24h | 7d | 30d

Overview

  • UTT
  • 进取 520W

06 Dec 2025
Published
06 Dec 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A flaw has been found in UTT 进取 520W 1.7.7-180627. The impacted element is the function strcpy of the file /goform/formArpBindConfig. Executing manipulation of the argument pools can lead to buffer overflow. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 4 hours ago

Fediverse

Profile picture

🔎 CVE-2025-14141: HIGH severity buffer overflow in UTT 进取 520W (v1.7.7-180627) via /goform/formArpBindConfig. No patch; public exploit available. Isolate devices, restrict access, monitor traffic. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Linux
  • Linux

04 Dec 2025
Published
04 Dec 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: delete x->tunnel as we delete x The ipcomp fallback tunnels currently get deleted (from the various lists and hashtables) as the last user state that needed that fallback is destroyed (not deleted). If a reference to that user state still exists, the fallback state will remain on the hashtables/lists, triggering the WARN in xfrm_state_fini. Because of those remaining references, the fix in commit f75a2804da39 ("xfrm: destroy xfrm_state synchronously on net exit path") is not complete. We recently fixed one such situation in TCP due to defered freeing of skbs (commit 9b6412e6979f ("tcp: drop secpath at the same time as we currently drop dst")). This can also happen due to IP reassembly: skbs with a secpath remain on the reassembly queue until netns destruction. If we can't guarantee that the queues are flushed by the time xfrm_state_fini runs, there may still be references to a (user) xfrm_state, preventing the timely deletion of the corresponding fallback state. Instead of chasing each instance of skbs holding a secpath one by one, this patch fixes the issue directly within xfrm, by deleting the fallback state as soon as the last user state depending on it has been deleted. Destruction will still happen when the final reference is dropped. A separate lockdep class for the fallback state is required since we're going to lock x->tunnel while x is locked.

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture
CVE-2025-40215 xfrm: delete x->tunnel as we delete x scq.ms/48wlrm1 #SecQube #MicrosoftSecurity
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Cacti
  • cacti

02 Dec 2025
Published
02 Dec 2025
Updated

CVSS v4.0
HIGH (7.4)
EPSS
0.07%

KEV

Description

Cacti is an open source performance and fault management framework. Prior to 1.2.29, there is an input-validation flaw in the SNMP device configuration functionality. An authenticated Cacti user can supply crafted SNMP community strings containing control characters (including newlines) that are accepted, stored verbatim in the database, and later embedded into backend SNMP operations. In environments where downstream SNMP tooling or wrappers interpret newline-separated tokens as command boundaries, this can lead to unintended command execution with the privileges of the Cacti process. This vulnerability is fixed in 1.2.29.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture
High-Severity Cacti Flaw (CVE-2025-66399) Risks Remote Code Execution via SNMP Community String Injection
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Linux
  • Linux

04 Dec 2025
Published
04 Dec 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: fuse: fix livelock in synchronous file put from fuseblk workers I observed a hang when running generic/323 against a fuseblk server. This test opens a file, initiates a lot of AIO writes to that file descriptor, and closes the file descriptor before the writes complete. Unsurprisingly, the AIO exerciser threads are mostly stuck waiting for responses from the fuseblk server: # cat /proc/372265/task/372313/stack [<0>] request_wait_answer+0x1fe/0x2a0 [fuse] [<0>] __fuse_simple_request+0xd3/0x2b0 [fuse] [<0>] fuse_do_getattr+0xfc/0x1f0 [fuse] [<0>] fuse_file_read_iter+0xbe/0x1c0 [fuse] [<0>] aio_read+0x130/0x1e0 [<0>] io_submit_one+0x542/0x860 [<0>] __x64_sys_io_submit+0x98/0x1a0 [<0>] do_syscall_64+0x37/0xf0 [<0>] entry_SYSCALL_64_after_hwframe+0x4b/0x53 But the /weird/ part is that the fuseblk server threads are waiting for responses from itself: # cat /proc/372210/task/372232/stack [<0>] request_wait_answer+0x1fe/0x2a0 [fuse] [<0>] __fuse_simple_request+0xd3/0x2b0 [fuse] [<0>] fuse_file_put+0x9a/0xd0 [fuse] [<0>] fuse_release+0x36/0x50 [fuse] [<0>] __fput+0xec/0x2b0 [<0>] task_work_run+0x55/0x90 [<0>] syscall_exit_to_user_mode+0xe9/0x100 [<0>] do_syscall_64+0x43/0xf0 [<0>] entry_SYSCALL_64_after_hwframe+0x4b/0x53 The fuseblk server is fuse2fs so there's nothing all that exciting in the server itself. So why is the fuse server calling fuse_file_put? The commit message for the fstest sheds some light on that: "By closing the file descriptor before calling io_destroy, you pretty much guarantee that the last put on the ioctx will be done in interrupt context (during I/O completion). Aha. AIO fgets a new struct file from the fd when it queues the ioctx. The completion of the FUSE_WRITE command from userspace causes the fuse server to call the AIO completion function. The completion puts the struct file, queuing a delayed fput to the fuse server task. When the fuse server task returns to userspace, it has to run the delayed fput, which in the case of a fuseblk server, it does synchronously. Sending the FUSE_RELEASE command sychronously from fuse server threads is a bad idea because a client program can initiate enough simultaneous AIOs such that all the fuse server threads end up in delayed_fput, and now there aren't any threads left to handle the queued fuse commands. Fix this by only using asynchronous fputs when closing files, and leave a comment explaining why.

