CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
2,026 results Clear all
CVE-2026-0842 6.3 MEDIUM 1 PoC Analysis EPSS 0.00
Flycatcher Toys smART Sketcher <2.0 - Missing Authentication
A flaw has been found in Flycatcher Toys smART Sketcher up to 2.0. This affects an unknown part of the component Bluetooth Low Energy Interface. This manipulation causes missing authentication. The attack can only be done within the local network. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-287 Jan 11, 2026
CVE-2025-69425 EPSS 0.00
Ruckus vRIoT IoT Controller <3.0.0.0 - Command Injection
The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a command execution service on TCP port 2004 running with root privileges. Authentication to this service relies on a hardcoded Time-based One-Time Password (TOTP) secret and an embedded static token. An attacker who extracts these credentials from the appliance or a compromised device can generate valid authentication tokens and execute arbitrary OS commands with root privileges, resulting in complete system compromise.
CWE-306 Jan 09, 2026
CVE-2025-66049 7.5 HIGH EPSS 0.00
Vivotek IP7137 - Info Disclosure
Vivotek IP7137 camera with firmware version 0200a is vulnerable to an information disclosure issue where live camera footage can be accessed through the RTSP protocol on port 8554 without requiring authentication. This allows unauthorized users with network access to view the camera's feed, potentially compromising user privacy and security.  The vendor has not replied to the CNA. Possibly all firmware versions are affected. Since the product has met End-Of-Life phase, a fix is not expected to be released.
CWE-306 Jan 09, 2026
CVE-2025-68716 8.4 HIGH 1 Writeup EPSS 0.00
KAYSUS KS-WR3600 - RCE
KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled by default on the LAN interface. The root account is configured with no password, and administrators cannot disable SSH or enforce authentication via the CLI or web GUI. This allows any LAN-adjacent attacker to trivially gain root shell access and execute arbitrary commands with full privileges.
CWE-284 Jan 08, 2026
CVE-2025-68715 9.1 CRITICAL 1 Writeup EPSS 0.01
Panda Wireless PWRU0 <2.2.9 - Privilege Escalation
An issue was discovered in Panda Wireless PWRU0 devices with firmware 2.2.9 that exposes multiple HTTP endpoints (/goform/setWan, /goform/setLan, /goform/wirelessBasic) that do not enforce authentication. A remote unauthenticated attacker can modify WAN, LAN, and wireless settings directly, leading to privilege escalation and denial of service.
CWE-306 Jan 08, 2026
CVE-2025-65731 6.8 MEDIUM 1 PoC Analysis EPSS 0.00
D-Link Router DIR-605L - Command Injection
An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware version: V6.02CN02) allowing an attacker with physical access to the UART pins to execute arbitrary commands due to presence of root terminal access on a serial interface without proper access control.
CWE-306 Jan 08, 2026
CVE-2025-15346 1 Writeup EPSS 0.00
Pypi Wolfssl < 5.8.4.post0 - Missing Authentication
A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced.  Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided.  This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake.  The issue affects versions up to and including 5.8.2.
CWE-287 Jan 08, 2026
CVE-2017-20213 7.5 HIGH 1 PoC Analysis EPSS 0.00
FLIR Thermal Camera F/FC/PT/D Stream <8.0.0.64 - Info Disclosure
FLIR Thermal Camera F/FC/PT/D Stream firmware version 8.0.0.64 contains an unauthenticated vulnerability that allows remote attackers to access live camera streams without credentials. Attackers can exploit the vulnerability to view unauthorized thermal camera video feeds across multiple camera series without requiring any authentication.
CWE-306 Jan 08, 2026
CVE-2026-0650 EPSS 0.00
Flagr - Missing Authentication
OpenFlagr versions prior to and including 1.1.18 contain an authentication bypass vulnerability in the HTTP middleware. Due to improper handling of path normalization in the whitelist logic, crafted requests can bypass authentication and access protected API endpoints without valid credentials. Unauthorized access may allow modification of feature flags and export of sensitive data.
CWE-306 Jan 07, 2026
CVE-2025-31963 2.9 LOW EPSS 0.00
Hcltech Bigfix Insights For Vulnerabi... - Missing Authentication
Improper authentication and missing CSRF protection in the local setup interface component in HCL BigFix IVR version 4.2 allows a local attacker to perform unauthorized configuration changes via unauthenticated administrative configuration requests.
