CVE tracker
255 subscribers
3.35K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-2528 - Wavlink WL-WN579A3 wireless.cgi Delete_Mac_list command injection

CVE ID : CVE-2026-2528
Published : Feb. 16, 2026, 2:16 a.m. | 3 hours, 46 minutes ago
Description : A vulnerability was identified in Wavlink WL-WN579A3 up to 20210219. Affected by this vulnerability is the function Delete_Mac_list of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list leads to command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2529 - Wavlink WL-WN579A3 wireless.cgi DeleteMac command injection

CVE ID : CVE-2026-2529
Published : Feb. 16, 2026, 2:16 a.m. | 3 hours, 46 minutes ago
Description : A security flaw has been discovered in Wavlink WL-WN579A3 up to 20210219. Affected by this issue is the function DeleteMac of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list results in command injection. The attack can be executed remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2530 - Wavlink WL-WN579A3 wireless.cgi AddMac command injection

CVE ID : CVE-2026-2530
Published : Feb. 16, 2026, 4:15 a.m. | 1 hour, 46 minutes ago
Description : A weakness has been identified in Wavlink WL-WN579A3 up to 20210219. This affects the function AddMac of the file /cgi-bin/wireless.cgi. This manipulation of the argument macAddr causes command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2531 - MindsDB File Upload security.py clear_filename server-side request forgery

CVE ID : CVE-2026-2531
Published : Feb. 16, 2026, 4:15 a.m. | 1 hour, 46 minutes ago
Description : A security vulnerability has been detected in MindsDB up to 25.14.1. This vulnerability affects the function clear_filename of the file mindsdb/utilities/security.py of the component File Upload. Such manipulation leads to server-side request forgery. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The name of the patch is 74d6f0fd4b630218519a700fbee1c05c7fd4b1ed. It is best practice to apply a patch to resolve this issue.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2532 - lintsinghua DeepAudit IP Address embedding_config.py server-side request forgery

CVE ID : CVE-2026-2532
Published : Feb. 16, 2026, 4:15 a.m. | 1 hour, 46 minutes ago
Description : A vulnerability was detected in lintsinghua DeepAudit up to 3.0.3. This issue affects some unknown processing of the file backend/app/api/v1/endpoints/embedding_config.py of the component IP Address Handler. Performing a manipulation results in server-side request forgery. It is possible to initiate the attack remotely. Upgrading to version 3.0.4 and 3.1.0 is capable of addressing this issue. The patch is named da853fdd8cbe9d42053b45d83f25708ba29b8b27. It is suggested to upgrade the affected component.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2533 - Tosei Self-service Washing Machine tosei_datasend.php command injection

CVE ID : CVE-2026-2533
Published : Feb. 16, 2026, 4:15 a.m. | 1 hour, 46 minutes ago
Description : A flaw has been found in Tosei Self-service Washing Machine 4.02. Impacted is an unknown function of the file /cgi-bin/tosei_datasend.php. Executing a manipulation of the argument adr_txt_1 can lead to command injection. It is possible to launch the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2534 - Comfast CF-N1 V2 mbox-config sub_44AC4C command injection

CVE ID : CVE-2026-2534
Published : Feb. 16, 2026, 4:15 a.m. | 1 hour, 46 minutes ago
Description : A vulnerability has been found in Comfast CF-N1 V2 2.6.0.2. The affected element is the function sub_44AC4C of the file /cgi-bin/mbox-config?method=SET§ion=ptest_bandwidth. The manipulation of the argument bandwidth leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2536 - opencc JFlow Workflow WF_Admin_AttrFlow.java Imp_Done xml external entity reference

CVE ID : CVE-2026-2536
Published : Feb. 16, 2026, 5:02 a.m. | 1 hour ago
Description : A vulnerability was determined in opencc JFlow up to 20260129. This affects the function Imp_Done of the file src/main/java/bp/wf/httphandler/WF_Admin_AttrFlow.java of the component Workflow Engine. This manipulation of the argument File causes xml external entity reference. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2535 - Comfast CF-N1 V2 mbox-config sub_44AB9C command injection

CVE ID : CVE-2026-2535
Published : Feb. 16, 2026, 5:16 a.m. | 46 minutes ago
Description : A vulnerability was found in Comfast CF-N1 V2 2.6.0.2. The impacted element is the function sub_44AB9C of the file /cgi-bin/mbox-config?method=SET§ion=ptest_channel. The manipulation of the argument channel results in command injection. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2537 - Comfast CF-E4 HTTP POST Request mbox-config command injection

