CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
1,626 results Clear all
CVE-2025-9731 2.5 LOW EPSS 0.00
Tenda AC9 15.03.05.19 - Hard-Coded Credentials
A vulnerability was determined in Tenda AC9 15.03.05.19. The impacted element is an unknown function of the file /etc_ro/shadow of the component Administrative Interface. This manipulation causes hard-coded credentials. It is possible to launch the attack on the local host. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been publicly disclosed and may be utilized.
CWE-259 Aug 31, 2025
CVE-2025-9725 2.5 LOW 1 Writeup EPSS 0.00
Cudy LT500E <2.3.12 - Use of Hard-Coded Password
A vulnerability was identified in Cudy LT500E up to 2.3.12. Affected is an unknown function of the file /squashfs-root/etc/shadow of the component Web Interface. The manipulation leads to use of hard-coded password. The attack must be carried out locally. The attack's complexity is rated as high. The exploitability is told to be difficult. The exploit is publicly available and might be used. Upgrading to version 2.3.13 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains: "[T]he firmware does store a default password of 'admin'. This password has been deprecated since LT500E firmware version 2.3.13 and is no longer used. The LT500E does not have an administrator password set by default; a new password (at least 8 characters ) must be manually created upon first login the web management page."
CWE-259 Aug 31, 2025
CVE-2025-8857 9.8 CRITICAL EPSS 0.00
Clinic Image System - Info Disclosure
Clinic Image System developed by Changing contains hard-coded Credentials, allowing unauthenticated remote attackers to log into the system using administrator credentials embedded in the source code.
CWE-798 Aug 29, 2025
CVE-2025-9380 7.8 HIGH EPSS 0.00
FNKvision Y215 CCTV Camera - Info Disclosure
A vulnerability was identified in FNKvision Y215 CCTV Camera 10.194.120.40. Affected by this issue is some unknown functionality of the file /etc/passwd of the component Firmware. Such manipulation leads to hard-coded credentials. Local access is required to approach this attack. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-259 Aug 24, 2025
CVE-2025-51606 8.8 HIGH 1 Writeup EPSS 0.00
Cn.hippo4j Hippo4j-core - Hard-coded Credentials
hippo4j 1.0.0 to 1.5.0, uses a hard-coded secret key in its JWT (JSON Web Token) creation. This allows attackers with access to the source code or compiled binary to forge valid access tokens and impersonate any user, including privileged ones such as "admin". The vulnerability poses a critical security risk in systems where authentication and authorization rely on the integrity of JWTs.
CWE-798 Aug 21, 2025
CVE-2025-9310 5.3 MEDIUM 1 Writeup EPSS 0.00
yeqifu carRental <3fabb7eae93d209426638863980301d6f99866b3 - Info D...
A vulnerability was determined in yeqifu carRental up to 3fabb7eae93d209426638863980301d6f99866b3. Affected by this vulnerability is an unknown functionality of the file /carRental_war/druid/login.html of the component Druid. Executing manipulation can lead to hard-coded credentials. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.
CWE-259 Aug 21, 2025
CVE-2025-9309 2.5 LOW 1 Writeup EPSS 0.00
Tenda AC10 16.03.10.13 - Info Disclosure
A vulnerability was found in Tenda AC10 16.03.10.13. Affected is an unknown function of the file /etc_ro/shadow of the component MD5 Hash Handler. Performing manipulation results in hard-coded credentials. The attack needs to be approached locally. A high degree of complexity is needed for the attack. The exploitability is told to be difficult. The exploit has been made public and could be used.
CWE-259 Aug 21, 2025
CVE-2025-33100 6.2 MEDIUM EPSS 0.00
IBM Concert Software <1.2 - Info Disclosure
IBM Concert Software 1.0.0 through 1.1.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
CWE-798 Aug 18, 2025
CVE-2025-7342 7.5 HIGH EPSS 0.00
Kubernetes Image Builder - Privilege Escalation
A security issue was discovered in the Kubernetes Image Builder where default credentials are enabled during the Windows image build process when using the Nutanix or VMware OVA providers. These credentials, which allow root access, are disabled at the conclusion of the build. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project and the vulnerability was exploited during the build process, which requires an attacker to access the build VM and modify the image while the build is in progress.
