• Cybersecurity Vulnerabilities

    CVE-2025-3012: Critical Null Pointer Dereference in Unisoc DPC Modem Leads to Remote DoS

    Overview CVE-2025-3012 is a high-severity vulnerability affecting Unisoc’s dpc modem. This vulnerability allows a remote attacker to trigger a system crash leading to a denial-of-service (DoS) condition. The root cause is a null pointer dereference within the dpc modem’s software. Exploitation of this vulnerability does not require any additional execution privileges. Technical Details The vulnerability resides in the dpc modem component of Unisoc chipsets. A specifically crafted input or network condition can lead to a null pointer being dereferenced during operation. When the modem attempts to access memory at address zero (or a null address), it triggers a system exception,…

  • Cybersecurity Vulnerabilities

    Critical SSRF Vulnerability Exposes Mogu Blog v2: CVE-2025-13814

    Overview A critical Server-Side Request Forgery (SSRF) vulnerability, identified as CVE-2025-13814, has been discovered in moxi159753 Mogu Blog v2 versions up to 5.2. This flaw allows remote attackers to manipulate the application and potentially gain unauthorized access to internal resources or perform malicious actions on behalf of the server. The vendor has been notified but has not responded to the disclosure. Technical Details The vulnerability exists within the LocalFileServiceImpl.uploadPictureByUrl function located in the /file/uploadPicsByUrl endpoint. By manipulating the URL provided to this function, an attacker can force the server to make requests to arbitrary internal or external resources. This can…

  • Cybersecurity Vulnerabilities

    CVE-2025-11133: Critical nr Modem Vulnerability Exposes Devices to Remote DoS Attacks

    Overview CVE-2025-11133 is a high-severity vulnerability discovered in nr modem. This vulnerability stems from improper input validation, which could lead to a system crash and result in a remote denial-of-service (DoS) condition. Importantly, exploitation of this vulnerability does not require any additional execution privileges. Technical Details The vulnerability resides in the nr modem component related to the processing of specific input data. Due to insufficient validation of this data, a malformed input can trigger an unhandled exception or memory corruption, ultimately leading to a system crash. An attacker could exploit this vulnerability by sending specially crafted packets or data streams…

  • Cybersecurity Vulnerabilities

    CVE-2025-11132: Critical Vulnerability in NR Modem Leading to Remote Denial of Service

    Overview CVE-2025-11132 is a high-severity vulnerability discovered in NR (New Radio) modems. This vulnerability stems from improper input validation, which can be exploited by a remote attacker to cause a system crash, leading to a denial-of-service (DoS) condition. No additional execution privileges are required to exploit this flaw. Published on 2025-12-01T08:15:47.350, this vulnerability poses a significant risk to devices using affected NR modems. Technical Details The vulnerability lies in how the NR modem handles specific input data. Due to insufficient validation of the input, a specially crafted packet can trigger an unexpected state within the modem’s firmware. This, in turn,…

  • Cybersecurity Vulnerabilities

    CVE-2025-11131: Critical Vulnerability in nr Modem Enables Remote Denial of Service

    Overview CVE-2025-11131 is a high-severity vulnerability affecting the nr modem component. This vulnerability stems from improper input validation, potentially allowing an attacker to trigger a system crash, leading to a remote Denial of Service (DoS) condition. No additional execution privileges are required to exploit this flaw, making it a significant security concern. Technical Details The core issue lies within the nr modem’s handling of specific input. Due to insufficient validation, a crafted input can trigger a buffer overflow or other memory corruption error, causing the modem to crash. The exact nature of the vulnerable input and the specific memory corruption…

  • Cybersecurity Vulnerabilities

    CVE-2025-13813: Mogu Blog v2 Vulnerable to Broken Access Control – Are You at Risk?

