Latest Vulnerabilities with Public Exploits
Updated 39m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,708 results
Clear all
CVE-2025-34033
8.8
HIGH
EXPLOITED
SSVC PoC
1 PoC
Analysis
EPSS 0.02
Blue Angel Software Suite - Command Injection
An OS command injection vulnerability exists in the Blue Angel Software Suite running on embedded Linux devices via the ping_addr parameter in the webctrl.cgi script. The application fails to properly sanitize input before passing it to the system-level ping command. An authenticated attacker can inject arbitrary commands by appending shell metacharacters to the ping_addr parameter in a crafted GET request to /cgi-bin/webctrl.cgi?action=pingtest_update. The command's output is reflected in the application's web interface, enabling attackers to view results directly. Default and backdoor credentials can be used to access the interface and exploit the issue. Successful exploitation results in arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-26 UTC.
CWE-78
Jun 24, 2025
CVE-2025-34035
9.8
CRITICAL
EXPLOITED
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.10
EnGenius EnShare Cloud Service <1.4.11 - Command Injection
An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise. Exploitation evidence was observed by the Shadowserver Foundation on 2024-12-05 UTC.
CWE-78
Jun 24, 2025
CVE-2025-34048
HIGH
EXPLOITED
SSVC PoC
1 PoC
Analysis
EPSS 0.01
D-Link DSL-2730U/2750U/2750E - Path Traversal
A path traversal vulnerability exists in the web management interface of D-Link DSL-2730U, DSL-2750U, and DSL-2750E ADSL routers with firmware versions IN_1.02, SEA_1.04, and SEA_1.07. The vulnerability is due to insufficient input validation on the getpage parameter within the /cgi-bin/webproc CGI script. This flaw allows an unauthenticated remote attacker to perform path traversal attacks by supplying crafted requests, enabling arbitrary file read on the affected device. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-04 UTC.
CWE-22
Jun 26, 2025
CVE-2025-34066
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
AVTECH - Improper Certificate Validation
An improper certificate validation vulnerability exists in AVTECH IP cameras, DVRs, and NVRs due to the use of wget with --no-check-certificate in scripts like SyncCloudAccount.sh and SyncPermit.sh. This exposes HTTPS communications to man-in-the-middle (MITM) attacks.
CWE-295
Jul 01, 2025
CVE-2025-34056
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.02
AVTECH IP camera - Command Injection
An OS command injection vulnerability exists in AVTECH IP camera, DVR, and NVR devices via the PwdGrp.cgi endpoint, which handles user and group management operations. Authenticated users can supply input through the pwd or grp parameters, which are directly embedded into system commands without proper sanitation. This allows for the execution of arbitrary shell commands with root privileges.
CWE-20
Jul 01, 2025
CVE-2025-34055
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.02
AVTECH DVR-NVR-IP Camera - Command Injection
An OS command injection vulnerability exists in AVTECH DVR, NVR, and IP camera devices within the adcommand.cgi endpoint, which interfaces with the ActionD daemon. Authenticated users can invoke the DoShellCmd operation, passing arbitrary input via the strCmd parameter. This input is executed directly by the system shell without sanitation allowing attackers to execute commands as the root user.
CWE-20
Jul 01, 2025
CVE-2025-34054
CRITICAL
EXPLOITED
SSVC PoC
1 PoC
Analysis
EPSS 0.02
AVTECH DVR - Command Injection
An unauthenticated command injection vulnerability exists in AVTECH DVR devices via Search.cgi?action=cgi_query. The use of wget without input sanitization allows attackers to inject shell commands through the username or queryb64str parameters, executing commands as root. Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-04 UTC.
CWE-78
Jul 01, 2025
CVE-2025-34053
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
AVTECH - Auth Bypass
An authentication bypass vulnerability exists in AVTECH IP camera, DVR, and NVR devices’ streamd web server. The strstr() function is used to identify ".cab" requests, allowing any URL containing ".cab" to bypass authentication and access protected endpoints.
CWE-290
Jul 01, 2025
CVE-2025-34051
MEDIUM
EXPLOITED
SSVC PoC
1 PoC
Analysis
EPSS 0.00
AVTECH DVR - SSRF
A server-side request forgery vulnerability exists in multiple firmware versions of AVTECH DVR devices that exposes the /cgi-bin/nobody/Search.cgi?action=cgi_query endpoint without authentication. An attacker can manipulate the ip, port, and queryb64str parameters to make arbitrary HTTP requests from the DVR to internal or external systems, potentially exposing sensitive data or interacting with internal services.
