Latest Vulnerabilities with Public Exploits
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,663 results
Clear all
CVE-2025-14558
7.2
HIGH
4 PoCs
Analysis
EPSS 0.61
FreeBSD rtsold 15.x - Remote Code Execution via DNSSL
The rtsol(8) and rtsold(8) programs do not validate the domain search list options provided in router advertisement messages; the option body is passed to resolvconf(8) unmodified.
resolvconf(8) is a shell script which does not validate its input. A lack of quoting meant that shell commands pass as input to resolvconf(8) may be executed.
CWE-20
Mar 09, 2026
CVE-2025-37164
10.0
CRITICAL
KEV
5 PoCs
Analysis
NUCLEI
EPSS 0.84
HPE OneView unauthenticated RCE
A remote code execution issue exists in HPE OneView.
CWE-94
Dec 16, 2025
CVE-2025-5946
7.2
HIGH
1 PoC
Analysis
EPSS 0.32
Centreon authenticated command injection leading to RCE via broker engine
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Centreon Infra Monitoring (Poller reload setup in the configuration modules) allows OS Command Injection.
On the poller parameters page, a user with high privilege is able to concatenate custom instructions into the poller reload command.
This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.
CWE-78
Oct 14, 2025
CVE-2025-34152
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.16
Shenzhen Aitemi M300 Wi-Fi Repeater - Command Injection
An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.
CWE-78
Aug 07, 2025
CVE-2025-2611
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.73
ICTBroadcast - Command Injection
The ICTBroadcast application unsafely passes session cookie data to shell processing, allowing an attacker to inject shell commands into a session cookie that get executed on the server. This results in unauthenticated remote code execution in the session handling.
Versions 7.4 and below are known to be vulnerable.
CWE-78
Aug 05, 2025
CVE-2025-34125
CRITICAL
2 PoCs
Analysis
EPSS 0.49
D-Link DSP-W110A1 <1.05B01 - Command Injection
An unauthenticated command injection vulnerability exists in the cookie handling process of the lighttpd web server on D-Link DSP-W110A1 firmware version 1.05B01. This occurs when specially crafted cookie values are processed, allowing remote attackers to execute arbitrary commands on the underlying Linux operating system. Successful exploitation enables full system compromise.
CWE-78
Jul 16, 2025
CVE-2025-34116
HIGH
2 PoCs
Analysis
EPSS 0.61
IPFire <2.19 - Authenticated RCE
A remote command execution vulnerability exists in IPFire before version 2.19 Core Update 101 via the 'proxy.cgi' CGI interface. An authenticated attacker can inject arbitrary shell commands through crafted values in the NCSA user creation form fields, leading to command execution with web server privileges.
CWE-20
Jul 15, 2025
CVE-2025-34115
HIGH
2 PoCs
Analysis
EPSS 0.53
OP5 Monitor <7.1.9 - Command Injection
An authenticated command injection vulnerability exists in OP5 Monitor through version 7.1.9 via the 'cmd_str' parameter in the command_test.php endpoint. A user with access to the web interface can exploit the 'Test this command' feature to execute arbitrary shell commands as the unprivileged web application user. The vulnerability resides in the configuration section of the application and requires valid login credentials with access to the command testing functionality. This issue is fixed in version 7.2.0.
CWE-20
Jul 15, 2025
CVE-2025-34113
HIGH
2 PoCs
Analysis
EPSS 0.44
Tiki Wiki CMS <14.1-6.14 - Command Injection
An authenticated command injection vulnerability exists in Tiki Wiki CMS versions ≤14.1, ≤12.4 LTS, ≤9.10 LTS, and ≤6.14 via the `viewmode` GET parameter in `tiki-calendar.php`. When the calendar module is enabled and an authenticated user has permission to access it, an attacker can inject and execute arbitrary PHP code. Successful exploitation leads to remote code execution in the context of the web server user.
CWE-20
Jul 15, 2025
CVE-2025-34103
CRITICAL
2 PoCs
Analysis
EPSS 0.56
WePresent WiPG-1000 <2.2.3.0 - Command Injection
An unauthenticated command injection vulnerability exists in WePresent WiPG-1000 firmware versions prior to 2.2.3.0, due to improper input handling in the undocumented /cgi-bin/rdfs.cgi endpoint. The Client parameter is not sanitized before being passed to a system call, allowing an unauthenticated remote attacker to execute arbitrary commands as the web server user.