CWE-798 Aug 17, 2025
CVE-2025-9091 2.5 LOW 1 Writeup EPSS 0.00
Tenda AC20 16.03.08.12 - Info Disclosure
A security flaw has been discovered in Tenda AC20 16.03.08.12. Affected by this vulnerability is an unknown functionality of the file /etc_ro/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
CWE-259 Aug 17, 2025
CVE-2025-8974 3.7 LOW EPSS 0.00
linlinjava litemall <1.8.0 - Info Disclosure
A vulnerability was determined in linlinjava litemall up to 1.8.0. Affected by this issue is some unknown functionality of the file litemall-wx-api/src/main/java/org/linlinjava/litemall/wx/util/JwtHelper.java of the component JSON Web Token Handler. The manipulation of the argument SECRET with the input X-Litemall-Token leads to hard-coded credentials. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
CWE-259 Aug 14, 2025
CVE-2025-43982 9.8 CRITICAL 1 Writeup EPSS 0.00
Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 - Info D...
Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices enable the SSH service by default. There is a hidden hard-coded root account that cannot be disabled in the GUI.
CWE-798 Aug 13, 2025
CVE-2025-55279 EPSS 0.00
ZKTeco WL20 - Info Disclosure
This vulnerability exists in ZKTeco WL20 due to hard-coded private key stored in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to retrieve private key stored in the firmware of the targeted device. Successful exploitation of this vulnerability could allow the attacker to perform unauthorized decryption of sensitive data and Man-in-the-Middle (MitM) attacks on the targeted device.
CWE-798 Aug 13, 2025
CVE-2025-54465 EPSS 0.00
ZKTeco WL20 - Info Disclosure
This vulnerability exists in ZKTeco WL20 due to hard-coded MQTT credentials and endpoints stored in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to retrieve the hard-coded MQTT credentials and endpoints from the targeted device. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the MQTT broker and manipulate the communications of the targeted device.
CWE-798 Aug 13, 2025
CVE-2025-3831 8.1 HIGH EPSS 0.00
Checkpoint Harmony Sase - Information Disclosure
Log files uploaded during troubleshooting by the Harmony SASE agent may have been accessible to unauthorized parties.
CWE-200 Aug 12, 2025
CVE-2025-26398 5.6 MEDIUM EPSS 0.00
Solarwinds Database Performance Analyzer - Hard-coded Credentials
SolarWinds Database Performance Analyzer was found to contain a hard-coded cryptographic key. If exploited, this vulnerability could lead to a machine-in-the-middle (MITM) attack against users. This vulnerability requires additional software not installed by default, local access to the server and administrator level privileges on the host.
CWE-798 Aug 12, 2025
CVE-2025-8730 9.8 CRITICAL 2 PoCs Analysis EPSS 0.27
Belkin F9K1009/F9K1010 <2.00.04/2.09 - Hard-coded Credentials
A vulnerability was found in Belkin F9K1009 and F9K1010 2.00.04/2.00.09 and classified as critical. Affected by this issue is some unknown functionality of the component Web Interface. The manipulation leads to hard-coded credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-259 Aug 08, 2025
CVE-2025-7768 EPSS 0.00
Tigo Energy CCA - Privilege Escalation
Tigo Energy's Cloud Connect Advanced (CCA) device contains hard-coded credentials that allow unauthorized users to gain administrative access. This vulnerability enables attackers to escalate privileges and take full control of the device, potentially modifying system settings, disrupting solar energy production, and interfering with safety mechanisms.
CWE-798 Aug 06, 2025
CVE-2025-54872 1 Writeup EPSS 0.00
onion-site-template <3196bd89 - Info Disclosure
onion-site-template is a complete, scalable tor hidden service self-hosting sample. Versions which include commit 3196bd89 contain a baked-in tor image if the secrets were copied from an existing onion domain. A website could be compromised if a user shared the baked-in image, or if someone were able to acquire access to the user's device outside of a containerized environment. This is fixed by commit bc9ba0fd.
CWE-798 Aug 06, 2025
CVE-2025-8530 5.3 MEDIUM EPSS 0.00
Eladmin < 2.7 - Hard-coded Credentials
A vulnerability, which was classified as problematic, has been found in elunez eladmin up to 2.7. Affected by this issue is some unknown functionality of the file eladmin-system\src\main\resources\config\application-prod.yml of the component Druid. The manipulation of the argument login-username/login-password leads to use of default credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CWE-1392 Aug 04, 2025