CVE tracker
249 subscribers
3.29K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-1735 - Yealink MeetingBar A30 Diagnostic command injection

CVE ID : CVE-2026-1735
Published : Feb. 2, 2026, 1:15 a.m. | 1 hour, 21 minutes ago
Description : A weakness has been identified in Yealink MeetingBar A30 133.321.0.3. This issue affects some unknown processing of the component Diagnostic Handler. This manipulation causes command injection. It is feasible to perform the attack on the physical device. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 4.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1736 - Open5GS SGWC s11-handler.c assertion

CVE ID : CVE-2026-1736
Published : Feb. 2, 2026, 1:15 a.m. | 1 hour, 21 minutes ago
Description : A security vulnerability has been detected in Open5GS up to 2.7.6. Impacted is the function sgwc_s11_handle_create_indirect_data_forwarding_tunnel_request of the file /src/sgwc/s11-handler.c of the component SGWC. Such manipulation leads to reachable assertion. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. A patch should be applied to remediate this issue. The issue report is flagged as already-fixed.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13348 - ASUS Business Manager Arbitrary File Creation Vulnerability

CVE ID : CVE-2025-13348
Published : Feb. 2, 2026, 2:16 a.m. | 20 minutes ago
Description : An improper access control vulnerability exists in ASUS Secure Delete Driver of ASUS Business Manager. This vulnerability can be triggered by a local user sending a specially crafted request, potentially leading to the creation of arbitrary files in a specified path. Refer to the "Security Update for ASUS Business Manager" section on the ASUS Security Advisory for more information.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1737 - Open5GS CreateBearerRequest s5c-handler.c sgwc_s5c_handle_create_bearer_request assertion

CVE ID : CVE-2026-1737
Published : Feb. 2, 2026, 2:16 a.m. | 20 minutes ago
Description : A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function sgwc_s5c_handle_create_bearer_request of the file /src/sgwc/s5c-handler.c of the component CreateBearerRequest Handler. Performing a manipulation results in reachable assertion. Remote exploitation of the attack is possible. The exploit is now public and may be used. To fix this issue, it is recommended to deploy a patch. The issue report is flagged as already-fixed.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1738 - Open5GS SGWC context.c sgwc_tunnel_add assertion

CVE ID : CVE-2026-1738
Published : Feb. 2, 2026, 2:16 a.m. | 20 minutes ago
Description : A flaw has been found in Open5GS up to 2.7.6. The impacted element is the function sgwc_tunnel_add of the file /src/sgwc/context.c of the component SGWC. Executing a manipulation of the argument pdr can lead to reachable assertion. The attack can be executed remotely. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1739 - Free5GC pcf smpolicy.go HandleCreateSmPolicyRequest null pointer dereference

CVE ID : CVE-2026-1739
Published : Feb. 2, 2026, 2:16 a.m. | 20 minutes ago
Description : A vulnerability has been found in Free5GC pcf up to 1.4.1. This affects the function HandleCreateSmPolicyRequest of the file internal/sbi/processor/smpolicy.go. The manipulation leads to null pointer dereference. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is df535f5524314620715e842baf9723efbeb481a7. Applying a patch is the recommended action to fix this issue.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1740 - EFM ipTIME A8004T Hidden Hiddenloginsetup timepro.cgi httpcon_check_session_url improper authentication

CVE ID : CVE-2026-1740
Published : Feb. 2, 2026, 4:15 a.m. | 2 hours, 22 minutes ago
Description : A vulnerability was found in EFM ipTIME A8004T 14.18.2. This impacts the function httpcon_check_session_url of the file /cgi/timepro.cgi of the component Hidden Hiddenloginsetup Interface. The manipulation results in improper authentication. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1741 - EFM ipTIME A8004T Debug d.cgi httpcon_check_session_url backdoor

CVE ID : CVE-2026-1741
Published : Feb. 2, 2026, 4:15 a.m. | 2 hours, 22 minutes ago
Description : A vulnerability was determined in EFM ipTIME A8004T 14.18.2. Affected is the function httpcon_check_session_url of the file /sess-bin/d.cgi of the component Debug Interface. This manipulation of the argument cmd causes backdoor. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1742 - EFM ipTIME A8004T VPN Service timepro.cgi commit_vpncli_file_upload unrestricted upload

CVE ID : CVE-2026-1742
Published : Feb. 2, 2026, 4:15 a.m. | 2 hours, 22 minutes ago
Description : A vulnerability was identified in EFM ipTIME A8004T 14.18.2. Affected by this vulnerability is the function commit_vpncli_file_upload of the file /cgi/timepro.cgi of the component VPN Service. Such manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 5.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1743 - DJI Mavic Mini/Spark/Mini SE Enhanced Wi-Fi Pairing authentication replay

