• Cybersecurity Vulnerabilities

    CVE-2024-48882: Critical DoS Vulnerability in Socomec DIRIS Digiware M-70

    Published: 2025-12-01T16:15:49.983 Overview A high-severity denial of service (DoS) vulnerability, identified as CVE-2024-48882, has been discovered in the Modbus TCP functionality of Socomec DIRIS Digiware M-70 version 1.6.9. This vulnerability allows an unauthenticated attacker to disrupt the availability of the device by sending a specially crafted network packet. Technical Details The vulnerability resides in the handling of Modbus TCP requests by the Socomec DIRIS Digiware M-70. Sending a specific malformed or crafted Modbus TCP packet triggers a condition within the device’s firmware that leads to a denial-of-service state. This prevents the device from responding to legitimate requests and effectively renders…

  • Cybersecurity Vulnerabilities

    Critical Authentication Bypass Discovered in Socomec Easy Config System (CVE-2024-45370)

    Overview A high-severity authentication bypass vulnerability, identified as CVE-2024-45370, has been discovered in the User profile management functionality of Socomec Easy Config System version 2.6.1.0. This flaw allows a malicious actor to gain unauthorized access by manipulating a specially crafted database record within the system. Exploitation requires local access to the database. Technical Details The vulnerability stems from insufficient validation of user authentication data stored within the Socomec Easy Config System’s database. By modifying a specific database record, an attacker can bypass the standard authentication process. The exact mechanism involves crafting a malicious database entry that tricks the system into…

  • Cybersecurity Vulnerabilities

    CVE-2024-39148: Unauthenticated Remote Code Execution in KerOS wmp-agent

    Overview CVE-2024-39148 describes a critical security vulnerability affecting KerOS versions prior to 5.12. Specifically, the `wmp-agent` service suffers from improper validation of so-called ‘magic URLs’. This flaw allows an unauthenticated, remote attacker to execute arbitrary operating system commands with root privileges, provided the `wmp-agent` service is reachable over the network. While the service is typically protected by a local firewall, misconfigurations or other network exposures could leave systems vulnerable. Technical Details The vulnerability stems from the `wmp-agent` service’s failure to properly sanitize and validate input received via specially crafted URLs (the “magic URLs”). By sending a malicious request containing OS…

  • Cybersecurity Vulnerabilities

    CVE-2024-32388: Critical Firewall Bypass in Kerlink KerOS Routers

    Overview CVE-2024-32388 is a medium severity vulnerability affecting Kerlink devices running KerOS prior to version 5.12. A firewall misconfiguration allows attackers to bypass security measures by sending specially crafted UDP packets, potentially granting unauthorized access to UDP-based services that should be protected by the firewall. Technical Details The vulnerability stems from an improperly configured firewall rule set within KerOS. Specifically, the firewall fails to adequately filter UDP packets based on certain criteria, allowing malicious actors to craft packets that are incorrectly accepted by the device. This leads to the bypass of intended access restrictions and opens the door to potentially…

  • Cybersecurity Vulnerabilities

    CVE-2024-32384: Kerlink Gateway HTTP Exposure – A Man-in-the-Middle Risk

    Published: 2025-12-01T16:15:49.217 Overview CVE-2024-32384 identifies a security vulnerability in Kerlink gateways running KerOS versions prior to 5.10. These gateways expose their web interface solely over HTTP, meaning that all communication between the client (e.g., a user’s web browser) and the gateway is unencrypted. This lack of encryption creates a significant risk of man-in-the-middle (MitM) attacks, where an attacker can intercept and potentially modify sensitive data being transmitted. Technical Details The core issue is the absence of HTTPS support for the Kerlink gateway’s web interface. HTTP transmits data in plain text, making it vulnerable to eavesdropping. A MitM attacker positioned between…

  • Cybersecurity Vulnerabilities

    Eximbills Enterprise Under Attack: Unveiling CVE-2025-64030 Stored XSS Vulnerability

    Overview CVE-2025-64030 identifies a stored cross-site scripting (XSS) vulnerability affecting Eximbills Enterprise version 4.1.5, built on 2020-10-30. This flaw allows an authenticated attacker to inject malicious JavaScript code into the application’s database. When other users access the affected data, the injected script executes in their browsers, potentially leading to session hijacking, data theft, or other malicious activities. Technical Details The vulnerability resides within the /EximBillWeb/servlets/WSTrxManager endpoint. The TMPL_INFO parameter is susceptible to stored XSS. User-supplied input to this parameter is not properly sanitized before being stored in the server-side database. When this unsanitized data is subsequently retrieved and displayed to…

  • Cybersecurity Vulnerabilities

    Urgent: Critical SQL Injection Flaw Threatens Blood Bank Management System (CVE-2025-63531)

    Overview A critical security vulnerability, identified as CVE-2025-63531, has been discovered in the Blood Bank Management System version 1.0. This vulnerability is a SQL injection flaw located within the receiverLogin.php component. This allows attackers to potentially bypass authentication and gain unauthorized access to sensitive data within the system. Technical Details The vulnerability arises because the application fails to properly sanitize user-supplied input within SQL queries. Specifically, the remail and rpassword fields in receiverLogin.php are vulnerable to SQL injection. An attacker can craft malicious SQL code within these fields, which, when processed by the application, can allow them to: Bypass authentication…

  • Cybersecurity Vulnerabilities

    CVE-2025-63529: Blood Bank Management System’s Session Vulnerability – A Critical Security Flaw

    Overview CVE-2025-63529 describes a medium-severity session fixation vulnerability identified in Blood Bank Management System version 1.0. This vulnerability resides within the login.php file and allows a malicious attacker to predetermine or manipulate a user’s session identifier before the user authenticates. Upon successful login, the application inadvertently continues to use the attacker-controlled session ID, leading to potential session hijacking and unauthorized access to the victim’s account. Technical Details The vulnerability stems from the lack of proper session ID regeneration upon successful user authentication within the login.php script. A session fixation attack works by the attacker first obtaining a valid session ID…

  • Cybersecurity Vulnerabilities

    Urgent: High-Severity XSS Flaw Exposes Blood Bank Management System

    Overview CVE-2025-63528 details a critical cross-site scripting (XSS) vulnerability identified in version 1.0 of the Blood Bank Management System. This vulnerability resides within the blooddinfo.php component and allows attackers to inject malicious JavaScript code into the error parameter. Due to inadequate input sanitization and encoding, the injected script executes in the victim’s browser when they access the vulnerable page, potentially leading to account compromise, data theft, or defacement of the application. Technical Details The vulnerability stems from the application’s failure to properly sanitize or encode user-supplied input passed through the error parameter in the blooddinfo.php script. An attacker can craft…

  • Cybersecurity Vulnerabilities

    CVE-2025-63527: Critical XSS Threatens Blood Bank Management System 1.0 Users

    Overview CVE-2025-63527 is a high-severity cross-site scripting (XSS) vulnerability discovered in the Blood Bank Management System version 1.0. This vulnerability allows attackers to inject malicious JavaScript code into user profiles, potentially compromising user accounts and data. The vulnerability is present in the updateprofile.php and hprofile.php components. Technical Details The Blood Bank Management System 1.0 fails to properly sanitize or encode user-supplied input within the updateprofile.php and hprofile.php files. Specifically, the application is vulnerable to stored XSS through the following parameters: hname hemail hpassword hphone hcity An attacker can inject malicious JavaScript payloads into these parameters. When a user views the…