CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
1,626 results Clear all
CVE-2025-59096 EPSS 0.00
U9ExosAdmin.exe - Info Disclosure
The default password for the extended admin user mode in the application U9ExosAdmin.exe ("Kaba 9300 Administration") is hard-coded in multiple locations as well as documented in the locally stored user documentation.
CWE-798 Jan 26, 2026
CVE-2025-59095 EPSS 0.00
exos 9300 - Info Disclosure
The program libraries (DLL) and binaries used by exos 9300 contain multiple hard-coded secrets. One notable example is the function "EncryptAndDecrypt" in the library Kaba.EXOS.common.dll. This algorithm uses a simple XOR encryption technique combined with a cryptographic key (cryptoKey) to transform each character of the input string. However, it's important to note that this implementation does not provide strong encryption and should not be considered secure for sensitive data. It's more of a custom encryption approach rather than a common algorithm used in cryptographic applications. The key itself is static and based on the founder's name of the company. The functionality is for example used to encrypt the user PINs before storing them in the MSSQL database.
CWE-798 Jan 26, 2026
CVE-2025-59092 EPSS 0.00
exos 9300 - Info Disclosure
An RPC service, which is part of exos 9300, is reachable on port 4000, run by the process FSMobilePhoneInterface.exe. This service is used for interprocess communication between services and the Kaba exos 9300 GUI, containing status information about the Access Managers. Interacting with the service does not require any authentication. Therefore, it is possible to send arbitrary status information about door contacts etc. without prior authentication.
CWE-798 Jan 26, 2026
CVE-2025-59091 EPSS 0.00
Kaba exos 9300 - Info Disclosure
Multiple hardcoded credentials have been identified, which are allowed to sign-in to the exos 9300 datapoint server running on port 1004 and 1005. This server is used for relaying status information from and to the Access Managers. This information, among other things, is used to graphically visualize open doors and alerts. However, controlling the Access Managers via this interface is also possible. To send and receive status information, authentication is necessary. The Kaba exos 9300 application contains hard-coded credentials for four different users, which are allowed to login to the datapoint server and receive as well as send information, including commands to open arbitrary doors.
CWE-798 Jan 26, 2026
CVE-2025-58744 7.5 HIGH EPSS 0.00
Milner ImageDirector Capture <7.6.3.25808 - Default Credentials
Use of Default Credentials, Hard-coded Credentials vulnerability in C2SGlobalSettings.dll in Milner ImageDirector Capture on Windows allows decryption of document archive files using credentials decrypted with hard-coded application encryption key. This issue affects ImageDirector Capture: from 7.0.9.0 before 7.6.3.25808.
CWE-1392 Jan 20, 2026
CVE-2026-0622 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Open5gs < 2.7.6 - Hard-coded Credentials
Open 5GS WebUI uses a hard-coded JWT signing key (change-me) whenever the environment variable JWT_SECRET_KEY is unset
CWE-798 Jan 20, 2026
CVE-2025-14115 8.4 HIGH EPSS 0.00
IBM Sterling Connect:Direct for UNIX Container - Info Disclosure
IBM Sterling Connect:Direct for UNIX Container 6.3.0.0 through 6.3.0.6 Interim Fix 016, and 6.4.0.0 through 6.4.0.3 Interim Fix 019 IBM® Sterling Connect:Direct for UNIX contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
CWE-798 Jan 20, 2026
CVE-2026-1221 9.8 CRITICAL EPSS 0.00
PrismX MX100 AP - Info Disclosure
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has a Use of Hard-coded Credentials vulnerability, allowing unauthenticated remote attackers to log in to the database using hardcoded database credentials stored in the firmware.
CWE-798 Jan 20, 2026
CVE-2021-47796 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Denver SHC-150 Smart Wifi Camera - RCE
Denver SHC-150 Smart Wifi Camera contains a hardcoded telnet credential vulnerability that allows unauthenticated attackers to access a Linux shell. Attackers can connect to port 23 using the default credential to execute arbitrary commands on the camera's operating system.
CWE-798 Jan 16, 2026
CVE-2026-22911 5.3 MEDIUM EPSS 0.00
Sick Tdc-x401gl Firmware - Insufficiently Protected Credentials
Firmware update files may expose password hashes for system accounts, which could allow a remote attacker to recover credentials and gain unauthorized access to the device.