CWE-306
Jul 15, 2025
CVE-2025-34102
CRITICAL
2 PoCs
Analysis
EPSS 0.60
CryptoLog PHP - RCE
A remote code execution vulnerability exists in CryptoLog (PHP version, discontinued since 2009) due to a chained exploitation of SQL injection and command injection vulnerabilities. An unauthenticated attacker can gain shell access as the web server user by first exploiting a SQL injection flaw in login.php to bypass authentication, followed by command injection in logshares_ajax.php to execute arbitrary operating system commands.
The login bypass is achieved by submitting crafted SQL via the user POST parameter. Once authenticated, the attacker can abuse the lsid POST parameter in the logshares_ajax.php endpoint to inject and execute a command using $(...) syntax, resulting in code execution under the web context.
This exploitation path does not exist in the ASP.NET version of CryptoLog released since 2009.
CWE-20
Jul 10, 2025
CVE-2025-34089
CRITICAL
1 PoC
Analysis
EPSS 0.56
Remote for Mac <2025.7 - RCE
An unauthenticated remote code execution vulnerability exists in Remote for Mac, a macOS remote control utility developed by Aexol Studio, in versions up to and including 2025.7. When the application is configured with authentication disabled (i.e., the "Allow unknown devices" option is enabled), the /api/executeScript endpoint is exposed without access control. This allows unauthenticated remote attackers to inject arbitrary AppleScript payloads via the X-Script HTTP header, resulting in code execution using do shell script. Successful exploitation grants attackers the ability to run arbitrary commands on the macOS host with the privileges of the Remote for Mac background process.
CWE-306
Jul 03, 2025
CVE-2025-34088
8.8
HIGH
2 PoCs
Analysis
EPSS 0.54
Pandora FMS <7.0NG - Command Injection
An authenticated remote code execution vulnerability exists in Pandora FMS version 7.0NG and earlier. The net_tools.php functionality allows authenticated users to execute arbitrary OS commands via the select_ips parameter when performing network tools operations, such as pinging. This occurs because user input is not properly sanitized before being passed to system commands, enabling command injection.
CWE-78
Jul 03, 2025
CVE-2025-5306
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.69
Artica Pandora Fms < 778 - Command Injection
Improper Neutralization of Special Elements in the Netflow directory field may allow OS command injection. This issue affects Pandora FMS 774 through 778
CWE-77
Jun 27, 2025
CVE-2025-4653
HIGH
1 PoC
Analysis
EPSS 0.64
Pandora ITSM authenticated command injection leading to RCE via the backup function
Improper Neutralization of Special Elements in the backup name field may allow OS command injection. This issue affects Pandora ITSM 5.0.105.
CWE-77
Jun 10, 2025
CVE-2025-32375
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.67
Bentoml < 1.4.8 - Insecure Deserialization
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.8, there was an insecure deserialization in BentoML's runner server. By setting specific headers and parameters in the POST request, it is possible to execute any unauthorized arbitrary code on the server, which will grant the attackers to have the initial access and information disclosure on the server. This vulnerability is fixed in 1.4.8.
CWE-502
Apr 09, 2025
CVE-2025-30004
8.8
HIGH
1 PoC
Analysis
EPSS 0.79
Xorcom CompletePBX <5.2.35 - Command Injection
Xorcom CompletePBX is vulnerable to command injection in the administrator Task Scheduler functionality, allowing for attackers to execute arbitrary commands as the root user.
This issue affects CompletePBX: all versions up to and prior to 5.2.35
CWE-78
Mar 31, 2025
CVE-2025-67888
2 PoCs
Analysis
Control Web Panel /admin/index.php Unauthenticated RCE
Control Web Panel (CWP) versions <= 0.9.8.1208 are vulnerable to unauthenticated OS command injection. User input passed via the "key" GET parameter to /admin/index.php (when the "api" parameter is set) is not properly sanitized before being used to execute OS commands. This can be exploited by unauthenticated attackers to inject and execute arbitrary OS commands with the privileges of the root user on the web server. Successful exploitation usually requires "Softaculous" and/or "SitePad" to be installed through the Scripts Manager.
CVE-2025-31258
6.5
MEDIUM
3 PoCs
Analysis
EPSS 0.00
Apple Macos < 15.5 - Improper Access Control
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.5. An app may be able to break out of its sandbox.
CWE-284
May 12, 2025
CVE-2025-54253
10.0
CRITICAL
KEV
5 PoCs
Analysis
EPSS 0.20
Adobe Experience Manager Forms < 6.5.23.0 - Incorrect Authorization
Adobe Experience Manager versions 6.5.23 and earlier are affected by a Misconfiguration vulnerability that could result in arbitrary code execution. An attacker could leverage this vulnerability to bypass security mechanisms and execute code. Exploitation of this issue does not require user interaction and scope is changed.
CWE-863
Aug 05, 2025