CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
5,334 results Clear all
CVE-2024-55021 7.5 HIGH EPSS 0.00
Weintek cMT-3072XH2 v2.1.53 - Auth Bypass
Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain a hardcoded password in the FTP protocol.
CWE-798 Mar 03, 2026
CVE-2024-55020 9.8 CRITICAL EPSS 0.00
Weintek cMT-3072XH2 v2.1.53 - Command Injection
A command injection vulnerability in the DHCP activation feature of Weintek cMT-3072XH2 easyweb Web Version v2.1.53, OS v20231011 allows attackers to execute arbitrary commands with root privileges.
CWE-20 Mar 03, 2026
CVE-2025-67840 7.2 HIGH 1 Writeup EPSS 0.00
Cohesity TranZman 4.0-SEP2025 - Command Injection
Multiple authenticated OS command injection vulnerabilities exist in the Cohesity (formerly Stone Ram) TranZman 4.0 Build 14614 through TZM_1757588060_SEP2025_FULL.depot web application API endpoints (including Scheduler and Actions pages). The appliance directly concatenates user-controlled parameters into system commands without sufficient sanitisation, allowing an authenticated admin user to inject and execute arbitrary OS commands with root privileges. An attacker can intercept legitimate requests (e.g. during job creation or execution) using a proxy and modify parameters to include shell metacharacters, achieving remote code execution on the appliance. This completely bypasses the intended CLISH restricted shell confinement and results in full system compromise. The vulnerabilities persist in Release 4.0 Build 14614 including the latest patch (as of the time of testing) TZM_1757588060_SEP2025_FULL.depot.
CWE-78 Mar 03, 2026
CVE-2025-63911 7.2 HIGH 1 Writeup EPSS 0.01
Cohesity TranZman 4.0 Build 14614 - Command Injection
Cohesity TranZman Migration Appliance Release 4.0 Build 14614 was discovered to contain an authenticated command injection vulnerability.
CWE-78 Mar 03, 2026
CVE-2026-0654 8.0 HIGH EPSS 0.00
TP-Link Deco BE25 v1.0-1.1.1 - Command Injection
Improper input handling in the administration web interface on TP-Link Deco BE25 v1.0 allows crafted input to be executed as part of an OS command. An authenticated adjacent attacker may execute arbitrary commands via crafted configuration file, impacting confidentiality, integrity and availability of the device. This issue affects Deco BE25 v1.0: through 1.1.1 Build 20250822.
CWE-78 Mar 02, 2026
CVE-2026-24101 9.8 CRITICAL 1 Writeup EPSS 0.01
Tenda AC15V1.0 V15.03.05.18 - Command Injection
An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_multi. When the condition is met, `s1_1` will be passed into sub_B0488, concatenated into `doSystemCmd`. The value of s1_1 is not validated, potentially leading to a command injection vulnerability.
CWE-78 Mar 02, 2026
CVE-2025-50197 7.2 HIGH 1 Writeup EPSS 0.01
Chamilo <1.11.30 - Command Injection
Chamilo is a learning management system. Prior to version 1.11.30, there is an OS Command Injection vulnerability in /main/admin/sub_language_ajax.inc.php via the POST new_language parameter. This issue has been patched in version 1.11.30.
CWE-78 Mar 02, 2026
CVE-2025-50196 7.2 HIGH 1 Writeup EPSS 0.01
Chamilo <1.11.30 - Command Injection
Chamilo is a learning management system. Prior to version 1.11.30, there is an OS Command Injection vulnerability in /plugin/vchamilo/views/editinstance.php via the POST main_database parameter. This issue has been patched in version 1.11.30.
CWE-78 Mar 02, 2026
CVE-2025-50195 7.2 HIGH 1 Writeup EPSS 0.01
Chamilo <1.11.30 - Command Injection
Chamilo is a learning management system. Prior to version 1.11.30, there is an OS Command Injection vulnerability in /plugin/vchamilo/views/manage.controller.php. This issue has been patched in version 1.11.30.