Statistics

  • 1 Post

Last activity: 7 hours ago

Bluesky

Profile picture
CVE-2025-40220 fuse: fix livelock in synchronous file put from fuseblk workers scq.ms/3Y9co46 #SecQube #MicrosoftSecurity
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Pending

06 Aug 2024
Published
13 Mar 2025
Updated

CVSS
Pending
EPSS
0.58%

KEV

Description

K7RKScan.sys in K7 Ultimate Security before 17.0.2019 allows local users to cause a denial of service (BSOD) because of a NULL pointer dereference.

Statistics

  • 1 Post

Last activity: 14 hours ago

Bluesky

Profile picture
📢 K7 Antivirus: abus de named pipes et escalade de privilèges jusqu’à SYSTEM (CVE-2024-36424) 📝 Source: billet technique de Lucas Laise. https://cyberveille.ch/posts/2025-12-06-k7-antivirus-abus-de-named-pipes-et-escalade-de-privileges-jusqua-system-cve-2024-36424/ #CVE_2024_36424 #Cyberveille
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Google
  • Chrome

02 Dec 2025
Published
03 Dec 2025
Updated

CVSS
Pending
EPSS
0.08%

KEV

Description

Type Confusion in V8 in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 21 hours ago

Bluesky

Profile picture
🚨 URGENT: #Fedora 43 users—Chromium 143.0.7499.40 patches 14 vulnerabilities, including HIGH-risk CVE-2025-13630 (Type Confusion in V8). Update immediately to prevent arbitrary code execution and privilege escalation risks. 🔗 Full advisory & commands: 👉 tinyurl.com/4tnc6fet #Security
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • win.rar GmbH
  • WinRAR

08 Aug 2025
Published
21 Oct 2025
Updated

CVSS v4.0
HIGH (8.4)
EPSS
2.82%

Description

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture
APT-C-53 (Gamaredon) uses CVE-2025-8088 to conduct phishing attacks.
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Linksys
  • RE6500

06 Dec 2025
Published
06 Dec 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A security flaw has been discovered in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function RE2000v2Repeater_get_wired_clientlist_setClientsName of the file mod_form.so. The manipulation of the argument clientsname_0 results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 1 hour ago

Fediverse

Profile picture

🔒 CVE-2025-14136: HIGH severity stack-based buffer overflow in Linksys RE6500 & related models (1.0.013.001+). Remote code execution risk with public exploit, no vendor patch. Mitigate — isolate, monitor, restrict access! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 1h ago

Overview

  • UGREEN
  • DH2100+

07 Dec 2025
Published
07 Dec 2025
Updated

CVSS v4.0
HIGH (8.6)
EPSS
Pending

KEV

Description

A weakness has been identified in UGREEN DH2100+ up to 5.3.0.251125. This affects the function handler_file_backup_create of the file /v1/file/backup/create of the component nas_svr. Executing manipulation of the argument path can lead to buffer overflow. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: Last hour

Fediverse

Profile picture

🚨 HIGH severity: CVE-2025-14187 buffer overflow in UGREEN DH2100+ (≤5.3.0.251125). Remote exploit published, no patch from vendor. Restrict access, monitor, and apply virtual patching if possible. More: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • Last hour

Overview

  • UTT
  • 进取 520W

06 Dec 2025
Published
06 Dec 2025
Updated

CVSS v4.0
HIGH (7.1)
EPSS
Pending

KEV

Description

A vulnerability was detected in UTT 进取 520W 1.7.7-180627. The affected element is the function strcpy of the file /goform/websHostFilter. Performing manipulation of the argument addHostFilter results in buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 3 hours ago

Fediverse

Profile picture

🚩 CVE-2025-14140: HIGH-severity buffer overflow in UTT 进取 520W v1.7.7-180627. Public exploit available, no vendor patch. Restrict access, deploy IDS/IPS, and monitor logs. Act fast! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 3h ago
Showing 21 to 30 of 33 CVEs