CVE-2025-4117 |
Description: A vulnerability, which was classified as critical, was found in Netgear JWNR2000v2 1.0.0.11. This affects the function sub_41A914. The manipulation of the argument host leads to buffer overflow. The vendor was contacted early about this disclosure but did not respond in any way. Es wurde eine kritische Schwachstelle in Netgear JWNR2000v2 1.0.0.11 gefunden. Es geht dabei um die Funktion sub_41A914. Mittels dem Manipulieren des Arguments host mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden.
CVSS: MEDIUM (5.1) EPSS Score: 0.05%
April 30th, 2025 (about 2 months ago)
|
CVE-2025-27532 |
Description: A vulnerability in the “Backup & Restore” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to access secret information via multiple crafted HTTP requests.
CVSS: MEDIUM (6.5) EPSS Score: 0.06%
April 30th, 2025 (about 2 months ago)
|
CVE-2025-24348 |
Description: A vulnerability in the “Network Interfaces” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the wireless network configuration file via a crafted HTTP request.
CVSS: MEDIUM (5.4) EPSS Score: 0.09%
April 30th, 2025 (about 2 months ago)
|
CVE-2025-24347 |
Description: A vulnerability in the “Network Interfaces” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the network configuration file via a crafted HTTP request.
CVSS: MEDIUM (6.5) EPSS Score: 0.22%
April 30th, 2025 (about 2 months ago)
|
CVE-2025-24345 |
Description: A vulnerability in the “Hosts” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the “hosts” file in an unintended manner via a crafted HTTP request.
CVSS: MEDIUM (6.3) EPSS Score: 0.12%
April 30th, 2025 (about 2 months ago)
|
CVE-2025-24344 |
Description: A vulnerability in the error notification messages of the web application of ctrlX OS allows a remote unauthenticated attacker to inject arbitrary HTML tags and, possibly, execute arbitrary client-side code in the context of another user's browser via a crafted HTTP request.
CVSS: MEDIUM (6.3) EPSS Score: 0.08%
April 30th, 2025 (about 2 months ago)
|
CVE-2025-24343 |
Description: A vulnerability in the “Manages app data” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to write arbitrary files in arbitrary file system paths via a crafted HTTP request.
CVSS: MEDIUM (5.4) EPSS Score: 0.22%
April 30th, 2025 (about 2 months ago)
|
CVE-2025-24342 |
Description: A vulnerability in the login functionality of the web application of ctrlX OS allows a remote unauthenticated attacker to guess valid usernames via multiple crafted HTTP requests.
CVSS: MEDIUM (5.3) EPSS Score: 0.09%
April 30th, 2025 (about 2 months ago)
|
CVE-2025-24341 |
Description: A vulnerability in the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to induce a Denial-of-Service (DoS) condition on the device via multiple crafted HTTP requests. In the worst case, a full power cycle is needed to regain control of the device.
CVSS: MEDIUM (6.5) EPSS Score: 0.41%
April 30th, 2025 (about 2 months ago)
|
CVE-2025-4113 |
Description: A vulnerability was found in PHPGurukul Curfew e-Pass Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/edit-pass-detail.php. The manipulation of the argument editid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Eine Schwachstelle wurde in PHPGurukul Curfew e-Pass Management System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Betroffen davon ist ein unbekannter Prozess der Datei /admin/edit-pass-detail.php. Dank Manipulation des Arguments editid mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
CVSS: MEDIUM (5.3) EPSS Score: 0.03%
April 30th, 2025 (about 2 months ago)
|