Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:SFP Secondary Cluster: Unexpected Entry Points
Category ID:1002
Vulnerability Mapping:Prohibited
Status:Incomplete
DetailsContent HistoryObserved CVE ExamplesReports
81Vulnerabilities found

CVE-2026-40035
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.13% / 32.28%
||
7 Day CHG~0.00%
Published-08 Apr, 2026 | 21:35
Updated-08 May, 2026 | 14:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unfurl - Werkzeug Debugger Exposure via String Config Parsing

Unfurl through 2025.08 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the Werkzeug debugger and disclose sensitive information or achieve remote code execution.

Action-Not Available
Vendor-ryandfirobsidianforensics
Product-unfurlunfurl
CWE ID-CWE-489
Active Debug Code
CVE-2026-32662
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 11.53%
||
7 Day CHG~0.00%
Published-03 Apr, 2026 | 20:11
Updated-22 Apr, 2026 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Gardyn Cloud API Active Debug Code

Development and test API endpoints are present that mirror production functionality.

Action-Not Available
Vendor-mygardynGardyn
Product-cloud_apiCloud API
CWE ID-CWE-489
Active Debug Code
CVE-2026-33201
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7||HIGH
EPSS-0.03% / 8.69%
||
7 Day CHG~0.00%
Published-26 Mar, 2026 | 04:18
Updated-26 Mar, 2026 | 15:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Digital Photo Frame GH-WDF10A provided by GREEN HOUSE CO., LTD. contains an active debug code vulnerability. If this vulnerability is exploited, files or configurations on the affected device may be read or written, or arbitrary files may be executed with root privileges.

Action-Not Available
Vendor-GREEN HOUSE CO., LTD.
Product-Digital Photo Frame GH-WDF10A
CWE ID-CWE-489
Active Debug Code
CVE-2026-27131
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 12.02%
||
7 Day CHG~0.00%
Published-23 Mar, 2026 | 19:04
Updated-15 Apr, 2026 | 15:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sprig Plugin for Craft CMS potentially discloses sensitive information via Sprig Playground

The Sprig Plugin for Craft CMS is a reactive Twig component framework for Craft CMS. Starting in version 2.0.0 and prior to versions 2.15.2 and 3.15.2, admin users, and users with explicit permission to access the Sprig Playground, could potentially expose the security key, credentials, and other sensitive configuration data, in addition to running the `hashData()` signing function. This issue was mitigated in versions 3.15.2 and 2.15.2 by disabling access to the Sprig Playground entirely when `devMode` is disabled, by default. It is possible to override this behavior using a new `enablePlaygroundWhenDevModeDisabled` that defaults to `false`.

Action-Not Available
Vendor-putyourlightson
Product-craft-sprig
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-489
Active Debug Code
CVE-2025-15017
Assigner-Moxa Inc.
ShareView Details
Assigner-Moxa Inc.
CVSS Score-7||HIGH
EPSS-0.06% / 18.97%
||
7 Day CHG~0.00%
Published-31 Dec, 2025 | 07:44
Updated-31 Dec, 2025 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in serial device servers where active debug code remains enabled in the UART interface. An attacker with physical access to the device can directly connect to the UART interface and, without authentication, user interaction, or execution conditions, gain unauthorized access to internal debug functionality. Exploitation is low complexity and allows an attacker to execute privileged operations and access sensitive system resources, resulting in a high impact to the confidentiality, integrity, and availability of the affected device. No security impact to external or dependent systems has been identified.

Action-Not Available
Vendor-Moxa Inc.
Product-NPort 5100 SeriesNPort 5100A SeriesNPort IA5000 SeriesNPort 5200 SeriesNPort 5000AI-M12 SeriesNPort 5600-DT SeriesNPort 5200A SeriesNPort 5600 SeriesNPort 5400 SeriesNPort IA5000A SeriesNPort IA5000-G2 Series
CWE ID-CWE-489
Active Debug Code
CVE-2025-42872
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.1||MEDIUM
EPSS-0.10% / 26.69%
||
7 Day CHG+0.01%
Published-09 Dec, 2025 | 02:13
Updated-09 Dec, 2025 | 18:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Enterprise Portal

Due to a Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Enterprise Portal, an unauthenticated attacker could inject malicious scripts that execute in the context of other users� browsers, allowing the attacker to steal session cookies, tokens, and other sensitive information. As a result, the vulnerability has a low impact on confidentiality and integrity and no impact on availability.

Action-Not Available
Vendor-SAP SE
Product-SAP NetWeaver Enterprise Portal
CWE ID-CWE-489
Active Debug Code
CVE-2025-2486
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-3.7||LOW
EPSS-0.02% / 4.95%
||
7 Day CHG~0.00%
Published-26 Nov, 2025 | 17:33
Updated-19 Dec, 2025 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
UEFI Shell accessible in AAVMF with Secure Boot enabled on Ubuntu

The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.

Action-Not Available
Vendor-tianocoreUbuntu
Product-edk2edk2
CWE ID-CWE-489
Active Debug Code
CVE-2025-64983
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.6||HIGH
EPSS-0.02% / 5.94%
||
7 Day CHG~0.00%
Published-26 Nov, 2025 | 04:32
Updated-01 Dec, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Smart Video Doorbell firmware versions prior to 2.01.078 contain an active debug code vulnerability that allows an attacker to connect via Telnet and gain access to the device.

