2025-10-16 Daily Vulns
NEW:
| CVE | vendor-product | description | metric | Referenceurl | title | GithubURL | |
|---|---|---|---|---|---|---|---|
| CVE-2017-20204 | DBL Technology (DBLTek) - GoIP | DBLTek GoIP devices (models GoIP 1, 4, 8, 16, and 32) contain an undocumented vendor backdoor in the Telnet administrative interface that allows remote authentication as an undocumented user via a proprietary challenge–response scheme which is fundamentally flawed. Because the challenge response can be computed from the challenge itself, a remote attacker can authenticate without knowledge of a secret and obtain a root shell on the device. This can lead to persistent remote code execution, full device compromise, and arbitrary control of the device and any managed services. The firmware used within these devices was updated in December 2016 to make this vulnerability more complex to exploit. However, it is unknown if DBLTek has taken steps to fully mitigate. | CVSS4.0: 9.3 - CRITICAL | 0 1 2 3 | Exploitation: pocAutomatable: yesTechnical Impact: total | DBLTek GoIP Telnet Admin Interface Undocumented Backdoor | github |
| CVE-2011-10033 | is-human WordPress Plugin - is-human WordPress Plugin | The WordPress plugin is-human <= v1.4.2 contains an eval injection vulnerability in /is-human/engine.php that can be triggered via the ‘type’ parameter when the ‘action’ parameter is set to ‘log-reset’. The root cause is unsafe use of eval() on user-controlled input, which can lead to execution of attacker-supplied PHP and OS commands. This may result in arbitrary code execution as the webserver user, site compromise, or data exfiltration. The is-human plugin was made defunct in June 2008 and is no longer available for download. This vulnerability was exploited in the wild in March 2012. | CVSS4.0: 9.3 - CRITICAL | 0 1 2 3 4 | Exploitation: pocAutomatable: yesTechnical Impact: total | WordPress Plugin is-human <= v1.4.2 Eval Injection RCE | github |
| CVE-2016-15047 | AVTECH SECURITY Corporation - IP Camera, NVR, and DVR Devices | AVTECH devices that include the CloudSetup.cgi management endpoint are vulnerable to authenticated OS command injection. The `exefile` parameter in CloudSetup.cgi is passed to the underlying system command execution without proper validation or whitelisting. An authenticated attacker who can invoke this endpoint can supply crafted input to execute arbitrary system commands as root. Successful exploitation grants full control of the device, and - depending on deployment and whether the device stores credentials or has network reachability to internal systems - may enable credential theft, lateral movement, or data exfiltration. The archived SEARCH-LAB disclosure implies that this vulnerability was remediated in early 2017, but AVTECH has not defined an affected version range. | CVSS4.0: 8.7 - HIGH | 0 1 2 3 4 5 | Exploitation: pocAutomatable: noTechnical Impact: total | AVTECH CloudSetup.cgi Authenticated Command Injection | github |
| CVE-2023-50301 | IBM - Transformation Extender Advanced | IBM Transformation Extender Advanced 10.0.1 stores potentially sensitive information in log files that could be read by a local user. | CVSS3.1: 1.9 - LOW | 0 | Exploitation: noneAutomatable: noTechnical Impact: partial | IBM Transformation Extender Advanced information disclosure | github |
This post is licensed under CC BY 4.0 by the author.