    Overview CVE-2025-13813 details a medium severity vulnerability found in Mogu Blog v2 up to version 5.2. This vulnerability relates to broken access control within the Storage Management Endpoint, specifically affecting the handling of files in the /storage/ directory. An attacker could potentially exploit this flaw to bypass authorization checks and gain unauthorized access to sensitive resources. Published on December 1st, 2025, this vulnerability has a publicly available exploit, increasing the risk for unpatched systems. The vendor has been unresponsive to disclosure attempts. Technical Details The vulnerability resides in the inadequate access control mechanisms for the /storage/ endpoint within Mogu Blog…

  • Cybersecurity Vulnerabilities

    CVE-2025-13811: Critical SQL Injection Flaw Threatens jsnjfz WebStack-Guns 1.0

    Overview CVE-2025-13811 describes a SQL Injection vulnerability discovered in jsnjfz WebStack-Guns version 1.0. This flaw allows a remote attacker to execute arbitrary SQL commands by manipulating the `sort` argument in the `PageFactory.java` file. The vendor was notified but did not respond to the disclosure. Technical Details The vulnerability resides within the `src/main/java/com/jsnjfz/manage/core/common/constant/factory/PageFactory.java` file of the jsnjfz WebStack-Guns 1.0 application. By injecting malicious SQL code into the `sort` parameter, an attacker can bypass security measures and directly interact with the database. This allows them to read, modify, or even delete sensitive data. The publicly available exploit confirms that this attack can…

  • Cybersecurity Vulnerabilities

    CVE-2025-13810: Unveiling the Path Traversal Flaw in WebStack-Guns 1.0

    Overview CVE-2025-13810 identifies a medium-severity path traversal vulnerability present in jsnjfz WebStack-Guns version 1.0. This flaw allows a remote attacker to manipulate input and potentially access sensitive files on the server by bypassing intended directory access restrictions. The vendor was notified of this vulnerability but did not respond. Technical Details The vulnerability resides within the renderPicture function of the KaptchaController.java file (src/main/java/com/jsnjfz/manage/modular/system/controller/KaptchaController.java). By crafting a malicious request, an attacker can manipulate the input parameters to traverse the file system, potentially reading arbitrary files. The exploit is publicly available, increasing the risk of exploitation. CVSS Analysis The Common Vulnerability Scoring System…

  • Cybersecurity Vulnerabilities

    CVE-2025-13809: Unveiling a Critical SSRF Vulnerability in Orionsec Orion-Ops SSH Connection

    Overview CVE-2025-13809 describes a Server-Side Request Forgery (SSRF) vulnerability discovered in Orionsec Orion-Ops, specifically affecting versions up to commit 5925824997a3109651bbde07460958a7be249ed1. This vulnerability resides within the SSH connection handler, allowing remote attackers to potentially execute arbitrary requests on the server. Technical Details The vulnerability is located in the orion-ops-api/orion-ops-web/src/main/java/cn/orionsec/ops/controller/MachineInfoController.java file. By manipulating the host, sshPort, username, password, and authType arguments related to SSH connections, an attacker can force the server to make requests to unintended locations. This bypasses security controls and enables unauthorized access or information disclosure. The publicly available exploit highlights the ease with which this vulnerability can be exploited.…

  • Cybersecurity Vulnerabilities

    CVE-2025-13808: Critical Privilege Escalation in OrionSec Orion-Ops User Profile Handler

    Overview CVE-2025-13808 describes a high-severity vulnerability found in OrionSec Orion-Ops, specifically affecting versions up to commit 5925824997a3109651bbde07460958a7be249ed1. This flaw allows a remote attacker to escalate privileges due to improper authorization within the User Profile Handler. The vendor was notified but did not respond. A proof-of-concept exploit is publicly available, making this vulnerability particularly dangerous. Technical Details The vulnerability resides in the update function of the UserController.java file within the orion-ops-api/orion-ops-web/src/main/java/cn/orionsec/ops/controller/ directory. The issue stems from improper authorization checks when updating user profile information. An attacker can manipulate the ID argument during the update process to modify attributes of other user…