes wrong
https://www.theregister.com/2025/07/03/uk_charity_bank_migration_disaster/
4. Police warn of SMS scams following prison sentence for criminal who conducted smishing campaign
5. Large Language Models (LLMs) Are Falling for Phishing Scams: What Happens When AI Gives You the Wrong URL?
https://www.netcraft.com/blog/large-language-models-are-falling-for-phishing-scams
6. Russia’s Cyber Warriors Assail NATO-Linked Private Companies
https://cepa.org/article/russias-cyber-warriors-assail-nato-linked-private-companies/
7. US probes negotiator suspected of taking crypto ransomware money
https://cointelegraph.com/news/digitalmint-employee-under-investigation-by-us-justice-department
8. Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
9. Spain arrests hackers who targeted politicians and journalists
https://policia.es/_es/comunicacion_prensa_detalle.php?ID=16602
10. A third of organisations take more than 90 days to remediate threats
---
𝐆𝐥𝐨𝐛𝐚𝐥 𝐁𝐫𝐞𝐚𝐜𝐡 𝐍𝐞𝐰𝐬 𝐚𝐧𝐝 𝐃𝐚𝐭𝐚 𝐋𝐞𝐚𝐤𝐬:
1. Irish Eyecare software firm Ocuco investigating cyber-attack
https://thecurrency.news/articles/194653/eyecare-software-firm-ocuco-investigating-cyber-attack/
---
𝐓𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐑𝐞𝐩𝐨𝐫𝐭𝐬 𝐰𝐢𝐭𝐡 𝐈𝐎𝐂𝐬:
1. Apache Under the Lens: Tomcat’s Partial PUT and Camel’s Header Hijack
https://unit42.paloaltonetworks.com/apache-cve-2025-24813-cve-2025-27636-cve-2025-29891/
2. Snake Keyloggers Exploit Java Tools to Bypass Security – Active IOCs
3. Who are DragonForce Ransomware Group?
https://www.bridewell.com/insights/blogs/detail/who-are-dragonforce-ransomware-group
4. Silent Push Uncovers Chinese Fake Marketplace e-Commerce Phishing Campaign Using Thousands of Websites to Spoof Popular Retail Brands
5. Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
https://www.wiz.io/blog/exposed-jdwp-exploited-in-the-wild
6. Malvertising Campaign Delivers Oyster/Broomstick Backdoor via SEO Poisoning and Trojanized Tools
7. North Korean APT Kimsuky aka Black Banshee – Active IOCs
https://rewterz.com/threat-advisory/north-korean-apt-kimsuky-aka-black-banshee-active-iocs-52
8. DarkTortilla Malware – Active IOCs
https://rewterz.com/threat-advisory/darktortilla-malware-active-iocs-2
---
𝐀𝐏𝐓 𝐈𝐎𝐂𝐬:
1. Lazarus: Source VT
yourdomainhost[.]store
api[.]yourdomainhost[.]store
2. Kimsuky: Source Validin
Accounts-mysticete[.]servepics[.]com
freedrive[.]servehttp[.]com
login-accounts[.]servehttp[.]com
myaccounts-profile[.]servehttp[.]com
mydocs[.]onthewifi[.]com
securedrive-mofa[.]servehttp[.]com
translate[.]onthewifi[.]com
undocs[.]ddns[.]net
undocs[.]myvnc[.]com
undocs[.]servehttp[.]com
---
𝐓𝐡𝐫𝐞𝐚𝐭 𝐇𝐮𝐧𝐭𝐢𝐧𝐠 / 𝐃𝐅𝐈𝐑 / 𝐌𝐚𝐥𝐰𝐚𝐫𝐞:
1. Automating macOS Incident Response: DFIR-as-Code in Action Against AppleProcessHub
2. Using Staging Folders For Threat Hunting
https://www.knowyouradversary.ru/2025/07/183-using-staging-folders-for-threat.html
