CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
5,334 results Clear all
CVE-2026-26009 9.9 CRITICAL 1 Writeup EPSS 0.00
Catalyst - RCE
Catalyst is a platform built for enterprise game server hosts, game communities, and billing panel integrations. Install scripts defined in server templates execute directly on the host operating system as root via bash -c, with no sandboxing or containerization. Any user with template.create or template.update permission can define arbitrary shell commands that achieve full root-level remote code execution on every node machine in the cluster. This vulnerability is fixed in commit 11980aaf3f46315b02777f325ba02c56b110165d.
CWE-78 Feb 10, 2026
CVE-2026-0652 8.8 HIGH EPSS 0.00
Tp-link Tapo C260 Firmware < 1.1.9 - OS Command Injection
On TP-Link Tapo C260 v1, command injection vulnerability exists due to improper sanitization in certain POST parameters during configuration synchronization. An authenticated attacker can execute arbitrary system commands with high impact on confidentiality, integrity and availability. It may cause full device compromise.
CWE-78 Feb 10, 2026
CVE-2025-11142 7.1 HIGH EPSS 0.00
VAPIX API - RCE
The VAPIX API mediaclip.cgi that did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator- privileged service account.
CWE-78 Feb 10, 2026
CVE-2026-2260 7.2 HIGH 1 Writeup EPSS 0.00
Dlink Dcs-931l Firmware < 1.13.00 - Command Injection
A vulnerability was found in D-Link DCS-931L up to 1.13.0. This affects an unknown part of the file /goform/setSysAdmin. The manipulation of the argument AdminID results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
CWE-77 Feb 10, 2026
CVE-2026-2210 7.2 HIGH EPSS 0.00
Dlink Dir-823x Firmware - Command Injection
A vulnerability has been found in D-Link DIR-823X 250416. This affects the function sub_4211C8 of the file /goform/set_filtering. Such manipulation leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CWE-77 Feb 09, 2026
CVE-2026-2188 7.2 HIGH 1 Writeup EPSS 0.00
UTT 521g Firmware - Command Injection
A vulnerability was determined in UTT 进取 521G 3.1.1-190816. The impacted element is the function sub_446B18 of the file /goform/formPdbUpConfig. Executing a manipulation of the argument policyNames can lead to os command injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.
CWE-77 Feb 08, 2026
CVE-2026-2184 7.3 HIGH 1 Writeup EPSS 0.00
Great Developers Certificate Generation System <97171bb0e5e22e52eac...
A vulnerability was detected in Great Developers Certificate Generation System up to 97171bb0e5e22e52eacf4e4fa81773e5f3cffb73. This vulnerability affects unknown code of the file /restructured/csv.php. The manipulation of the argument photo results in os command injection. The attack can be executed remotely. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The code repository of the project has not been active for many years.
CWE-78 Feb 08, 2026
CVE-2026-2175 7.2 HIGH EPSS 0.00
Dlink Dir-823x Firmware - Command Injection
A weakness has been identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_420618 of the file /goform/set_upnp. This manipulation of the argument upnp_enable causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
CWE-77 Feb 08, 2026
CVE-2026-2167 6.3 MEDIUM EPSS 0.02
Totolink Wa300 Firmware - Command Injection
A vulnerability was detected in Totolink WA300 5.2cu.7112_B20190227. The impacted element is the function setAPNetwork of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Ipaddr results in os command injection. The attack may be performed from remote. The exploit is now public and may be used.
CWE-77 Feb 08, 2026
CVE-2026-2157 7.2 HIGH EPSS 0.00
Dlink Dir-823x Firmware - Command Injection
A security vulnerability has been detected in D-Link DIR-823X 250416. This affects the function sub_4175CC of the file /goform/set_static_route_table. Such manipulation of the argument interface/destip/netmask/gateway/metric leads to os command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
CWE-77 Feb 08, 2026
CVE-2026-2155 7.2 HIGH EPSS 0.00
Dlink Dir-823x Firmware - Command Injection
A security flaw has been discovered in D-Link DIR-823X 250416. The affected element is the function sub_4208A0 of the file /goform/set_dmz of the component Configuration Handler. The manipulation of the argument dmz_host/dmz_enable results in os command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.
CWE-77 Feb 08, 2026
CVE-2026-2152 7.2 HIGH EPSS 0.02
Dlink Dir-615 Firmware - Command Injection
A vulnerability was found in D-Link DIR-615 4.10. This vulnerability affects unknown code of the file adv_routing.php of the component Web Configuration Interface. Performing a manipulation of the argument dest_ip/ submask/ gw results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
CWE-77 Feb 08, 2026
CVE-2026-2151 7.2 HIGH EPSS 0.00
Dlink Dir-615 Firmware - Command Injection
A vulnerability has been found in D-Link DIR-615 4.10. This affects an unknown part of the file adv_firewall.php of the component DMZ Host Feature. Such manipulation of the argument dmz_ipaddr  leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CWE-77 Feb 08, 2026
CVE-2026-2143 7.2 HIGH EPSS 0.00
Dlink Dir-823x Firmware - Command Injection
A security vulnerability has been detected in D-Link DIR-823X 250416. This issue affects some unknown processing of the file /goform/set_ddns of the component DDNS Service. The manipulation of the argument ddnsType/ddnsDomainName/ddnsUserName/ddnsPwd leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
CWE-77 Feb 08, 2026
CVE-2026-2142 7.2 HIGH EPSS 0.00
Dlink Dir-823x Firmware - Command Injection
A weakness has been identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_420688 of the file /goform/set_qos. Executing a manipulation can lead to os command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.
CWE-77 Feb 08, 2026
CVE-2026-2131 6.3 MEDIUM 1 Writeup EPSS 0.00
XixianLiang HarmonyOS-mcp-server <0.1.0 - Command Injection
A vulnerability was identified in XixianLiang HarmonyOS-mcp-server 0.1.0. This vulnerability affects the function input_text. The manipulation of the argument text leads to os command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
CWE-77 Feb 08, 2026
CVE-2026-2129 7.2 HIGH EPSS 0.00
Dlink Dir-823x Firmware - Command Injection
A vulnerability was found in D-Link DIR-823X 250416. Affected by this issue is some unknown functionality of the file /goform/set_ac_status. Performing a manipulation of the argument ac_ipaddr/ac_ipstatus/ap_randtime results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used.
CWE-77 Feb 08, 2026
CVE-2026-2120 7.2 HIGH EPSS 0.00
Dlink Dir-823x Firmware - Command Injection
A vulnerability was identified in D-Link DIR-823X 250416. This affects an unknown function of the file /goform/set_server_settings of the component Configuration Parameter Handler. The manipulation of the argument terminal_addr/server_ip/server_port leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
CWE-77 Feb 08, 2026
CVE-2026-25857 8.8 HIGH 2 PoCs Analysis EPSS 0.00
Tenda G300-F <16.01.14.2 - Command Injection
Tenda G300-F router firmware version 16.01.14.2 and prior contain an OS command injection vulnerability in the WAN diagnostic functionality (formSetWanDiag). The implementation constructs a shell command that invokes curl and incorporates attacker-controlled input into the command line without adequate neutralization. As a result, a remote attacker with access to the affected management interface can inject additional shell syntax and execute arbitrary commands on the device with the privileges of the management process.
CWE-78 Feb 07, 2026
CVE-2026-2084 7.2 HIGH EPSS 0.00
D-Link DIR-823X - Command Injection
A weakness has been identified in D-Link DIR-823X 250416. This impacts an unknown function of the file /goform/set_language. Executing a manipulation of the argument langSelection can lead to os command injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
CWE-77 Feb 07, 2026