• Cybersecurity Vulnerabilities

    Critical SQL Injection Vulnerability Discovered in OpenCode Systems USSD Gateway (CVE-2025-65235)

    Overview A significant security vulnerability, identified as CVE-2025-65235, has been discovered in OpenCode Systems USSD Gateway OC Release 5 Version 6.13.11. This vulnerability is a SQL injection flaw located within the getSubUsersByProvider function, specifically affecting the ID parameter. This could potentially allow malicious actors to execute arbitrary SQL commands, leading to unauthorized data access, modification, or even system compromise. Technical Details The SQL injection vulnerability exists because the getSubUsersByProvider function fails to properly sanitize user-supplied input (the ID parameter) before using it in a SQL query. An attacker can inject malicious SQL code into the ID parameter, which is then…

  • Cybersecurity Vulnerabilities

    CVE-2025-63938: Critical Integer Overflow Found in Tinyproxy – Update Now!

    Overview CVE-2025-63938 is a medium-severity integer overflow vulnerability affecting Tinyproxy versions up to 1.11.2. This flaw resides within the strip_return_port() function in the src/reqs.c file. A malicious actor could potentially exploit this vulnerability to cause a denial-of-service (DoS) condition or, in more complex scenarios, achieve arbitrary code execution. It is crucial to understand the details of this vulnerability and apply the necessary mitigations to protect your Tinyproxy instances. Technical Details The vulnerability lies within the strip_return_port() function, which is responsible for parsing and processing the port number from a client’s request. Due to insufficient validation, a specially crafted request containing…

  • Cybersecurity Vulnerabilities

    CVE-2025-46175: Critical Access Control Flaw Discovered in Ruoyi v4.8.0

    Overview CVE-2025-46175 identifies a critical Incorrect Access Control vulnerability found in Ruoyi version 4.8.0. This flaw stems from a missing permission check within the authRole method of SysUserController.java, potentially allowing unauthorized users to manipulate role assignments beyond their intended scope. This can lead to privilege escalation and unauthorized data access. Technical Details The vulnerability lies specifically in the authRole method within the SysUserController.java file of Ruoyi v4.8.0. A crucial checkUserDataScope permission check is absent, meaning that under certain conditions, users can potentially modify role assignments for other users or roles without the proper authorization. This can bypass intended security restrictions…

  • Cybersecurity Vulnerabilities

    Urgent: Critical Command Injection Flaw in Cursor Could Allow Arbitrary Code Execution (CVE-2025-62354)

    Overview A critical security vulnerability, identified as CVE-2025-62354, has been discovered in Cursor. This flaw, categorized as a command injection vulnerability, could allow an unauthorized attacker to execute arbitrary code on systems running the affected Cursor version. The vulnerability stems from improper neutralization of special elements used in OS commands, bypassing intended allowlists and leading to potentially devastating consequences. Technical Details CVE-2025-62354 is a command injection vulnerability. This means that the application fails to properly sanitize user-supplied input that is later used in the execution of operating system commands. Specifically, Cursor fails to adequately neutralize special characters or commands that…

  • Cybersecurity Vulnerabilities

    Critical Privilege Escalation Vulnerability Found in RuoYi 4.8.1 (CVE-2025-56396)

    Overview CVE-2025-56396 describes a privilege escalation vulnerability discovered in RuoYi version 4.8.1. This vulnerability allows attackers to gain elevated privileges within the system, potentially leading to unauthorized access and control. Technical Details The vulnerability stems from a flaw in the access control mechanism within RuoYi 4.8.1. Specifically, the system incorrectly grants permissions based on the owning department of a user or resource, rather than the user’s actual assigned role and permissions. If the owning department has higher privileges than the active user, the user can inherit these higher privileges, effectively escalating their access rights. Further technical details are available in…

  • Cybersecurity Vulnerabilities

    CVE-2025-50402: Critical Buffer Overflow Discovered in FAST FAC1200R Routers

    Overview A significant security vulnerability, identified as CVE-2025-50402, has been discovered in FAST FAC1200R F400_FAC1200R_Q routers. This vulnerability is a buffer overflow located within the sub_80435780 function and is triggered via the fac_password parameter. This flaw could potentially allow attackers to execute arbitrary code on affected devices, leading to serious security breaches. Technical Details The root cause of CVE-2025-50402 is a buffer overflow vulnerability in the sub_80435780 function of the FAST FAC1200R router’s firmware. The fac_password parameter, when supplied with an input string exceeding the buffer’s capacity, allows for overwriting adjacent memory regions. This can lead to code execution if…

  • Cybersecurity Vulnerabilities

    CVE-2025-50399: Critical Buffer Overflow Discovered in FAST FAC1200R Routers

    Overview CVE-2025-50399 identifies a buffer overflow vulnerability found in the FAST FAC1200R F400_FAC1200R_Q router firmware. This vulnerability allows attackers to potentially execute arbitrary code or cause a denial-of-service condition by exploiting a flaw in the handling of the password parameter. A successful exploit can compromise the router’s security, potentially granting unauthorized access to the network or disrupting its operation. Technical Details The vulnerability resides within the sub_80435780 function of the FAST FAC1200R firmware. Specifically, the code fails to properly validate the length of the password parameter before copying it into a fixed-size buffer. By providing a password exceeding the buffer’s…

  • Cybersecurity Vulnerabilities

    Critical Access Control Flaw Discovered in Ruoyi v4.8.0 (CVE-2025-46174)

    Overview CVE-2025-46174 details an Incorrect Access Control vulnerability found in Ruoyi version 4.8.0. Specifically, the resetPwd method within the SysUserController.java file lacks a proper permission check for checkUserDataScope. This could allow unauthorized users to potentially reset passwords for other users, leading to a compromise of user accounts and sensitive data. Technical Details The vulnerability resides in the SysUserController.java file. The resetPwd method, responsible for allowing users to reset passwords, fails to adequately verify whether the requesting user has the necessary permissions to perform this action on the targeted user account. The missing checkUserDataScope check means a user could potentially reset…

  • Cybersecurity Vulnerabilities

    CVE-2025-45311: Fail2ban-client Vulnerability Enables Root Access via Sudo Exploitation

    Overview CVE-2025-45311 identifies a critical vulnerability found in fail2ban-client version 0.11.2. This security flaw stems from insecure permissions handling, which allows attackers with limited sudo privileges to execute arbitrary operations as the root user. This escalation of privilege could lead to complete system compromise. Published on 2025-11-26T16:15:47.663, this vulnerability highlights the importance of proper permission management and regular security audits, even within widely-used security tools. Technical Details The vulnerability resides within how fail2ban-client handles permissions when invoked with sudo. Specifically, the client does not adequately validate the user context under which it’s operating, leading to a scenario where a user…

  • Cybersecurity Vulnerabilities

    CVE-2025-13601: Critical Heap Overflow Plagues GLib URI Escaping

    Overview A high-severity heap-based buffer overflow vulnerability, identified as CVE-2025-13601, has been discovered in the GLib library. This flaw resides within the g_escape_uri_string() function and can lead to arbitrary code execution or denial-of-service attacks. Technical Details The vulnerability stems from an incorrect calculation of the required buffer size within the g_escape_uri_string() function. This function is used to escape characters in a URI string that are not allowed. Specifically, if the input string contains a very large number of characters that require escaping (e.g., characters outside the allowed set), the calculation of the final escaped string’s length can overflow. This overflow…