3. PDFs: Portable documents, or perfect deliveries for phish?
https://blog.talosintelligence.com/pdfs-portable-documents-or-perfect-deliveries-for-phish/
4. EscapeRoute: Breaking the Scope of Anthropic’s Filesystem MCP Server
(CVE-2025-53109 & CVE-2025-53110)
5. Yet another ZIP trick
https://hackarcana.com/article/yet-another-zip-trick
6. Malware development trick 48: leveraging Office macros for malware. Simple VBA example.
https://cocomelonc.github.io/malware/2025/07/01/malware-tricks-48.html
7. Hijacked by a Text: Understanding and Preventing SIM Swapping Attack
https://www.bitsight.com/blog/what-is-sim-swapping
8. CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries
9. DanaBot Lab Analysis
https://omer-secure.medium.com/danabot-lab-analysis-7dbaa179f3e4
10. ClickFix Campaign: How Clipboard Injection Leads to RAT Infection (Part 1)
11. Release Notes: Detonation Actions, Enhanced QR Extraction, and 1,400+ New Detection Rules
https://any.run/cybersecurity-blog/release-notes-june-2025/
12. Inside Android Malware Development: Building a C2 Exfiltrator from the UI to the Network
---
𝐋𝐢𝐠𝐡𝐭 𝐑𝐞𝐚𝐝𝐢𝐧𝐠:
1. Pro-Russian hacktivism: Shifting alliances, new groups and risks
https://intel471.com/blog/pro-russian-hacktivism-shifting-alliances-new-groups-and-risks
2. Insider Risk Lessons from the DPRK IT Worker Crackdown
https://www.dtexsystems.com/blog/insider-risk-lessons-from-dprk-crackdown/
3. Calling Out Russia: France’s Shift on Public Attribution
https://warontherocks.com/2025/07/calling-out-russia-frances-shift-on-public-attribution/
4. Outsourced Trust: How Coinbase's $400M Problem Started in an Indian Call Center
https://www.reco.ai/blog/coinbase-breach
---
##updated 2025-03-19T15:44:53
2 posts
Unit42 has a good write-up on some ITW Tomcat and Camel shenanigans exploiting CVE-2025-24813, CVE-2025-27636, and CVE-2025-29891. IOCs in the post.
But does anyone know if this is a typo by the article or if there are actual files with the .sesson
extension? Seems like a good indicator to search on if it's not a typo.
As noted in our earlier analysis, exploits for CVE-2025-24813 use a name appended by
.sesson
in the initial HTTP request. This.session
file contains the code the vulnerable host will run if an exploit is successful.
Edit: Confirmed typo per this response: https://infosec.exchange/@0xThiebaut/114789994690646411
https://unit42.paloaltonetworks.com/apache-cve-2025-24813-cve-2025-27636-cve-2025-29891/
##🟥𝐋𝐂𝐒𝐂-𝐈𝐄 𝐃𝐚𝐢𝐥𝐲 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐅𝐢𝐧𝐝𝐢𝐧𝐠𝐬-𝟑 𝐉𝐮𝐥𝐲 𝟐𝟎𝟐𝟓🟥
𝐍𝐞𝐰𝐬:
1. Microsoft to Lay Off 9,000 Employees, Affecting 4% of Workforce
2. Hunters International Ransomware Shuts Down, Offers Free Decryptors to Victims
3. UK charity bank branded a 'disaster' after platform migration goes wrong
https://www.theregister.com/2025/07/03/uk_charity_bank_migration_disaster/
4. Police warn of SMS scams following prison sentence for criminal who conducted smishing campaign
5. Large Language Models (LLMs) Are Falling for Phishing Scams: What Happens When AI Gives You the Wrong URL?
https://www.netcraft.com/blog/large-language-models-are-falling-for-phishing-scams
6. Russia’s Cyber Warriors Assail NATO-Linked Private Companies
https://cepa.org/article/russias-cyber-warriors-assail-nato-linked-private-companies/
7. US probes negotiator suspected of taking crypto ransomware money
https://cointelegraph.com/news/digitalmint-employee-under-investigation-by-us-justice-department
8. Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
9. Spain arrests hackers who targeted politicians and journalists
https://policia.es/_es/comunicacion_prensa_detalle.php?ID=16602
10. A third of organisations take more than 90 days to remediate threats
---
𝐆𝐥𝐨𝐛𝐚𝐥 𝐁𝐫𝐞𝐚𝐜𝐡 𝐍𝐞𝐰𝐬 𝐚𝐧𝐝 𝐃𝐚𝐭𝐚 𝐋𝐞𝐚𝐤𝐬:
1. Irish Eyecare software firm Ocuco investigating cyber-attack
https://thecurrency.news/articles/194653/eyecare-software-firm-ocuco-investigating-cyber-attack/
---
𝐓𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐑𝐞𝐩𝐨𝐫𝐭𝐬 𝐰𝐢𝐭𝐡 𝐈𝐎𝐂𝐬:
1. Apache Under the Lens: Tomcat’s Partial PUT and Camel’s Header Hijack
https://unit42.paloaltonetworks.com/apache-cve-2025-24813-cve-2025-27636-cve-2025-29891/
2. Snake Keyloggers Exploit Java Tools to Bypass Security – Active IOCs
3. Who are DragonForce Ransomware Group?
https://www.bridewell.com/insights/blogs/detail/who-are-dragonforce-ransomware-group
4. Silent Push Uncovers Chinese Fake Marketplace e-Commerce Phishing Campaign Using Thousands of Websites to Spoof Popular Retail Brands
5. Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
https://www.wiz.io/blog/exposed-jdwp-exploited-in-the-wild
6. Malvertising Campaign Delivers Oyster/Broomstick Backdoor via SEO Poisoning and Trojanized Tools
7. North Korean APT Kimsuky aka Black Banshee – Active IOCs
https://rewterz.com/threat-advisory/north-korean-apt-kimsuky-aka-black-banshee-active-iocs-52
8. DarkTortilla Malware – Active IOCs
https://rewterz.com/threat-advisory/darktortilla-malware-active-iocs-2
---
𝐀𝐏𝐓 𝐈𝐎𝐂𝐬:
1. Lazarus: Source VT
yourdomainhost[.]store
api[.]yourdomainhost[.]store
2. Kimsuky: Source Validin
Accounts-mysticete[.]servepics[.]com
freedrive[.]servehttp[.]com
login-accounts[.]servehttp[.]com
myaccounts-profile[.]servehttp[.]com
mydocs[.]onthewifi[.]com
securedrive-mofa[.]servehttp[.]com
translate[.]onthewifi[.]com
undocs[.]ddns[.]net
undocs[.]myvnc[.]com
undocs[.]servehttp[.]com
---
𝐓𝐡𝐫𝐞𝐚𝐭 𝐇𝐮𝐧𝐭𝐢𝐧𝐠 / 𝐃𝐅𝐈𝐑 / 𝐌𝐚𝐥𝐰𝐚𝐫𝐞:
1. Automating macOS Incident Response: DFIR-as-Code in Action Against AppleProcessHub
2. Using Staging Folders For Threat Hunting
https://www.knowyouradversary.ru/2025/07/183-using-staging-folders-for-threat.html
3. PDFs: Portable documents, or perfect deliveries for phish?
https://blog.talosintelligence.com/pdfs-portable-documents-or-perfect-deliveries-for-phish/
4. EscapeRoute: Breaking the Scope of Anthropic’s Filesystem MCP Server
(CVE-2025-53109 & CVE-2025-53110)