CVE ID : CVE-2026-2537
Published : Feb. 16, 2026, 5:32 a.m. | 30 minutes ago
Description : A vulnerability was identified in Comfast CF-E4 2.6.0.1. This impacts an unknown function of the file /cgi-bin/mbox-config?method=SET§ion=ntp_timezone of the component HTTP POST Request Handler. Such manipulation of the argument timestr leads to command injection. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0929 - RegistrationMagic < 6.0.7.2 - Subscriber+ Form Creation

CVE ID : CVE-2026-0929
Published : Feb. 16, 2026, 7:17 a.m. | 2 hours, 47 minutes ago
Description : The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2538 - Flos Freeware Notepad2 Msimg32.dll uncontrolled search path

CVE ID : CVE-2026-2538
Published : Feb. 16, 2026, 7:17 a.m. | 2 hours, 47 minutes ago
Description : A security flaw has been discovered in Flos Freeware Notepad2 4.2.22/4.2.23/4.2.24/4.2.25. Affected is an unknown function in the library Msimg32.dll. Performing a manipulation results in uncontrolled search path. Attacking locally is a requirement. The attack's complexity is rated as high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2542 - Total VPN win-service.exe unquoted search path

CVE ID : CVE-2026-2542
Published : Feb. 16, 2026, 7:17 a.m. | 2 hours, 47 minutes ago
Description : A weakness has been identified in Total VPN 0.5.29.0 on Windows. Affected by this vulnerability is an unknown functionality of the file C:\Program Files\Total VPN\win-service.exe. Executing a manipulation can lead to unquoted search path. It is possible to launch the attack on the local host. This attack is characterized by high complexity. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2543 - vichan-devel vichan Password Change pages.php unverified password change

CVE ID : CVE-2026-2543
Published : Feb. 16, 2026, 7:17 a.m. | 2 hours, 47 minutes ago
Description : A vulnerability was identified in vichan-devel vichan up to 5.1.5. This vulnerability affects unknown code of the file inc/mod/pages.php of the component Password Change Handler. The manipulation of the argument Password leads to unverified password change. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2544 - yued-fe LuLu UI run.js child_process.exec os command injection

CVE ID : CVE-2026-2544
Published : Feb. 16, 2026, 8:16 a.m. | 1 hour, 48 minutes ago
Description : A security flaw has been discovered in yued-fe LuLu UI up to 3.0.0. This issue affects the function child_process.exec of the file run.js. The manipulation results in os command injection. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2545 - LigeroSmart index.pl cross site scripting

CVE ID : CVE-2026-2545
Published : Feb. 16, 2026, 8:16 a.m. | 1 hour, 48 minutes ago
Description : A weakness has been identified in LigeroSmart up to 6.1.26. Impacted is an unknown function of the file /otrs/index.pl?Action=AgentTicketSearch. This manipulation of the argument Profile causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2546 - LigeroSmart index.pl cross site scripting

CVE ID : CVE-2026-2546
Published : Feb. 16, 2026, 9:16 a.m. | 48 minutes ago
Description : A security vulnerability has been detected in LigeroSmart up to 6.1.26. The affected element is an unknown function of the file /otrs/index.pl. Such manipulation of the argument SortBy leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2547 - LigeroSmart index.pl AgentDashboard cross site scripting

CVE ID : CVE-2026-2547
Published : Feb. 16, 2026, 9:16 a.m. | 48 minutes ago
Description : A vulnerability was detected in LigeroSmart up to 6.1.26. The impacted element is the function AgentDashboard of the file /otrs/index.pl. Performing a manipulation of the argument Subaction results in cross site scripting. Remote exploitation of the attack is possible. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2548 - WAYOS FBM-220G rc sub_40F820 command injection

CVE ID : CVE-2026-2548
Published : Feb. 16, 2026, 9:16 a.m. | 48 minutes ago
Description : A flaw has been found in WAYOS FBM-220G 24.10.19. This affects the function sub_40F820 of the file rc. Executing a manipulation of the argument upnp_waniface/upnp_ssdp_interval/upnp_max_age can lead to command injection. The attack can be executed remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2549 - zhanghuanhao LibrarySystem 图书馆管理系统 BookController.java access control

CVE ID : CVE-2026-2549
Published : Feb. 16, 2026, 9:32 a.m. | 32 minutes ago
Description : A vulnerability has been found in zhanghuanhao LibrarySystem 图书馆管理系统 up to 1.1.1. This impacts an unknown function of the file BookController.java. The manipulation leads to improper access controls. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0999 - Authentication bypass via userID login when email and username login are disabled

CVE ID : CVE-2026-0999
Published : Feb. 16, 2026, 9:47 a.m. | 16 minutes ago
Description : Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 fail to properly validate login method restrictions which allows an authenticated user to bypass SSO-only login requirements via userID-based authentication. Mattermost Advisory ID: MMSA-2025-00548
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...