CWE-200
Jul 01, 2025
CVE-2025-34050
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
AVTECH - CSRF
A cross-site request forgery (CSRF) vulnerability exists in the web interface of AVTECH IP camera, DVR, and NVR devices. An attacker can craft malicious requests that, when executed in the context of an authenticated user’s browser session, allow unauthorized changes to the device configuration without user interaction.
CWE-352
Jul 01, 2025
CVE-2025-46001
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Simogeo Filemanager < 1.1 - Unrestricted File Upload
An arbitrary file upload vulnerability in the is_allowed_file_type() function of Filemanager v2.3.0 allows attackers to execute arbitrary code via uploading a crafted PHP file.
CWE-434
Jul 18, 2025
CVE-2025-46002
6.5
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.01
Simogeo Filemanager < 2.0.0 - Path Traversal
An issue in Filemanager v2.5.0 and below allows attackers to execute a directory traversal via sending a crafted HTTP request to the filemanager.php endpoint.
CWE-23
Jul 18, 2025
CVE-2024-51324
3.8
LOW
EXPLOITED
SSVC PoC
RANSOMWARE
2 PoCs
Analysis
EPSS 0.00
Baidu Antivirus <5.2.3.116083 - RCE
An issue in the BdApiUtil driver of Baidu Antivirus v5.2.3.116083 allows attackers to terminate arbitrary process via executing a BYOVD (Bring Your Own Vulnerable Driver) attack.
CWE-269
Feb 11, 2025
CVE-2024-51482
9.9
CRITICAL
SSVC PoC
9 PoCs
Analysis
NUCLEI
EPSS 0.48
ZoneMinder <1.37.64 - SQL Injection
ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder v1.37.* <= 1.37.64 is vulnerable to boolean-based SQL Injection in function of web/ajax/event.php. This is fixed in 1.37.65.
CWE-89
Oct 31, 2024
CVE-2024-3273
7.3
HIGH
KEV
SSVC ACTIVE
12 PoCs
Analysis
NUCLEI
EPSS 0.94
Dlink Dns-320l Firmware - Command Injection
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
CWE-77
Apr 04, 2024
CVE-2024-21413
9.8
CRITICAL
KEV
SSVC ACTIVE
35 PoCs
Analysis
EPSS 0.93
Microsoft 365 Apps - Improper Input Validation
Microsoft Outlook Remote Code Execution Vulnerability
CWE-20
Feb 13, 2024
CVE-2024-8353
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
GiveWP Unauthenticated Donation Process Exploit
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.1 via deserialization of untrusted input via several parameters like 'give_title' and 'card_address'. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files and achieve remote code execution. This is essentially the same vulnerability as CVE-2024-5932, however, it was discovered the the presence of stripslashes_deep on user_info allows the is_serialized check to be bypassed. This issue was mostly patched in 3.16.1, but further hardening was added in 3.16.2.
CWE-502
Sep 28, 2024
CVE-2024-38063
9.8
CRITICAL
SSVC PoC
35 PoCs
Analysis
EPSS 0.90
Windows TCP/IP < - RCE
Windows TCP/IP Remote Code Execution Vulnerability
CWE-191
Aug 13, 2024
CVE-2024-3094
10.0
CRITICAL
84 PoCs
Analysis
NUCLEI
EPSS 0.84
xz <5.6.0 - Code Injection
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0.
Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
CWE-506
Mar 29, 2024
CVE-2024-48457
7.5
HIGH
1 PoC
Analysis
EPSS 0.62
Netis - Info Disclosure
An issue in Netis Wifi6 Router NX10 2.0.1.3643 and 2.0.1.3582 and Netis Wifi 11AC Router NC65 3.0.0.3749 and Netis Wifi 11AC Router NC63 3.0.0.3327 and 3.0.0.3503 and Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 and 3.0.0.3329 and Netis Wifi Router MW5360 1.0.1.3442 and 1.0.1.3031 allows a remote attacker to obtain sensitive information via the endpoint /cgi-bin/skk_set.cgi and binary /bin/scripts/start_wifi.sh
CWE-125
Jan 06, 2025