CWE-78 Mar 02, 2026
CVE-2025-50194 7.2 HIGH 1 Writeup EPSS 0.01
Chamilo <1.11.30 - Command Injection
Chamilo is a learning management system. Prior to version 1.11.30, there is an OS Command Injection vulnerability in /main/cron/lang/check_parse_lang.php. This issue has been patched in version 1.11.30.
CWE-78 Mar 02, 2026
CVE-2025-50193 7.2 HIGH 1 Writeup EPSS 0.01
Chamilo <1.11.30 - Command Injection
Chamilo is a learning management system. Prior to version 1.11.30, there is an OS command Injection vulnerability in /plugin/vchamilo/views/import.php with the POST to_main_database parameter. This issue has been patched in version 1.11.30.
CWE-78 Mar 02, 2026
CVE-2025-30044 EPSS 0.00
CliniNET.prd - Code Injection
In the endpoints "/cgi-bin/CliniNET.prd/utils/usrlogstat_simple.pl", "/cgi-bin/CliniNET.prd/utils/usrlogstat.pl", "/cgi-bin/CliniNET.prd/utils/userlogstat2.pl", and "/cgi-bin/CliniNET.prd/utils/dblogstat.pl", the parameters are not sufficiently normalized, which enables code injection.
CWE-78 Mar 02, 2026
CVE-2026-28517 9.8 CRITICAL 2 Writeups EPSS 0.01
openDCIM 23.04 - Command Injection
openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in report_network_map.php. The application retrieves the 'dot' configuration parameter from the database and passes it directly to exec() without validation or sanitation. If an attacker can modify the fac_Config.dot value, arbitrary commands may be executed in the context of the web server process.
CWE-78 Feb 27, 2026
CVE-2026-28417 4.4 MEDIUM 1 PoC 1 Writeup Analysis EPSS 0.00
Vim <9.2.0073 - Command Injection
Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue.
CWE-78 Feb 27, 2026
CVE-2026-28409 10.0 CRITICAL 1 PoC Analysis EPSS 0.00
WeGIA <3.6.5 - RCE
WeGIA is a web manager for charitable institutions. Prior to version 3.6.5, a critical Remote Code Execution (RCE) vulnerability exists in the WeGIA application's database restoration functionality. An attacker with administrative access (which can be obtained via the previously reported Authentication Bypass) can execute arbitrary OS commands on the server by uploading a backup file with a specifically crafted filename. Version 3.6.5 fixes the issue.
CWE-78 Feb 27, 2026
CVE-2026-21654 9.8 CRITICAL EPSS 0.00
Johnson Controls Frick Controls Quantum HD <=10.22 - Command Injection
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows OS Command Injection. Insufficient validation of input in certain parameters may permit unexpected actions, which could impact the security of the device before authentication occurs.This issue affects Frick Controls Quantum HD version 10.22 and prior.
CWE-78 Feb 27, 2026
CVE-2026-0980 8.3 HIGH EPSS 0.00
rubyipmi - Authenticated RCE
A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious username for the BMC interface. This could lead to remote code execution (RCE) on the system.
CWE-78 Feb 27, 2026
CVE-2026-3301 9.8 CRITICAL 1 Writeup EPSS 0.04
Totolink N300RH 6.1c.1353_B20190305 - Command Injection
A security flaw has been discovered in Totolink N300RH 6.1c.1353_B20190305. Affected by this vulnerability is the function setWebWlanIdx of the file /cgi-bin/cstecgi.cgi of the component Web Management Interface. Performing a manipulation of the argument webWlanIdx results in os command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.
CWE-78 Feb 27, 2026
CVE-2026-3037 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <=1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by modifying malicious input injected into the MBird SMS service URL and/or code via the utility route which is later processed during system setup, leading to remote code execution.
CWE-78 Feb 27, 2026
CVE-2026-25721 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the server username and/or password fields of the restore action in the API V1 route.
CWE-78 Feb 27, 2026