CWE-522 Jan 15, 2026
CVE-2020-36911 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Covenant 0.1.3-0.5 - RCE
Covenant 0.1.3 - 0.5 contains a remote code execution vulnerability that allows attackers to craft malicious JWT tokens with administrative privileges. Attackers can generate forged tokens with admin roles and upload custom DLL payloads to execute arbitrary commands on the target system.
CWE-798 Jan 13, 2026
CVE-2025-69426 EPSS 0.00
Ruckus vRIoT IoT Controller <3.0.0.0 - Privilege Escalation
The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) contain hardcoded credentials for an operating system user account within an initialization script. The SSH service is network-accessible without IP-based restrictions. Although the configuration disables SCP and pseudo-TTY allocation, an attacker can authenticate using the hardcoded credentials and establish SSH local port forwarding to access the Docker socket. By mounting the host filesystem via Docker, an attacker can escape the container and execute arbitrary OS commands as root on the underlying vRIoT controller, resulting in complete system compromise.
CWE-798 Jan 09, 2026
CVE-2025-69425 EPSS 0.00
Ruckus vRIoT IoT Controller <3.0.0.0 - Command Injection
The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a command execution service on TCP port 2004 running with root privileges. Authentication to this service relies on a hardcoded Time-based One-Time Password (TOTP) secret and an embedded static token. An attacker who extracts these credentials from the appliance or a compromised device can generate valid authentication tokens and execute arbitrary OS commands with root privileges, resulting in complete system compromise.
CWE-306 Jan 09, 2026
CVE-2025-7072 EPSS 0.00
KAON CG3000TC/CG3000T - Command Injection
The firmware in KAON CG3000TC and CG3000T routers contains hard-coded credentials in clear text (shared across all routers of this model) that an unauthenticated remote attacker could use to execute commands with root privileges. This vulnerability has been fixed in firmware version: 1.00.67 for CG3000TC and 1.00.27 for CG3000T.
CWE-798 Jan 09, 2026
CVE-2019-25291 7.5 HIGH 1 PoC Analysis EPSS 0.00
INIM Electronics Smartliving SmartLAN/G/SI <=6.x - Info Disclosure
INIM Electronics Smartliving SmartLAN/G/SI <=6.x contains hard-coded credentials in its Linux distribution image that cannot be changed through normal device operations. Attackers can exploit these persistent credentials to log in and gain unauthorized system access across multiple SmartLiving device models.
CWE-798 Jan 08, 2026
CVE-2017-20214 7.5 HIGH 1 PoC Analysis EPSS 0.00
FLIR Thermal Camera - Auth Bypass
FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains hard-coded SSH credentials that cannot be changed through normal camera operations. Attackers can leverage these persistent, unmodifiable credentials to gain unauthorized remote access to the thermal camera system.
CWE-798 Jan 08, 2026
CVE-2020-36915 7.5 HIGH 1 PoC Analysis EPSS 0.00
Adtec Digital SignEdje <2.08.28 - Unauthenticated RCE
Adtec Digital SignEdje Digital Signage Player v2.08.28 contains multiple hardcoded default credentials that allow unauthenticated remote access to web, telnet, and SSH interfaces. Attackers can exploit these credentials to gain root-level access and execute system commands across multiple Adtec Digital product versions.
CWE-1392 Jan 06, 2026
CVE-2021-47744 7.5 HIGH 1 PoC Analysis EPSS 0.00
Cypress Solutions CTM-200/CTM-ONE <1.3.6 - Code Injection
Cypress Solutions CTM-200/CTM-ONE 1.3.6 contains hard-coded credentials vulnerability in Linux distribution that exposes root access. Attackers can exploit the static 'Chameleon' password to gain remote root access via Telnet or SSH on affected devices.
CWE-798 Dec 31, 2025
CVE-2025-15371 7.8 HIGH 1 Writeup EPSS 0.00
Tenda - Unknown Vuln
A vulnerability has been found in Tenda i24, 4G03 Pro, 4G05, 4G08, G0-8G-PoE, Nova MW5G and TEG5328F up to 65.10.15.6. Affected is an unknown function of the component Shadow File. Such manipulation with the input Fireitup leads to hard-coded credentials. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
CWE-259 Dec 31, 2025
CVE-2023-53983 9.8 CRITICAL EPSS 0.01
Anevia Flamingo XL/XS <3.6.20 - Privilege Escalation
Anevia Flamingo XL/XS 3.6.20 contains a critical vulnerability with weak default administrative credentials that can be easily guessed. Attackers can leverage these hard-coded credentials to gain full remote system control without complex authentication mechanisms.
CWE-798 Dec 30, 2025