5. Yet another ZIP trick
https://hackarcana.com/article/yet-another-zip-trick
6. Malware development trick 48: leveraging Office macros for malware. Simple VBA example.
https://cocomelonc.github.io/malware/2025/07/01/malware-tricks-48.html
7. Hijacked by a Text: Understanding and Preventing SIM Swapping Attack
https://www.bitsight.com/blog/what-is-sim-swapping
8. CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries
9. DanaBot Lab Analysis
https://omer-secure.medium.com/danabot-lab-analysis-7dbaa179f3e4
10. ClickFix Campaign: How Clipboard Injection Leads to RAT Infection (Part 1)
11. Release Notes: Detonation Actions, Enhanced QR Extraction, and 1,400+ New Detection Rules
https://any.run/cybersecurity-blog/release-notes-june-2025/
12. Inside Android Malware Development: Building a C2 Exfiltrator from the UI to the Network
---
𝐋𝐢𝐠𝐡𝐭 𝐑𝐞𝐚𝐝𝐢𝐧𝐠:
1. Pro-Russian hacktivism: Shifting alliances, new groups and risks
https://intel471.com/blog/pro-russian-hacktivism-shifting-alliances-new-groups-and-risks
2. Insider Risk Lessons from the DPRK IT Worker Crackdown
https://www.dtexsystems.com/blog/insider-risk-lessons-from-dprk-crackdown/
3. Calling Out Russia: France’s Shift on Public Attribution
https://warontherocks.com/2025/07/calling-out-russia-frances-shift-on-public-attribution/
4. Outsourced Trust: How Coinbase's $400M Problem Started in an Indian Call Center
https://www.reco.ai/blog/coinbase-breach
---
##updated 2025-02-21T18:31:09
1 posts
5 repos
https://github.com/shacojx/CVE-2025-1094-Exploit
https://github.com/aninfosec/CVE-2025-1094
https://github.com/ishwardeepp/CVE-2025-1094-PoC-Postgre-SQLi
Rank 1: CVE-2025-1094 "CitrixBleed 2"
Product: NetScaler ADC
CVSS: Critical (9.3)
A vulnerability in the input validation of NetScaler Application Delivery Controller (ADC) allows an unauthenticated remote attacker to read memory when configured as a Gateway or AAA virtual server. The memory may include sensitive information like session tokens.
Post by @GossiTheDog:
https://cyberplace.social/@GossiTheDog/114738804627230757
updated 2025-01-14T15:31:02
1 posts
10 repos
https://github.com/UMChacker/CVE-2024-55591-POC
https://github.com/sysirq/fortios-auth-bypass-exploit-CVE-2024-55591
https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591
https://github.com/sysirq/fortios-auth-bypass-poc-CVE-2024-55591
https://github.com/virus-or-not/CVE-2024-55591
https://github.com/0x7556/CVE-2024-55591
https://github.com/binarywarm/exp-cmd-add-admin-vpn-CVE-2024-55591
https://github.com/rawtips/CVE-2024-55591
https://github.com/exfil0/CVE-2024-55591-POC
https://github.com/watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591
🚨Alleged Sale of Mass Exploit for FortiGate targeting CVE-2024-55591
##updated 2025-01-13T15:21:41
1 posts
21 repos
https://github.com/tucommenceapousser/CVE-2019-11932deta
https://github.com/tucommenceapousser/CVE-2019-11932
https://github.com/SmoZy92/CVE-2019-11932
https://github.com/BadAssAiras/hello
https://github.com/Tabni/https-github.com-awakened1712-CVE-2019-11932
https://github.com/Err0r-ICA/WhatsPayloadRCE
https://github.com/infiniteLoopers/CVE-2019-11932
https://github.com/JasonJerry/WhatsRCE
https://github.com/awakened1712/CVE-2019-11932
https://github.com/primebeast/CVE-2019-11932
https://github.com/valbrux/CVE-2019-11932-SupportApp
https://github.com/fastmo/CVE-2019-11932
https://github.com/k3vinlusec/WhatsApp-Double-Free-Vulnerability_CVE-2019-11932
https://github.com/mRanonyMousTZ/CVE-2019-11932-whatsApp-exploit
https://github.com/dashtic172/https-github.com-awakened171
https://github.com/zxn1/CVE-2019-11932
https://github.com/0759104103/cd-CVE-2019-11932
https://github.com/kal1gh0st/WhatsAppHACK-RCE
https://github.com/TulungagungCyberLink/CVE-2019-11932
Reproducing a million-dollar bug: WhatsApp CVE-2019-11932 https://www.ibm.com/think/x-force/reproducing-million-dollar-bug-whatsapp-cve-2019-11932-afl-frida
##updated 2025-01-08T16:05:13
2 posts
1 repos
@Sempf Are you specifically asking about EITW when the mitigation for CVE-2024-50379 was applied or regardless of the CVE-2024-50379 mitigation since CVE-2024-56337 was basically a bypass for the incomplete CVE-2024-50379 fix, right?
