CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
1,626 results Clear all
CVE-2025-53842 4.5 MEDIUM EPSS 0.00
ZWX-2000CSW2-HN <0.3.19 - Info Disclosure
Use of hard-coded credentials issue exists in ZWX-2000CSW2-HN prior to 0.3.19 and ZWX-2000CS2-HN firmware all versions. If this vulnerability is exploited, an attacker may tamper with the settings of the device by obtaining the credentials. This vulnerability is caused by an insufficient fix for CVE-2024-39838.
CWE-798 Jul 16, 2025
CVE-2025-52376 9.8 CRITICAL EPSS 0.00
Nexxt Solutions NCM-X1800 Mesh Router <UV1.2.7 - Auth Bypass
An authentication bypass vulnerability in the /web/um_open_telnet.cgi endpoint in Nexxt Solutions NCM-X1800 Mesh Router firmware UV1.2.7 and below, allowing an attacker to remotely enable the Telnet service without authentication, bypassing security controls. The Telnet server is then accessible with hard-coded credentials, allowing attackers to gain administrative shell access and execute arbitrary commands on the device.
CWE-287 Jul 15, 2025
CVE-2025-3621 9.6 CRITICAL EPSS 0.00
ActADUR <2.0.2.0 - Command Injection
Vulnerabilities* in ActADUR local server product, developed and maintained by ProTNS, allows Remote Code Inclusion on host systems.  * vulnerabilities: * Improper Neutralization of Special Elements used in a Command ('Command Injection') * Use of Hard-coded Credentials * Improper Authentication * Binding to an Unrestricted IP Address The vulnerability has been rated as critical.This issue affects ActADUR: from v2.0.1.9 before v2.0.2.0., hence updating to version v2.0.2.0. or above is required.
CWE-287 Jul 15, 2025
CVE-2025-52363 6.8 MEDIUM EPSS 0.00
Tenda Cp3 Pro Firmware - Hard-coded Credentials
Tenda CP3 Pro Firmware V22.5.4.93 contains a hardcoded root password hash in the /etc/passwd file and /etc/passwd-. An attacker with access to the firmware image can extract and attempt to crack the root password hash, potentially obtaining administrative access
CWE-798 Jul 14, 2025
CVE-2025-7564 7.8 HIGH 1 Writeup EPSS 0.00
LB-LINK BL-AC3600 1.0.22 - Hard-coded Credentials
A vulnerability, which was classified as critical, has been found in LB-LINK BL-AC3600 1.0.22. Affected by this issue is some unknown functionality of the file /etc/shadow. The manipulation with the input root:blinkadmin leads to hard-coded credentials. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-259 Jul 14, 2025
CVE-2024-38648 5.7 MEDIUM EPSS 0.00
Ivanti DSM <2024.2 - Info Disclosure
A hardcoded secret in Ivanti DSM before 2024.2 allows an authenticated attacker on an adjacent network to decrypt sensitive data including user credentials.
CWE-798 Jul 12, 2025
CVE-2025-7503 1 Writeup EPSS 0.01
OEM IP Camera <AppFHE1_V1.0.6.0 - Command Injection
An OEM IP camera manufactured by Shenzhen Liandian Communication Technology LTD exposes a Telnet service (port 23) with undocumented, default credentials. The Telnet service is enabled by default and is not disclosed or configurable via the device’s web interface or user manual. An attacker with network access can authenticate using default credentials and gain root-level shell access to the device. The affected firmware version is AppFHE1_V1.0.6.0 (Kernel: KerFHE1_PTZ_WIFI_V3.1.1, Hardware: HwFHE1_WF6_PTZ_WIFI_20201218). No official fix or firmware update is available, and the vendor could not be contacted. This vulnerability allows for remote code execution and privilege escalation.
CWE-798 Jul 11, 2025
CVE-2025-7401 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
WordPress Premium Age Verification <3.0.2 - Info Disclosure
The Premium Age Verification / Restriction for WordPress plugin for WordPress is vulnerable to arbitrary file read and write due to the existence of an insufficiently protected remote support functionality in remote_tunnel.php in all versions up to, and including, 3.0.2. This makes it possible for unauthenticated attackers to read from or write to arbitrary files on the affected site's server which may make the exposure of sensitive information or remote code execution possible.
CWE-798 Jul 11, 2025
CVE-2025-5023 7.1 HIGH EPSS 0.00
Mitsubishi Electric Corporation photovoltaic system monitor - Info ...
