CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
2,026 results Clear all
CVE-2025-14300 8.1 HIGH EPSS 0.00
Tapo C200 V3 - DoS
The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS).
CWE-306 Dec 20, 2025
CVE-2025-52692 8.8 HIGH 1 PoC Analysis EPSS 0.00
Linksys E9450-sg Firmware - Missing Authentication
Successful exploitation of the vulnerability could allow an attacker with local network access to send a specially crafted URL to access certain administration functions without login credentials.
CWE-306 Dec 19, 2025
CVE-2025-63391 7.5 HIGH EPSS 0.00
Open-WebUI <=0.6.32 - Auth Bypass
An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.
CWE-306 Dec 18, 2025
CVE-2025-63390 5.3 MEDIUM EPSS 0.00
AnythingLLM v1.8.5 - Auth Bypass
An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the /api/workspaces endpoint. The endpoint fails to implement proper authentication checks, allowing unauthenticated remote attackers to enumerate and retrieve detailed information about all configured workspaces. Exposed data includes: workspace identifiers (id, name, slug), AI model configurations (chatProvider, chatModel, agentProvider), system prompts (openAiPrompt), operational parameters (temperature, history length, similarity thresholds), vector search settings, chat modes, and timestamps.
CWE-306 Dec 18, 2025
CVE-2025-63389 9.8 CRITICAL EPSS 0.00
Ollama <v0.12.3 - Auth Bypass
A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.
CWE-306 Dec 18, 2025
CVE-2025-65010 1 Writeup EPSS 0.00
WODESYS WD-R608U - Auth Bypass
WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) is vulnerable to Broken Access Control in initial configuration wizard.cgi endpoint. Malicious attacker can change admin panel password without authorization. The vulnerability can also be exploited after the initial configuration has been set. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
CWE-306 Dec 18, 2025
CVE-2025-65007 1 Writeup EPSS 0.00
WODESYS WD- R608U - Command Injection
In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of authentication in the configuration change module in the adm.cgi endpoint, the unauthenticated attacker can execute commands including backup creation, device restart and resetting the device to factory settings. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
CWE-306 Dec 18, 2025
CVE-2025-43428 9.8 CRITICAL EPSS 0.00
visionOS <26.2 - Info Disclosure
A configuration issue was addressed with additional restrictions. This issue is fixed in visionOS 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2. Photos in the Hidden Photos Album may be viewed without authentication.
CWE-306 Dec 17, 2025
CVE-2025-34434 9.1 CRITICAL 1 Writeup EPSS 0.00
Wwbn Avideo < 20.0 - Missing Authentication
AVideo versions prior to 20.1 with the ImageGallery plugin enabled is vulnerable to unauthenticated file upload and deletion. Plugin endpoints responsible for managing gallery images fail to enforce authentication checks and do not validate ownership, allowing unauthenticated attackers to upload or delete images associated with any image-based video.
CWE-306 Dec 17, 2025
CVE-2023-53896 7.5 HIGH 1 PoC Analysis EPSS 0.00
D-Link DAP-1325 1.01 - Info Disclosure
D-Link DAP-1325 firmware version 1.01 contains a broken access control vulnerability that allows unauthenticated attackers to download device configuration settings without authentication. Attackers can exploit the /cgi-bin/ExportSettings.sh endpoint to retrieve sensitive configuration information by directly accessing the export settings script.
CWE-306 Dec 16, 2025
CVE-2025-14038 7.0 HIGH EPSS 0.00
EDB Hybrid Manager <1.3.3 - SSRF
EDB Hybrid Manager contains a flaw that allows an unauthenticated attacker to directly access certain gRPC endpoints. This could allow an attacker to read potentially sensitive data or possibly cause a denial-of-service by writing malformed data to certain gRPC endpoints. This flaw has been remediated in EDB Hybrid Manager 1.3.3, and customers should consider upgrading to 1.3.3 as soon as possible. The flaw is due to a misconfiguration in the Istio Gateway, which manages authentication and authorization for the affected endpoints. The security policy relies on an explicit definition of required permissions in the Istio Gateway configuration, and the affected endpoints were not defined in the configuration. This allowed requests to bypass both authentication and authorization within a Hybrid Manager service. All versions of Hybrid Manager - LTS should be upgraded to 1.3.3, and all versions of Hybrid Manager - Innovation should be upgraded to 2025.12.