##Hey vulnerability people: Any scuttlebutt on active exploitation of CVE-2024-56337? It isn't in the KEV but ... well ....
##updated 2025-01-03T12:30:31
1 posts
16 repos
https://github.com/Yuri08loveElaina/CVE-2024-50379-POC
https://github.com/dkstar11q/CVE-2024-50379-nuclei
https://github.com/dragonked2/CVE-2024-50379-POC
https://github.com/Alchemist3dot14/CVE-2024-50379
https://github.com/JFOZ1010/Nuclei-Template-CVE-2024-50379
https://github.com/thunww/CVE-2024-50379
https://github.com/Yuri08loveElaina/CVE-2024-50379
https://github.com/dear-cell/CVE-2024-50379
https://github.com/YuoLuo/tomcat_cve_2024_50379_exploit
https://github.com/iSee857/CVE-2024-50379-PoC
https://github.com/SleepingBag945/CVE-2024-50379
https://github.com/pwnosec/CVE-2024-50379
https://github.com/v3153/CVE-2024-50379-POC
https://github.com/gomtaengi/CVE-2024-50379-exp
@Sempf Are you specifically asking about EITW when the mitigation for CVE-2024-50379 was applied or regardless of the CVE-2024-50379 mitigation since CVE-2024-56337 was basically a bypass for the incomplete CVE-2024-50379 fix, right?
##updated 2024-12-27T18:15:23.677000
1 posts
1 repos
Oh, goodie. Another botnet. This one is exploiting CVE-2024-3721 and CVE-2024-12856 in DVRs and routers to launch DDoS attacks.
https://www.fortinet.com/blog/threat-research/rondobox-unveiled-breaking-down-a-botnet-threat
IOCs
Hosts
45[.]135[.]194[.]34
83[.]150[.]218[.]93
14[.]103[.]145[.]202
14[.]103[.]145[.]211
154[.]91[.]254[.]95
78[.]153[.]149[.]90Files
Downloader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: @Dio9sys @da_667 since this seems like the kind of thing you might want to sig / tag.
##updated 2024-12-23T20:38:21
1 posts
Woohoo! Another perfect 10 from last week. And this could hit hard. 🥳
https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users' code hosted on the same instance. This issue has been patched in version 0.13.3.
updated 2024-11-21T09:50:26.493000
2 posts
@uecker I'm thinking cases like https://curl.se/docs/CVE-2024-6874.html etc
##@uecker I'm thinking cases like https://curl.se/docs/CVE-2024-6874.html etc
##updated 2024-04-13T12:30:30
1 posts
Oh, goodie. Another botnet. This one is exploiting CVE-2024-3721 and CVE-2024-12856 in DVRs and routers to launch DDoS attacks.
https://www.fortinet.com/blog/threat-research/rondobox-unveiled-breaking-down-a-botnet-threat
IOCs
Hosts
45[.]135[.]194[.]34
83[.]150[.]218[.]93
14[.]103[.]145[.]202
14[.]103[.]145[.]211
154[.]91[.]254[.]95
78[.]153[.]149[.]90Files
Downloader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: @Dio9sys @da_667 since this seems like the kind of thing you might want to sig / tag.
##updated 2024-04-04T05:23:52
1 posts
New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.
Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if needed
Scanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting
##updated 2024-04-04T04:29:06
2 posts
11 repos
https://github.com/Chinyemba-ck/MOVEit-CVE-2023-34362
https://github.com/deepinstinct/MOVEit_CVE-2023-34362_IOCs
https://github.com/aditibv/MOVEit-CVE-2023-34362
https://github.com/toorandom/moveit-payload-decrypt-CVE-2023-34362
https://github.com/errorfiathck/MOVEit-Exploit
https://github.com/horizon3ai/CVE-2023-34362
https://github.com/kenbuckler/MOVEit-CVE-2023-34362
https://github.com/Malwareman007/CVE-2023-34362
https://github.com/sfewer-r7/CVE-2023-34362
Okay, I spent some time going through some of my MOVEit logs and I think I see at least part of what's going on with the increase in MOVEit scans noted by @greynoise.
