CVE tracker
301 subscribers
4.24K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-7138 - Totolink A8000RU CGI cstecgi.cgi setNtpCfg os command injection

CVE ID :CVE-2026-7138
Published : April 27, 2026, 4:16 p.m. | 1 hour, 3 minutes ago
Description :A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setNtpCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument tz results in os command injection. The attack can be executed remotely. The exploit is now public and may be used.
Severity: 10.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-7140 - Totolink A8000RU CGI cstecgi.cgi CsteSystem os command injection

CVE ID :CVE-2026-7140
Published : April 27, 2026, 4:30 p.m. | 50 minutes ago
Description :A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. Impacted is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument HTTP leads to os command injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-7141 - vllm KV Block kv_cache_interface.py has_mamba_layers uninitialized resource

CVE ID :CVE-2026-7141
Published : April 27, 2026, 4:45 p.m. | 35 minutes ago
Description :A vulnerability was found in vllm up to 0.19.0. The affected element is the function has_mamba_layers of the file vllm/v1/kv_cache_interface.py of the component KV Block Handler. Performing a manipulation results in uninitialized resource. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is described as difficult. The exploit has been made public and could be used. The patch is named 1ad67864c0c20f167929e64c875f5c28e1aad9fd. To fix this issue, it is recommended to deploy a patch.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-7142 - Wooey API Endpoint scripts.py add_or_update_script improper authorization

CVE ID :CVE-2026-7142
Published : April 27, 2026, 5 p.m. | 20 minutes ago
Description :A vulnerability was determined in Wooey up to 0.13.2. The impacted element is the function add_or_update_script of the file wooey/api/scripts.py of the component API Endpoint. Executing a manipulation can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 0.13.3rc1 and 0.14.0 is sufficient to resolve this issue. This patch is called f7846fc0c323da8325422cab32623491757f1b88. The affected component should be upgraded.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69428 - Pro-Bit Directory Traversal

CVE ID :CVE-2025-69428
Published : April 27, 2026, 7:16 p.m. | 2 hours, 5 minutes ago
Description :An issue in Pro-Bit before v1.77.4 allows unauthenticated attackers to directly access sensitive directory and its subdirectories.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-31255 - Tenda AC18 Command Injection Vulnerability

CVE ID :CVE-2026-31255
Published : April 27, 2026, 7:16 p.m. | 2 hours, 5 minutes ago
Description :A command injection vulnerability exists in Tenda AC18 V15.03.05.05_multi. The vulnerability is located in the /goform/SetSambaCfg interface, where improper handling of the guestuser parameter allows attackers to execute arbitrary system commands.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-31256 - MERCURY MIPC252W Null Pointer Dereference RTSP Service Vulnerability

CVE ID :CVE-2026-31256
Published : April 27, 2026, 7:16 p.m. | 2 hours, 5 minutes ago
Description :A null pointer dereference vulnerability exists in the RTSP service of the MERCURY MIPC252W 1.0.5 Build 230306 Rel.79931n. During the processing of a SETUP request for the path rtsp://:554/stream1/track2, the device fails to properly validate the Transport header field. When this header is improperly constructed, the RTSP service can dereference a NULL pointer during request parsing. Successful exploitation causes the device to crash and automatically reboot.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-32655 - Dell Alienware Command Center Least Privilege Violation Elevation of Privilege

CVE ID :CVE-2026-32655
Published : April 27, 2026, 7:16 p.m. | 2 hours, 5 minutes ago
Description :Dell Alienware Command Center (AWCC), versions prior to 6.13.8.0, contain a Least Privilege Violation vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-35901 - Mercury MIPC252W RTSP Session Termination Denial-of-Service

CVE ID :CVE-2026-35901
Published : April 27, 2026, 7:16 p.m. | 2 hours, 5 minutes ago
Description :A handling issue in the RTSP service of the Mercury MIPC252W 1.0.5 Build 230306 Rel.79931n allows an authenticated attacker to trigger session termination by repeatedly sending SETUP requests for the same media track within a single RTSP session. This causes the server to reset the RTSP connection, leading to a denial-of-service condition.
Severity: 4.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-35902 - MERCURY IP Camera MIPC252W Authentication DoS Vulnerability

CVE ID :CVE-2026-35902
Published : April 27, 2026, 7:16 p.m. | 2 hours, 5 minutes ago
Description :The RTSP service of MERCURY IP camera MIPC252W 1.0.5 Build 230306 has an issue handling failed Digest authentication attempts. By repeatedly sending RTSP requests with invalid authentication parameters, an unauthenticated attacker can cause the RTSP service to enter a persistent authentication failure state, preventing legitimate clients from authenticating and leading to a denial of service.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-35903 - MERCURY MIPC252W Improper Authentication in RTSP Service