CWE-862 Dec 15, 2025
CVE-2025-14567 5.3 MEDIUM 1 Writeup EPSS 0.00
Haxxorsid Stock-management-system < 2018-01-27 - Missing Authentication
A weakness has been identified in haxxorsid Stock-Management-System up to fbbbf213e9c93b87183a3891f77e3cc7095f22b0. This affects an unknown function of the file /api/employees. Executing manipulation can lead to missing authentication. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.
CWE-287 Dec 12, 2025
CVE-2025-12348 5.3 MEDIUM EPSS 0.00
Icegram Express <5.9.10 - Auth Bypass
The Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 5.9.10. This is due to the plugin not properly verifying that a user is authorized to perform an action in the `run_action_scheduler_task` function. This makes it possible for unauthenticated attackers to execute scheduled actions early or repeatedly by guessing action IDs, potentially triggering email sends, maintenance tasks, or other privileged operations, causing unexpected state changes and resource usage.
CWE-306 Dec 12, 2025
CVE-2025-67780 4.2 MEDIUM 1 PoC Analysis EPSS 0.00
SpaceX Starlink Dish - Unauthenticated RCE
SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish.
CWE-306 Dec 11, 2025
CVE-2024-58300 1 PoC Analysis EPSS 0.00
Siklu MultiHaul TG <2.0.0 - RCE
Siklu MultiHaul TG series devices before version 2.0.0 contain an unauthenticated vulnerability that allows remote attackers to retrieve randomly generated credentials via a network request. Attackers can send a specific hex-encoded command to port 12777 to obtain username and password, enabling direct SSH access to the device.
CWE-306 Dec 11, 2025
CVE-2025-65828 6.5 MEDIUM EPSS 0.00
Meatmeet - DoS
An unauthenticated attacker within proximity of the Meatmeet device can issue several commands over Bluetooth Low Energy (BLE) to these devices which would result in a Denial of Service. These commands include: shutdown, restart, clear config. Clear config would disassociate the current device from its user and would require re-configuration to re-enable the device. As a result, the end user would be unable to receive updates from the Meatmeet base station which communicates with the cloud services until the device had been fixed or turned back on.
CWE-306 Dec 10, 2025
CVE-2025-65824 8.8 HIGH 1 Writeup EPSS 0.00
Meatmeet - RCE
An unauthenticated attacker within proximity of the Meatmeet device can perform an unauthorized Over The Air (OTA) firmware upgrade using Bluetooth Low Energy (BLE), resulting in the firmware on the device being overwritten with the attacker's code. As the device does not perform checks on upgrades, this results in Remote Code Execution (RCE) and the victim losing complete access to the Meatmeet.
CWE-306 Dec 10, 2025
CVE-2020-36894 7.5 HIGH 1 PoC Analysis EPSS 0.01
Eibiz i-Media Server Digital Signage 3.8.0 - Auth Bypass
Eibiz i-Media Server Digital Signage 3.8.0 contains an authentication bypass vulnerability that allows unauthenticated attackers to create admin users through AMF-encoded object manipulation. Attackers can send crafted serialized objects to the /messagebroker/amf endpoint to create administrative users without authentication, bypassing security controls.
CWE-306 Dec 10, 2025
CVE-2020-36892 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Eibiz i-Media Server Digital Signage 3.8.0 - Privilege Escalation
Eibiz i-Media Server Digital Signage 3.8.0 contains an unauthenticated privilege escalation vulnerability in the updateUser object that allows attackers to modify user roles. Attackers can exploit the /messagebroker/amf endpoint to elevate privileges and take over user accounts by manipulating role settings without authentication.
CWE-306 Dec 10, 2025
CVE-2025-13607 9.4 CRITICAL 1 Writeup EPSS 0.00
Camera Configuration Info Disclosure
A malicious actor can access camera configuration information, including account credentials, without authenticating when accessing a vulnerable URL.
CWE-306 Dec 10, 2025