One thing I have noticed is a group of GCP hosts performing high volume scans against the MOVEit servers every seven days, but not against adjacent servers or other servers for the same orgs. This kind of makes it look targeted but the scans are generic kitchen sink vuln scans.
I did notice that some of these and other scanners I've seen over the past few months now have a couple requests that appear to be testing for CVE-2023-34362 mixed in to their other requests. It's like they loaded their automated scanners with updated payload lists.
There are a lot of Cloudflare and AWS IPs in the logs, as indicated by GreyNoise in their blog post. There are not a lot of unique Google IPs but I'm seeing a ton of noise from the ones I do see. But only every seven days. The servers I have logs for all block Tencent so I can't confirm the activity from their infrastructure.
I have also put my juicy eyes on every single GET and POST sent to these MOVEit Transfer servers for the past 60 days and I do not see any payloads that appear to be new or novel. That's not to say there isn't anything new going on, but I'm now comfortable with treating MOVEit servers with the same concern as before the GreyNoise blog post as I don't see any indication of impending action. There may be some WAF or rate limit or geolocation filter testing going on that's disguised as generic scans, but I have no evidence to suggest that's the case.
Caveat: I have relatively low visibility into what's going on at scale like GreyNoise does so take this with a grain of salt and if it's of interest, go confirm it yourself. This is intended to be informational, not actionable.
##New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.
Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if needed
Scanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting
##updated 2023-09-18T05:03:19
1 posts
Somehow I missed this CVE when it came out in 2022.
I think it's called a Jackson-in-the-Middle attack.
Certain 5400 RPM hard drives, ... allow physically proximate attackers to cause a ... device malfunction ... via a resonant-frequency attack with the audio signal from the Rhythm Nation music video.
I like that CVE links to a YouTube video where someone tried to reproduce it.
##🔒 NetAlertX <25.6.7 faces a CRITICAL auth bypass (CVE-2025-48952). PHP's loose comparison allows attackers to skip password checks via 'magic hashes.' Patch to 25.6.7+ ASAP! https://radar.offseq.com/threat/cve-2025-48952-cwe-697-incorrect-comparison-in-jok-5232e6b3 #OffSeq #NetAlertX #CVE202548952 #infosec
##LOL. Whoopsie.
https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489
sev:CRIT 9.4 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
##NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the
==
operator at line 40 in front/index.php. This introduces a security issue where specially crafted "magic hash" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of==
instead of the strict===
, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain "weird" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability.
LOL. Whoopsie.
https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489
sev:CRIT 9.4 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
##NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the
==
operator at line 40 in front/index.php. This introduces a security issue where specially crafted "magic hash" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of==
instead of the strict===
, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain "weird" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability.
4 posts
4 repos
https://github.com/0xcan1337/CVE-2025-47812-poC
https://github.com/ill-deed/WingFTP-CVE-2025-47812-illdeed
Critical vulnerability in Wing FTP Server enables remote code execution, server takeover
A maximum-severity vulnerability (CVE-2025-47812) in Wing FTP Server allows unauthenticated attackers to achieve complete system compromise through NULL byte injection in the username parameter at the /loginok.html endpoint, enabling arbitrary Lua code execution with root or SYSTEM privileges.
**If you're running Wing FTP Server (any version up to 7.4.3), time to make an URGENT patch, because hackers can easily hijack the entire server. Immediately update to version 7.4.4 or isolate the server from the internet, then plan a quick patch. Patching for this issue is not optional!**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerability-in-wing-ftp-server-enables-remote-code-execution-server-takeover-l-7-n-o-7/gD2P6Ple2L
🚨CVE-2025-47812: Wing FTP Server Remote Code Execution (RCE) Exploit
Link: https://github.com/4m3rr0r/CVE-2025-47812-poc
Writeup: https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/
##RCE Security has found major vulnerabilities in the Wind FTP server.