CVE ID : CVE-2026-1743
Published : Feb. 2, 2026, 4:15 a.m. | 2 hours, 22 minutes ago
Description : A vulnerability has been found in DJI Mavic Mini, Spark and Mini SE up to 01.00.0500. Affected by this vulnerability is an unknown functionality of the component Enhanced Wi-Fi Pairing. The manipulation leads to authentication bypass by capture-replay. The attack must be carried out from within the local network. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 3.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1744 - D-Link DSL-6641K sp_pppoe_user.js doSubmitPPP cross site scripting

CVE ID : CVE-2026-1744
Published : Feb. 2, 2026, 5:15 a.m. | 1 hour, 21 minutes ago
Description : A vulnerability was found in D-Link DSL-6641K N8.TR069.20131126. Affected by this issue is the function doSubmitPPP of the file sp_pppoe_user.js. The manipulation of the argument Username results in cross site scripting. The attack may be launched remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Severity: 4.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-24788 - RaspAP RaspAP OS Command Injection Vulnerability

CVE ID : CVE-2026-24788
Published : Feb. 2, 2026, 5:16 a.m. | 1 hour, 21 minutes ago
Description : RaspAP raspap-webgui versions prior to 3.3.6 contain an OS command injection vulnerability. If exploited, an arbitrary OS command may be executed by a user who can log in to the product.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-25200 - MagicInfo9 Server Stored XSS

CVE ID : CVE-2026-25200
Published : Feb. 2, 2026, 5:16 a.m. | 1 hour, 21 minutes ago
Description : A vulnerability in MagicInfo9 Server allows authorized users to upload HTML files without authentication, leading to Stored XSS, which can result in account takeover This issue affects MagicINFO 9 Server: less than 21.1090.1.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-25201 - MagicInfo9 Server Remote File Upload RCE

CVE ID : CVE-2026-25201
Published : Feb. 2, 2026, 5:16 a.m. | 1 hour, 21 minutes ago
Description : An unauthenticated user can upload arbitrary files to execute remote code, leading to privilege escalation in MagicInfo9 Server. This issue affects MagicINFO 9 Server: less than 21.1090.1.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-25202 - MagicInfo9 Server Hardcoded Database Credentials Vulnerability

CVE ID : CVE-2026-25202
Published : Feb. 2, 2026, 5:16 a.m. | 1 hour, 21 minutes ago
Description : The database account and password are hardcoded, allowing login with the account to manipulate the database in MagicInfo9 Server.This issue affects MagicINFO 9 Server: less than 21.1090.1.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15030 - User Profile Builder < 3.15.2 - Unauthenticated Arbitrary Password Reset

CVE ID : CVE-2025-15030
Published : Feb. 2, 2026, 6 a.m. | 37 minutes ago
Description : The User Profile Builder WordPress plugin before 3.15.2 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore gain access to their account
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15396 - Library Viewer < 3.2.0 - Reflected Cross-Site Scripting

CVE ID : CVE-2025-15396
Published : Feb. 2, 2026, 6 a.m. | 37 minutes ago
Description : The Library Viewer WordPress plugin before 3.2.0 does not sanitise and escape some parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0658 - Five Star Restaurant Reservations < 2.7.9 - Arbitrary Bookings Deletion via CSRF

CVE ID : CVE-2026-0658
Published : Feb. 2, 2026, 6 a.m. | 37 minutes ago
Description : The Five Star Restaurant Reservations WordPress plugin before 2.7.9 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting bookings via CSRF attacks.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13881 - Org.keycloak.services.resources.admin: keycloak: limited administrator can retrieve sensitive user attributes via admin api

CVE ID : CVE-2025-13881
Published : Feb. 2, 2026, 6:16 a.m. | 21 minutes ago
Description : A flaw was found in Keycloak Admin API. This vulnerability allows an administrator with limited privileges to retrieve sensitive custom attributes via the /unmanagedAttributes endpoint, bypassing User Profile visibility settings.
Severity: 2.7 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1530 - Fog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate validation

CVE ID : CVE-2026-1530
Published : Feb. 2, 2026, 6:16 a.m. | 21 minutes ago
Description : A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to perform a Man-in-the-Middle (MITM) attack due to disabled certificate validation. This enables the attacker to intercept and potentially alter sensitive communications between Satellite and OpenShift, resulting in information disclosure and data integrity compromise.
Severity: 8.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1531 - Foreman-kubevirt: foreman_kubevirt: man-in-the-middle due to insecure default ssl verification

CVE ID : CVE-2026-1531
Published : Feb. 2, 2026, 6:16 a.m. | 21 minutes ago
Description : A flaw was found in foreman_kubevirt. When configuring the connection to OpenShift, the system disables SSL verification if a Certificate Authority (CA) certificate is not explicitly set. This insecure default allows a remote attacker, capable of intercepting network traffic between Satellite and OpenShift, to perform a Man-in-the-Middle (MITM) attack. Such an attack could lead to the disclosure or alteration of sensitive information.
Severity: 8.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...