CWE-306 Jan 07, 2026
CVE-2026-0625 EXPLOITED EPSS 0.01
D-Link DSL/DIR/DNS - Auth Bypass
Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality. By directly requesting this endpoint, an attacker can modify the device’s DNS settings without valid credentials, enabling DNS hijacking (“DNSChanger”) attacks that redirect user traffic to attacker-controlled infrastructure. In 2019, D-Link reported that this behavior was leveraged by the "GhostDNS" malware ecosystem targeting consumer and carrier routers. All impacted products were subsequently designated end-of-life/end-of-service, and no longer receive security updates. Exploitation evidence was observed by the Shadowserver Foundation on 2025-11-27 (UTC).
CWE-306 Jan 05, 2026
CVE-2025-14346 9.8 CRITICAL EPSS 0.00
WHILL Model C2/F - RCE
WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within range can pair with the device and issue movement commands, override speed restrictions, and manipulate configuration profiles without any credentials or user interaction.
CWE-306 Jan 05, 2026
CVE-2025-15026 9.8 CRITICAL EPSS 0.00
Centreon Awie < 24.04.3 - Missing Authentication
Missing Authentication for Critical Function vulnerability in Centreon Infra Monitoring centreon-awie (Awie import module) allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.3, from 24.04.0 before 24.04.3.
CWE-306 Jan 05, 2026
CVE-2025-3646 7.3 HIGH EPSS 0.00
Petlibro < 1.7.31 - Missing Authentication
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an authorization bypass vulnerability that allows unauthorized users to add users as shared owners to any device by exploiting missing permission checks. Attackers can send requests to the device share API to gain unauthorized access to devices and view owner information without proper authorization validation.
CWE-306 Jan 04, 2026
CVE-2026-21446 9.8 CRITICAL 1 Writeup EPSS 0.00
Webkul Bagisto < 2.3.10 - Missing Authentication
Bagisto is an open source laravel eCommerce platform. In versions on the 2.3 branch prior to 2.3.10, API routes remain active even after initial installation is complete. The underlying API endpoints (`/install/api/*`) are directly accessible and exploitable without any authentication. An attacker can bypass the Ib installer entirely by calling the API endpoints directly. This allows any unauthenticated attacker to create admin accounts, modify application configurations, and potentially overwrite existing data. Version 2.3.10 fixes the issue.
CWE-306 Jan 02, 2026
CVE-2026-21445 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Langflow < 1.7.1 - Missing Authentication
Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.0.dev45, multiple critical API endpoints in Langflow are missing authentication controls. The issue allows any unauthenticated user to access sensitive user conversation data, transaction histories, and perform destructive operations including message deletion. This affects endpoints handling personal data and system operations that should require proper authorization. Version 1.7.0.dev45 contains a patch.
CWE-306 Jan 02, 2026
CVE-2020-36904 7.5 HIGH 1 PoC Analysis EPSS 0.00
Selea CarPlateServer 4.0.1.6 - RCE
Selea CarPlateServer 4.0.1.6 contains a remote program execution vulnerability that allows attackers to execute arbitrary Windows binaries by manipulating the NO_LIST_EXE_PATH configuration parameter. Attackers can bypass authentication through the /cps/ endpoint and modify server configuration, including changing admin passwords and executing system commands.
CWE-306 Dec 31, 2025
CVE-2024-58336 5.3 MEDIUM EPSS 0.00
Akuvox S539 Firmware - Missing Authentication
Akuvox Smart Intercom S539 contains an unauthenticated vulnerability that allows remote attackers to access live video streams by requesting the video.cgi endpoint on port 8080. Attackers can retrieve video stream data without authentication by directly accessing the specified endpoint on affected Akuvox doorphone and intercom devices.
CWE-306 Dec 30, 2025
CVE-2022-50790 7.5 HIGH EPSS 0.00
SOUND4 IMPACT/FIRST/PULSE/Eco <2 - Info Disclosure
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain an unauthenticated vulnerability that allows remote attackers to access live radio stream information through webplay or ffmpeg scripts. Attackers can exploit the vulnerability by calling specific web scripts to disclose radio stream details without requiring authentication.
CWE-306 Dec 30, 2025
CVE-2025-66377 7.5 HIGH EPSS 0.00
Pexip Infinity <39.0 - Privilege Escalation
Pexip Infinity before 39.0 has Missing Authentication for a Critical Function in a product-internal API, allowing an attacker (who already has access to execute code on one node within a Pexip Infinity installation) to impact the operation of other nodes within the installation.
CWE-306 Dec 25, 2025