CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
1,626 results Clear all
CVE-2025-57602 9.8 CRITICAL 1 Writeup EPSS 0.00
AiKaan IoT - RCE
Insufficient hardening of the proxyuser account in the AiKaan IoT management platform, combined with the use of a shared, hardcoded SSH private key, allows remote attackers to authenticate to the cloud controller, gain interactive shell access, and pivot into other connected IoT devices. This can lead to remote code execution, information disclosure, and privilege escalation across customer environments.
CWE-798 Sep 22, 2025
CVE-2025-57601 9.8 CRITICAL 1 Writeup EPSS 0.00
AiKaan Cloud Controller - Open Redirect
AiKaan Cloud Controller uses a single hardcoded SSH private key and the username `proxyuser` for remote terminal access to all managed IoT/edge devices. When an administrator initiates "Open Remote Terminal" from the AiKaan dashboard, the controller sends this same static private key to the target device. The device then uses it to establish a reverse SSH tunnel to a remote access server, enabling browser-based SSH access for the administrator. Because the same `proxyuser` account and SSH key are reused across all customer environments: - An attacker who obtains the key (e.g., by intercepting it in transit, extracting it from the remote access server, or from a compromised admin account) can impersonate any managed device. - They can establish unauthorized reverse SSH tunnels and interact with devices without the owner's consent. This is a design flaw in the authentication model: compromise of a single key compromises the trust boundary between the controller and devices.
CWE-798 Sep 22, 2025
CVE-2025-52159 8.8 HIGH 1 Writeup EPSS 0.00
Yandaozi Ppress - Hard-coded Credentials
Hardcoded credentials in default configuration of PPress 0.0.9.
CWE-798 Sep 19, 2025
CVE-2025-34198 9.8 CRITICAL EPSS 0.00
Vasion Virtual Appliance Application - Hard-coded Credentials
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.951 and Application prior to 20.0.2368 (VA and SaaS deployments) contain shared, hardcoded SSH host private keys in the appliance image. The same private host keys (RSA, ECDSA, and ED25519) are present across installations, rather than being uniquely generated per appliance. An attacker who obtains these private keys (for example from one compromised appliance image or another installation) can impersonate the appliance, decrypt or intercept SSH connections to appliances that use the same keys, and perform man-in-the-middle or impersonation attacks against administrative SSH sessions. This vulnerability has been identified by the vendor as: V-2024-011 — Hardcoded SSH Host Key.
CWE-798 Sep 19, 2025
CVE-2025-34197 7.8 HIGH EPSS 0.00
Vasion Virtual Appliance Application - Hard-coded Credentials
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.951, Application prior to 20.0.2368 (VA and SaaS deployments) contain an undocumented local user account named ubuntu with a preset password and a sudoers entry granting that account passwordless root privileges (ubuntu ALL=(ALL) NOPASSWD: ALL). Anyone who knows the hardcoded password can obtain root privileges via local console or equivalent administrative access, enabling local privilege escalation. This vulnerability has been identified by the vendor as: V-2024-010 — Hardcoded Linux Password. NOTE: The patch for this vulnerability is reported to be incomplete: /etc/shadow was remediated but /etc/sudoers remains vulnerable.
CWE-798 Sep 19, 2025
CVE-2024-48842 7.0 HIGH EPSS 0.00
ABB FLXEON <9.3.5 - Info Disclosure
Use of Hard-coded Credentials vulnerability in ABB FLXEON.This issue affects FLXEON: through 9.3.5 and newer versions
CWE-798 Sep 17, 2025
CVE-2025-57579 8.0 HIGH 1 Writeup EPSS 0.00
Totolink X2000r Firmware - Hard-coded Credentials
An issue in TOTOLINK Wi-Fi 6 Router Series Device X2000R-Gh-V2.0.0 allows a remote attacker to execute arbitrary code via the default password
CWE-798 Sep 12, 2025
CVE-2025-57578 8.0 HIGH 1 Writeup EPSS 0.00
H3C Magic M <M2V100R006 - RCE
An issue in H3C Magic M Device M2V100R006 allows a remote attacker to execute arbitrary code via the default password
CWE-798 Sep 12, 2025
CVE-2025-57577 8.0 HIGH 1 Writeup EPSS 0.00
H3C Device R365V300R004 - RCE
An issue in H3C Device R365V300R004 allows a remote attacker to execute arbitrary code via the default password. NOTE: the Supplier's position is that their "product lines enforce or clearly prompt users to change any initial credentials upon first use. At most, this would be a case of misconfiguration if an administrator deliberately ignored the prompts, which is outside the scope of CVE definitions."
