Writeup Exploits

46,662 exploits tracked across all sources.

Sort: Activity Stars
CVE-2026-5851 WRITEUP CRITICAL
Totolink A7100RU CGI cstecgi.cgi setUPnPCfg os command injection
A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable results in os command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.
CVSS 9.8
CVE-2026-5852 WRITEUP CRITICAL
Totolink A7100RU CGI cstecgi.cgi setIptvCfg os command injection
A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument igmpVer causes os command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.
CVSS 9.8
CVE-2026-5853 WRITEUP CRITICAL
Totolink A7100RU CGI cstecgi.cgi setIpv6LanCfg os command injection
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setIpv6LanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument addrPrefixLen leads to os command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
CVSS 9.8
CVE-2026-5854 WRITEUP CRITICAL
Totolink A7100RU CGI cstecgi.cgi setWiFiEasyCfg os command injection
A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument merge results in os command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
CVSS 9.8
CVE-2026-5831 WRITEUP MEDIUM
Agions taskflow-ai terminal_execute handlers.ts os command injection
A security flaw has been discovered in Agions taskflow-ai up to 2.1.8. This impacts an unknown function of the file src/mcp/server/handlers.ts of the component terminal_execute. Performing a manipulation results in os command injection. The attack is possible to be carried out remotely. Upgrading to version 2.1.9 will fix this issue. The patch is named c1550b445b9f24f38c4414e9a545f5f79f23a0fe. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
CVSS 6.3
CVE-2026-5833 WRITEUP MEDIUM
awwaiid mcp-server-taskwarrior index.ts server.setRequestHandler command injection
A security vulnerability has been detected in awwaiid mcp-server-taskwarrior up to 1.0.1. This impacts the function server.setRequestHandler of the file index.ts. Such manipulation of the argument Identifier leads to command injection. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The name of the patch is 1ee3d282debfa0a99afeb41d22c4b2fd5a3148f2. Applying a patch is advised to resolve this issue. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
CVSS 5.3
CVE-2026-5833 WRITEUP MEDIUM
awwaiid mcp-server-taskwarrior index.ts server.setRequestHandler command injection
A security vulnerability has been detected in awwaiid mcp-server-taskwarrior up to 1.0.1. This impacts the function server.setRequestHandler of the file index.ts. Such manipulation of the argument Identifier leads to command injection. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The name of the patch is 1ee3d282debfa0a99afeb41d22c4b2fd5a3148f2. Applying a patch is advised to resolve this issue. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
CVSS 5.3
CVE-2026-5841 WRITEUP HIGH
Tenda i3 HTTP R7WebsSecurityHandler path traversal
A weakness has been identified in Tenda i3 1.0.0.6(2204). The affected element is the function R7WebsSecurityHandler of the component HTTP Handler. Executing a manipulation can lead to path traversal. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.
CVSS 7.3
CVE-2026-5842 WRITEUP HIGH
decolua 9router Administrative API Endpoint api authorization
A security vulnerability has been detected in decolua 9router up to 0.3.47. The impacted element is an unknown function of the file /api of the component Administrative API Endpoint. The manipulation leads to authorization bypass. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 0.3.75 is sufficient to resolve this issue. It is suggested to upgrade the affected component.
CVSS 7.3
CVE-2026-5847 WRITEUP MEDIUM
code-projects Movie Ticketing System SQL Database Backup File moviedb.sql information disclosure
A vulnerability has been found in code-projects Movie Ticketing System 1.0. Impacted is an unknown function of the file /db/moviedb.sql of the component SQL Database Backup File Handler. Such manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS 4.3
CVE-2026-5849 WRITEUP HIGH
Tenda i12 HTTP path traversal
A vulnerability was determined in Tenda i12 1.0.0.11(3862). The impacted element is an unknown function of the component HTTP Handler. Executing a manipulation can lead to path traversal. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
CVSS 7.3
CVE-2022-2462 WRITEUP MEDIUM
Transposh Wordpress Translation < 1.0.8.1 - Information Disclosure
The Transposh WordPress Translation plugin for WordPress is vulnerable to sensitive information disclosure to unauthenticated users in versions up to, and including, 1.0.9.6. This is due to insufficient permissions checking on the 'tp_history' AJAX action and insufficient restriction on the data returned in the response. This makes it possible for unauthenticated users to exfiltrate usernames of individuals who have translated text.
CVSS 5.3
CVE-2025-8608 WRITEUP MEDIUM
Elementor Yandex Maps <1.6.11 - XSS
The Mihdan: Elementor Yandex Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's block attributes in all versions up to, and including, 1.6.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVSS 6.4
CVE-2025-50644 WRITEUP HIGH
D-Link DI-8003 16.07.26A1 - Buffer Overflow
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper validation of user input in the qj.asp endpoint.
CVSS 7.5
CVE-2025-50645 WRITEUP HIGH
D-Link DI-8003 16.07.26A1 - Buffer Overflow
A vulnerability has been discovered in D-Link DI-8003 16.07.26A1, which can lead to a buffer overflow when the s parameter in the pppoe_list_opt.asp endpoint is manipulated. By sending a crafted request with an excessively large value for the s parameter, an attacker can trigger a buffer overflow condition.
CVSS 7.5
CVE-2025-50646 WRITEUP HIGH
D-Link DI-8003 16.07.26A1 - Buffer Overflow
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to insufficient input validation on the name parameter in the /qos_type_asp.asp endpoint.
CVSS 7.5
CVE-2025-50647 WRITEUP HIGH
D-Link DI-8003 16.07.26A1 - Buffer Overflow
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1, specifically in the handling of the wans parameter in the qos.asp endpoint.
CVSS 7.5
CVE-2025-50648 WRITEUP HIGH
D-Link DI-8003 16.07.26A1 - Buffer Overflow
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to inadequate input validation in the /tggl.asp endpoint.
CVSS 7.5
CVE-2025-50649 WRITEUP HIGH
D-Link DI-8003 16.07.26A1 - Buffer Overflow
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper input validation in the vlan_name parameter in the /shut_set.asp endpoint.
CVSS 7.5
CVE-2025-50650 WRITEUP HIGH
D-Link DI-8003 16.07.26A1 - Buffer Overflow
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to inadequate validation of input size in the routes_static parameter in the /router.asp endpoint.
CVSS 7.5
CVE-2025-50652 WRITEUP HIGH
D-Link DI-8003 16.07.26A1 - Path Traversal
An issue in D-Link DI-8003 16.07.26A1 related to improper handling of the id parameter in the /saveparm_usb.asp endpoint.
CVSS 7.5
CVE-2025-50653 WRITEUP HIGH
D-Link DI-8003 16.07.26A1 - Buffer Overflow
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name and mem parameters in the /time_group.asp endpoint.
CVSS 7.5
CVE-2025-50654 WRITEUP HIGH
D-Link DI-8003 16.07.26A1 - Buffer Overflow
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper validation of the id parameter in the /thd_member.asp endpoint.
CVSS 7.5
CVE-2025-50655 WRITEUP HIGH
D-Link DI-8003 16.07.26A1 - Buffer Overflow
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name parameter in the /thd_group.asp endpoint.
CVSS 7.5
CVE-2025-50657 WRITEUP HIGH
D-Link DI-8003 16.07.26A1 - Buffer Overflow
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the pid parameter in the /trace.asp endpoint.
CVSS 7.5