Use of Hard-coded Credentials vulnerability in Mitsubishi Electric Corporation photovoltaic system monitor “EcoGuideTAB” PV-DR004J all versions and PV-DR004JA all versions allows an attacker within the Wi-Fi communication range between the units of the product (measurement unit and display unit) to disclose information such as generated power and electricity sold back to the grid stored in the product, tamper with or destroy stored or configured information in the product, or cause a Denial-of-Service (DoS) condition on the product, by using hardcoded user ID and password common to the product series obtained by exploiting CVE-2025-5022. The affected products discontinued in 2015, support ended in 2020.
CWE-798 Jul 10, 2025
CVE-2025-49551 8.8 HIGH EPSS 0.00
Adobe Coldfusion - Hard-coded Credentials
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a Use of Hard-coded Credentials vulnerability that could result in privilege escalation. An attacker could leverage this vulnerability to gain unauthorized access to sensitive systems or data. Exploitation of this issue does not require user interaction. The vulnerable component is restricted to internal IP addresses.
CWE-798 Jul 08, 2025
CVE-2025-37103 9.8 CRITICAL EPSS 0.00
HPE Networking Instant On - Auth Bypass
Hard-coded login credentials were found in HPE Networking Instant On Access Points, allowing anyone with knowledge of it to bypass normal device authentication. Successful exploitation could allow a remote attacker to gain administrative access to the system.
CWE-798 Jul 08, 2025
CVE-2025-52492 7.5 HIGH EPSS 0.00
Paxton Paxton10 <4.6 SR6 - Info Disclosure
A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services.
CWE-798 Jul 07, 2025
CVE-2025-7079 3.7 LOW EPSS 0.00
Mao888 Bluebell-plus < 2.3.0 - Hard-coded Credentials
A vulnerability, which was classified as problematic, has been found in mao888 bluebell-plus up to 2.3.0. This issue affects some unknown processing of the file bluebell_backend/pkg/jwt/jwt.go of the component JWT Token Handler. The manipulation of the argument mySecret with the input bluebell-plus leads to use of hard-coded password. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
CWE-259 Jul 06, 2025
CVE-2025-45813 9.8 CRITICAL 1 Writeup EPSS 0.00
Enensys Ipguardv2 Firmware - Hard-coded Credentials
ENENSYS IPGuard v2 2.10.0 was discovered to contain hardcoded credentials.
CWE-798 Jul 02, 2025
CVE-2025-20309 10.0 CRITICAL EPSS 0.00
Cisco Unified CM - Auth Bypass
A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted. This vulnerability is due to the presence of static user credentials for the root account that are reserved for use during development. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.
CWE-798 Jul 02, 2025
CVE-2025-4378 10.0 CRITICAL EPSS 0.00
Ataturk University ATA-AOF Mobile App <20.06.2025 - Auth Bypass
Cleartext Transmission of Sensitive Information, Use of Hard-coded Credentials vulnerability in Ataturk University ATA-AOF Mobile Application allows Authentication Abuse, Authentication Bypass.This issue affects ATA-AOF Mobile Application: before 20.06.2025.
CWE-319 Jun 24, 2025
CVE-2025-34034 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.00
Blue Angel Software Suite - Info Disclosure
A hardcoded credential vulnerability exists in the Blue Angel Software Suite deployed on embedded Linux systems. The application contains multiple known default and hardcoded user accounts that are not disclosed in public documentation. These accounts allow unauthenticated or low-privilege attackers to gain administrative access to the device’s web interface. Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-26 UTC.
CWE-798 Jun 24, 2025
CVE-2025-45784 9.8 CRITICAL EPSS 0.01
Dlink Dph-400se Firmware - Hard-coded Credentials
D-Link DPH-400S/SE VoIP Phone v1.01 contains hardcoded provisioning variables, including PROVIS_USER_PASSWORD, which may expose sensitive user credentials. An attacker with access to the firmware image can extract these credentials using static analysis tools such as strings or xxd, potentially leading to unauthorized access to device functions or user accounts. This vulnerability exists due to insecure storage of sensitive information in the firmware binary.
CWE-798 Jun 18, 2025
CVE-2025-34509 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.23
Sitecore Experience Commerce < 10.4 - Hard-coded Credentials
Sitecore Experience Manager (XM) and Experience Platform (XP) versions 10.1 to 10.1.4 rev. 011974 PRE, all versions of 10.2, 10.3 to 10.3.3 rev. 011967 PRE, and 10.4 to 10.4.1 rev. 011941 PRE contain a hardcoded user account. Unauthenticated and remote attackers can use this account to access administrative API over HTTP.
CWE-798 Jun 17, 2025
CVE-2025-28388 9.8 CRITICAL EPSS 0.00
Openc3 Cosmos - Hard-coded Credentials
OpenC3 COSMOS before v6.0.2 was discovered to contain hardcoded credentials for the Service Account.
CWE-798 Jun 13, 2025