Attackers can bypass authentication on the server's web interface just by appending a NULL byte to the username followed by any random string.
https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/
##What the NULL?! Wing FTP Server RCE (CVE-2025-47812) https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/
##sev:HIGH 8.4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
##DjVuLibre is a GPL implementation of DjVu, a web-centric format for distributing documents and images. Prior to version 3.5.29, the MMRDecoder::scanruns method is affected by an OOB-write vulnerability, because it does not check that the xr pointer stays within the bounds of the allocated buffer. This can lead to writes beyond the allocated memory, resulting in a heap corruption condition. An out-of-bounds read with pr is also possible for the same reason. This issue has been patched in version 3.5.29.
Whoopsie. DoS in ModSecurity.
https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-gw9c-4wfm-vj3x
sev:MED 6.5 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
##ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. In versions 2.9.8 to before 2.9.11, an empty XML tag can cause a segmentation fault. If SecParseXmlIntoArgs is set to On or OnlyArgs, and the request type is application/xml, and at least one XML tag is empty (eg ), then a segmentation fault occurs. This issue has been patched in version 2.9.11. A workaround involves setting SecParseXmlIntoArgs to Off.
AMD advisory, from yesterday. Medium severity:
CVE-2025-0038: Zynq™ UltraScale+™ SoC Overwriting Protected Memory Regions Through PMU Firmware https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8008.html #AMD #cybersecurity #infosec
##Hilarious LFI in Linkwarden.
https://github.com/linkwarden/linkwarden/security/advisories/GHSA-rfc2-x8hr-536q
sev:HIGH 8.7 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
##Linkwarden is a self-hosted, open-source collaborative bookmark manager to collect, organize and archive webpages. In version 2.10.2, the server accepts links of format file:///etc/passwd and doesn't do any validation before sending them to parsers and playwright, this can result in leak of other user's links (and in some cases it might be possible to leak environment secrets). This issue has been patched in version 2.10.3 which has not been made public at time of publication.
Remote code execution in CentOS Web Panel - CVE-2025-48703 https://fenrisk.com/rce-centos-webpanel
##2 posts
6 repos
https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC
https://github.com/timsonner/CVE-2025-49144-Research
https://github.com/Vr00mm/CVE-2025-49144
https://github.com/b0ySie7e/Notepad-8.8.1_CVE-2025-49144
CVE Record: CVE-2025-49144 - Notepad++ Privilege Escalation In Installer Via Uncontrolled Executable Search Path #SuggestedRead #devopsish https://www.cve.org/CVERecord?id=CVE-2025-49144
##Command injection in the discussion-to-slack workflow in gluestack-ui.
https://github.com/gluestack/gluestack-ui/security/advisories/GHSA-432r-9455-7f9x
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
##gluestack-ui is a library of copy-pasteable components & patterns crafted with Tailwind CSS (NativeWind). Prior to commit e6b4271, a command injection vulnerability was discovered in the discussion-to-slack.yml GitHub Actions workflow. Untrusted discussion fields (title, body, etc.) were directly interpolated into shell commands in a run: block. An attacker could craft a malicious GitHub Discussion title or body (e.g., $(curl ...)) to execute arbitrary shell commands on the Actions runner. This issue has been fixed in commit e6b4271 where the discussion-to-slack.yml workflow was removed. Users should remove the discussion-to-slack.yml workflow if using a fork or derivative of this repository.
I know a bunch of you nerds like playing with ESP32s, etc.
sev:HIGH 8.7 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
##ESPAsyncWebServer is an asynchronous HTTP and WebSocket server library for ESP32, ESP8266, RP2040 and RP2350. In versions up to and including 3.7.8, a CRLF (Carriage Return Line Feed) injection vulnerability exists in the construction and output of HTTP headers within
AsyncWebHeader.cpp
. Unsanitized input allows attackers to inject CR (\r
) or LF (\n
) characters into header names or values, leading to arbitrary header or response manipulation. Manipulation of HTTP headers and responses can enable a wide range of attacks, making the severity of this vulnerability high. A fix is available at pull request 211 and is expected to be part of version 3.7.9.