CVE ID :CVE-2026-35903
Published : April 27, 2026, 7:16 p.m. | 2 hours, 5 minutes ago
Description :MERCURY MIPC252W IP camera 1.0.5 Build 230306 Rel.79931n contains an improper authentication vulnerability in the RTSP service. After successful Digest authentication in an initial DESCRIBE request, the device does not verify the Digest response parameter in subsequent RTSP requests within the same session. As a result, RTSP methods such as SETUP, PLAY, and TEARDOWN can be processed even when the Authorization header contains an empty or invalid response value, as long as the nonce and session identifier correspond to a previously authenticated session. This allows an attacker with network access to reuse session parameters and issue unauthorized RTSP control commands without computing a valid Digest response.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-40970 - Spring Boot Elasticsearch SSL hostname verification bypass

CVE ID :CVE-2026-40970
Published : April 27, 2026, 7:16 p.m. | 2 hours, 5 minutes ago
Description :When configured to use an SSL bundle, Spring Boot's Elasticsearch auto-configuration does not perform hostname verification when connecting to the Elasticsearch server. Affected: Spring Boot 4.0.0–4.0.5; upgrade to 4.0.6 or later per vendor advisory.
Severity: 5.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-7147 - JoeCastrom mcp-chat-studio LLM Models API llm.js server-side request forgery

CVE ID :CVE-2026-7147
Published : April 27, 2026, 7:16 p.m. | 2 hours, 5 minutes ago
Description :A vulnerability was detected in JoeCastrom mcp-chat-studio up to 1.5.0. Affected by this issue is some unknown functionality of the file server/routes/llm.js of the component LLM Models API. Performing a manipulation of the argument req.query.base_url results in server-side request forgery. Remote exploitation of the attack is possible. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-7148 - CodeAstro Online Classroom addnewfaculty sql injection

CVE ID :CVE-2026-7148
Published : April 27, 2026, 7:16 p.m. | 2 hours, 5 minutes ago
Description :A flaw has been found in CodeAstro Online Classroom 1.0. This affects an unknown part of the file /addnewfaculty. Executing a manipulation of the argument fname can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-7149 - dexhunter kaggle-mcp server.py prepare_kaggle_dataset path traversal

CVE ID :CVE-2026-7149
Published : April 27, 2026, 7:16 p.m. | 2 hours, 5 minutes ago
Description :A vulnerability has been found in dexhunter kaggle-mcp up to 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d. This vulnerability affects the function prepare_kaggle_dataset of the file src/kaggle_mcp/server.py. The manipulation of the argument competition_id leads to path traversal. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-7150 - dh1011 auto-favicon MCP Tool server.py generate_favicon_from_url server-side request forgery

CVE ID :CVE-2026-7150
Published : April 27, 2026, 7:17 p.m. | 2 hours, 4 minutes ago
Description :A vulnerability was found in dh1011 auto-favicon up to f189116a9259950c2393f114dbcb94dde0ad864b. This issue affects the function generate_favicon_from_url of the file src/auto_favicon/server.py of the component MCP Tool. The manipulation of the argument image_url results in server-side request forgery. The attack may be performed from remote. The exploit has been made public and could be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-7154 - Totolink A8000RU CGI cstecgi.cgi setAdvancedInfoShow os command injection

CVE ID :CVE-2026-7154
Published : April 27, 2026, 8 p.m. | 1 hour, 21 minutes ago
Description :A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setAdvancedInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument tty_server can lead to os command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-7191 - Arbitrary Code Execution via Sandbox Bypass in the open source solution QnABot on AWS

CVE ID :CVE-2026-7191
Published : April 27, 2026, 8:08 p.m. | 1 hour, 13 minutes ago
Description :Improper use of the static-eval npm package in the open source solution qnabot-on-aws versions 7.2.4 and earlier may allow an authenticated administrator to execute arbitrary code within the fulfillment Lambda execution context by injecting a crafted conditional chaining expression via the Content Designer interface, which bypasses the intended expression sandbox through JavaScript prototype manipulation. This may grant direct access to backend resources (Lambda environment variables, OpenSearch indices, S3 objects, DynamoDB tables) that are not exposed through normal administrative interfaces. We recommend you upgrade to version 7.3.0 or above.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-7155 - Totolink A8000RU CGI cstecgi.cgi setLoginPasswordCfg os command injection

CVE ID :CVE-2026-7155
Published : April 27, 2026, 8:15 p.m. | 1 hour, 6 minutes ago
Description :A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-5362 - Pimcore Platform v12.3.3 - Stored XSS in Document Editable Embed rendering

CVE ID :CVE-2026-5362
Published : April 27, 2026, 8:16 p.m. | 1 hour, 5 minutes ago
Description :An authenticated attacker with permission to edit document content can store crafted HTML/JavaScript in a Document embed editable and cause script execution when the published page is rendered. This issue affects pimcore: v12.3.3.
Severity: 4.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-5394 - Pimcore Platform v12.3.3 - SQL Injection in DataObject composite index handling

CVE ID :CVE-2026-5394
Published : April 27, 2026, 8:16 p.m. | 1 hour, 5 minutes ago
Description :An authenticated administrative user who can import or save DataObject class definitions can inject attacker-controlled composite index metadata and trigger unintended SQL execution in the backend. This issue affects pimcore: 12.3.3.
Severity: 7.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...