Overview CVE-2025-14104 is a medium severity vulnerability found in util-linux, specifically affecting the setpwnam() function. This flaw allows for a heap buffer overread when processing usernames that are 256 bytes in length. The vulnerability primarily impacts SUID (Set User ID) login-utils utilities that write to the password database. Successful exploitation could potentially lead to information disclosure, denial of service, or, in more severe scenarios, privilege escalation. Technical Details The vulnerability resides in the way setpwnam(), a function used to retrieve user account information by username, handles unusually long usernames. When a username with a length of 256 bytes is processed,…
-
-
Overview CVE-2025-14094 describes a medium severity vulnerability found in Edimax BR-6478AC V3 firmware version 1.0.15. This vulnerability allows a remote attacker to execute arbitrary operating system commands on the affected device. The vendor was notified but did not respond to the disclosure. Technical Details The vulnerability resides within the sub_44CCE4 function of the /boafrm/formSysCmd file. By manipulating the sysCmd argument, an attacker can inject arbitrary OS commands. Because the attack is initiated remotely and requires no authentication (based on published reports), the potential impact is significant. CVSS Analysis The vulnerability has a CVSS score of 4.7, indicating a MEDIUM severity.…
-
Overview CVE-2025-14093 is a medium severity vulnerability affecting Edimax BR-6478AC V3 routers running firmware version 1.0.15. This vulnerability allows a remote attacker to inject operating system commands due to insufficient input validation in the /boafrm/formTracerouteDiagnosticRun endpoint. The vendor has been contacted but has not responded. Technical Details The vulnerability resides within the sub_416990 function of the /boafrm/formTracerouteDiagnosticRun file. Specifically, the host argument is vulnerable to OS command injection. An attacker can manipulate this argument to execute arbitrary commands on the router’s operating system. This is possible because the router does not properly sanitize user-supplied input before passing it to a…
-
Overview CVE-2024-9183 is a high-severity vulnerability affecting GitLab CE/EE. It allows an authenticated, lower-privileged user, under specific circumstances, to potentially obtain credentials from higher-privileged users and perform actions within their context. This could lead to significant security breaches, including data exfiltration and unauthorized access. This vulnerability affects all versions of GitLab CE/EE from 18.4 prior to 18.4.5, 18.5 prior to 18.5.3, and 18.6 prior to 18.6.1. It has been remediated in versions 18.4.5, 18.5.3, and 18.6.1 and later. Technical Details The precise technical details of the vulnerability are not explicitly detailed here to prevent further exploitation. However, it is understood…
-
Published: 2025-12-05T16:15:51.053 Overview CVE-2025-66418 identifies a critical vulnerability within urllib3, a widely used HTTP client library for Python. This vulnerability, affecting versions 1.24 up to, but not including, 2.6.0, stems from an unbounded number of links permitted in the decompression chain. A malicious server could exploit this by injecting a virtually unlimited number of compression steps. This leads to excessive CPU utilization and substantial memory allocation as urllib3 attempts to decompress the data, potentially resulting in a denial-of-service (DoS) condition. Technical Details The vulnerability arises from the way urllib3 handles compressed responses. Specifically, the library fails to limit the depth…
-
Overview CVE-2025-65897 identifies a critical security vulnerability affecting zdh_web, a platform designed for data collection, processing, monitoring, scheduling, and management. This vulnerability allows authenticated users to upload arbitrary files to the server file system due to insufficient validation of file upload paths. This flaw could enable attackers to overwrite existing files, potentially leading to privilege escalation or remote code execution. The vulnerability exists in zdh_web versions up to and including 5.6.17. Technical Details The core issue lies in the insufficient validation performed on file paths during the upload process. An authenticated user can manipulate the file path provided to the…
-
Overview CVE-2025-65730 describes an authentication bypass vulnerability found in GoAway, a project (likely a service or application) up to version 0.62.18. The vulnerability stems from the use of a hardcoded secret key for signing JSON Web Tokens (JWTs), which are used for authentication. This allows attackers to forge valid JWTs and gain unauthorized access to the system. The vulnerability is fixed in version 0.62.19. Technical Details The vulnerability resides in the authentication mechanism of GoAway. Specifically, the application used a hardcoded string as the secret key for signing JWTs. This secret key was present in the source code and therefore…
-
Overview A critical file upload vulnerability, identified as CVE-2025-64056, has been discovered in Fanvil x210 V2 devices, specifically version 2.12.20. This vulnerability allows unauthenticated attackers on the local network to store arbitrary files on the device’s filesystem. This could lead to various malicious activities, including code execution, data exfiltration, or denial of service. This blog post provides a detailed analysis of the vulnerability, including technical details, potential impact, and recommended mitigation strategies. Technical Details The vulnerability exists due to insufficient input validation during the file upload process. The Fanvil x210 V2 firmware lacks proper authentication and authorization mechanisms for certain…
-
Overview A reflected Cross-Site Scripting (XSS) vulnerability has been identified in Fanvil x210 devices, specifically affecting version 2.12.20. This vulnerability, tracked as CVE-2025-64054, allows attackers to inject malicious scripts into the web interface of the phone, potentially leading to denial-of-service conditions or even arbitrary command execution. Technical Details The vulnerability resides within the /cgi-bin/webconfig?page=upload&action=submit endpoint. An attacker can craft a malicious POST request to this endpoint, injecting JavaScript code within a parameter. Due to inadequate input sanitization, the injected script is reflected back to the user’s browser when the page is rendered, leading to the execution of the malicious script.…
-
Overview A significant security vulnerability, identified as CVE-2025-64053, has been discovered in Fanvil X210 devices running firmware version 2.12.20. This vulnerability is a buffer overflow that could allow attackers to cause a denial-of-service (DoS) condition or potentially execute arbitrary commands on the affected device. Technical Details The buffer overflow occurs due to insufficient input validation in the `/cgi-bin/webconfig?page=upload&action=submit` endpoint. A crafted POST request sent to this endpoint can overflow a buffer, leading to unexpected program behavior. An attacker could exploit this by sending a specially crafted request that exceeds the allocated buffer size. The vulnerable component handles file uploads, making…