CWE-798 Sep 12, 2025
CVE-2025-8570 9.8 CRITICAL 3 PoCs Analysis EPSS 0.00
BeyondCart Connector <2.1.0 - Privilege Escalation
The BeyondCart Connector plugin for WordPress is vulnerable to Privilege Escalation due to improper JWT secret management and authorization within the determine_current_user filter in versions 1.4.2 through 2.1.0. This makes it possible for unauthenticated attackers to craft valid tokens and assume any user’s identity.
CWE-798 Sep 11, 2025
CVE-2025-56466 7.5 HIGH 1 Writeup EPSS 0.00
Masterlifecrm Dietly - Hard-coded Credentials
Hardcoded credentials in Dietly v1.25.0 for android allows attackers to gain sensitive information.
CWE-798 Sep 10, 2025
CVE-2025-55047 8.4 HIGH EPSS 0.00
Product - Info Disclosure
CWE-798 Use of Hard-coded Credentials
CWE-798 Sep 09, 2025
CVE-2025-35452 9.8 CRITICAL 1 Writeup EPSS 0.00
PTZOptics - Info Disclosure
PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use default, shared credentials for the administrative web interface.
CWE-1392 Sep 05, 2025
CVE-2025-35451 9.8 CRITICAL 1 Writeup EPSS 0.00
Ptzoptics Pt12x-sdi-xx-g2 Firmware < 6.3.34 - Hard-coded Credentials
PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use hard-coded, default administrative credentials. The passwords can readily be cracked. Many cameras have SSH or telnet listening on all interfaces. The passwords cannot be changed by the user, nor can the SSH or telnet service be disabled by the user.
CWE-798 Sep 05, 2025
CVE-2025-30200 6.3 MEDIUM 1 Writeup EPSS 0.00
ECOVACS - Info Disclosure
ECOVACS robot vacuums and base stations communicate via an insecure Wi-Fi network with a deterministic AES encryption key, which can be easily derived.
CWE-321 Sep 05, 2025
CVE-2025-30198 6.3 MEDIUM 1 Writeup EPSS 0.00
ECOVACS - Info Disclosure
ECOVACS robot vacuums and base stations communicate via an insecure Wi-Fi network with a deterministic WPA2-PSK, which can be easily derived.
CWE-321 Sep 05, 2025
CVE-2025-55739 1 Writeup EPSS 0.00
FreePBX <15.0.13, 16.0.2-16.0.14, 17.0.1-17.0.2 - Auth Bypass
api is a module for FreePBX@, which is an open source GUI that controls and manages Asterisk© (PBX). In versions lower than 15.0.13, 16.0.2 through 16.0.14, 17.0.1 and 17.0.2, there is an identical OAuth private key used across multiple systems that installed the same FreePBX RPM or DEB package. An attacker with access to the shared OAuth private key could forge JWT tokens, bypass authentication, and potentially gain full access to both REST and GraphQL APIs. Systems with the "api" module enabled, configured and previously activated by an administrator for remote inbound connections may be affected. This issue is fixed in versions 15.0.13, 16.0.15 and 17.0.3.
CWE-522 Sep 05, 2025
CVE-2025-9696 EPSS 0.00
SunPower PVS6 - RCE
The SunPower PVS6's BluetoothLE interface is vulnerable due to its use of hardcoded encryption parameters and publicly accessible protocol details. An attacker within Bluetooth range could exploit this vulnerability to gain full access to the device's servicing interface. This access allows the attacker to perform actions such as firmware replacement, disabling power production, modifying grid settings, creating SSH tunnels, altering firewall settings, and manipulating connected devices.
CWE-798 Sep 02, 2025
CVE-2025-9806 1.9 LOW EPSS 0.00
Tenda F1202 <1.2.0.20 - Info Disclosure
A vulnerability was determined in Tenda F1202 1.2.0.9/1.2.0.14/1.2.0.20. Impacted is an unknown function of the file /etc_ro/shadow of the component Administrative Interface. This manipulation with the input Fireitup causes hard-coded credentials. The attack can only be executed locally. A high degree of complexity is needed for the attack. The exploitability is considered difficult. The exploit has been publicly disclosed and may be utilized.
CWE-259 Sep 02, 2025
CVE-2025-9778 1.9 LOW EPSS 0.00
Tenda W12 <3.0.0.6 - Hard-Coded Credentials
A security vulnerability has been detected in Tenda W12 up to 3.0.0.6(3948). Affected is an unknown function of the file /etc_ro/shadow of the component Administrative Interface. The manipulation leads to hard-coded credentials. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed publicly and may be used.
CWE-259 Sep 01, 2025