Action-Not Available
Vendor-SwitchBot
Product-Smart Video Doorbell
CWE ID-CWE-489
Active Debug Code
CVE-2025-63685
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.08% / 24.41%
||
7 Day CHG~0.00%
Published-20 Nov, 2025 | 00:00
Updated-16 Dec, 2025 | 18:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Quark Cloud Drive v3.23.2 has a DLL Hijacking vulnerability. This vulnerability stems from the insecure loading of system libraries. Specifically, the application does not validate the path or signature of [regsvr32.exe] it loads. An attacker can place a crafted malicious DLL in the application's startup directory, which will be loaded and executed when the user launches the program.

Action-Not Available
Vendor-quarkn/a
Product-quark_cloud_driven/a
CWE ID-CWE-491
Public cloneable() Method Without Final ('Object Hijack')
CVE-2025-54660
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.02% / 4.38%
||
7 Day CHG~0.00%
Published-18 Nov, 2025 | 17:01
Updated-14 Jan, 2026 | 09:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An active debug code vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.10, FortiClientWindows 7.0 all versions may allow a local attacker to run the application step by step and retrieve the saved VPN user password

Action-Not Available
Vendor-Fortinet, Inc.
Product-forticlientFortiClientWindows
CWE ID-CWE-489
Active Debug Code
CVE-2025-30185
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-8.3||HIGH
EPSS-0.02% / 6.24%
||
7 Day CHG~0.00%
Published-11 Nov, 2025 | 16:50
Updated-14 Nov, 2025 | 17:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Active debug code for some Intel UEFI reference platforms within Ring 0: Kernel may allow a denial of service and escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable data alteration. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (high) and availability (high) impacts.

Action-Not Available
Vendor-n/a
Product-Intel UEFI reference platforms
CWE ID-CWE-489
Active Debug Code
CVE-2025-52663
Assigner-HackerOne
ShareView Details
Assigner-HackerOne
CVSS Score-7.3||HIGH
EPSS-0.06% / 17.18%
||
7 Day CHG~0.00%
Published-30 Oct, 2025 | 23:30
Updated-02 Dec, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was identified in certain UniFi Talk devices where internal debugging functionality remained unintentionally enabled. This issue could allow an attacker with access to the UniFi Talk management network to invoke internal debug operations through the device API. Affected Products: UniFi Talk Touch (Version 1.21.16 and earlier) UniFi Talk Touch Max (Version 2.21.22 and earlier) UniFi Talk G3 Phones (Version 3.21.26 and earlier) Mitigation: Update the UniFi Talk Touch to Version 1.21.17 or later. Update the UniFi Talk Touch Max to Version 2.21.23 or later. Update the UniFi Talk G3 Phones to Version 3.21.27 or later.

Action-Not Available
Vendor-Ubiquiti Inc.
Product-UniFi Talk TouchUniFi Talk Touch MaxUniFi Talk G3 Phones
CWE ID-CWE-489
Active Debug Code
CVE-2025-60425
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.6||HIGH
EPSS-1.51% / 81.38%
||
7 Day CHG~0.00%
Published-27 Oct, 2025 | 00:00
Updated-05 Nov, 2025 | 20:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Nagios Fusion v2024R1.2 and v2024R2 does not invalidate already existing session tokens when the two-factor authentication mechanism is enabled, allowing attackers to perform a session hijacking attack.

Action-Not Available
Vendor-n/aNagios Enterprises, LLC
Product-fusionn/a
CWE ID-CWE-491
Public cloneable() Method Without Final ('Object Hijack')
CVE-2025-4106
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Assigner-WatchGuard Technologies, Inc.
CVSS Score-8.9||HIGH
EPSS-0.06% / 17.87%
||
7 Day CHG~0.00%
Published-24 Oct, 2025 | 21:32
Updated-26 Feb, 2026 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Firebox leftover debug code vulnerability

An authenticated admin user with access to both the management WebUI and command line interface on a Firebox can enable a diagnostic debug shell by uploading a platform and version-specific diagnostic package and executing a leftover diagnostic command. This issue affects Fireware OS: from 12.0 before 12.11.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-Fireware OS
CWE ID-CWE-489
Active Debug Code
CVE-2025-36899
Assigner-Google Devices
ShareView Details
Assigner-Google Devices
CVSS Score-8.4||HIGH
EPSS-0.01% / 0.92%
||
7 Day CHG~0.00%
Published-04 Sep, 2025 | 04:56
Updated-26 Feb, 2026 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a possible escalation of privilege due to test/debugging code left in a production build. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-489
Active Debug Code
CVE-2025-55622
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.12% / 30.33%
||
7 Day CHG+0.01%
Published-22 Aug, 2025 | 00:00
Updated-02 Oct, 2025 | 01:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Reolink v4.54.0.4.20250526 was discovered to contain a task hijacking vulnerability due to inappropriate taskAffinity settings. NOTE: this is disputed by the Supplier because it is intentional behavior to ensure a predictable user experience.

Action-Not Available
Vendor-n/aReolink Innovation Limited
Product-reolinkn/a
CWE ID-CWE-491
Public cloneable() Method Without Final ('Object Hijack')
CVE-2025-21472
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 6.48%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:25
Updated-18 Aug, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Leftover Debug Code in Secure Element

Information disclosure while capturing logs as eSE debug messages are logged.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_6900_firmwareqcs8550sa8530p_firmwarewsa8835_firmwarefastconnect_6900fastconnect_7800_firmwareqca9367wsa8830fastconnect_7800qca9377_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresa9000p_firmwaresa8530pwcd9380wcd9380_firmwarewsa8830_firmwareqcs8550_firmwareqca9367_firmwarewsa8835sa8540psa8540p_firmwaresa9000pqca9377snapdragon_8_gen_1_mobile_platformSnapdragon
CWE ID-CWE-489
Active Debug Code
CVE-2025-7705
Assigner-Asea Brown Boveri Ltd. (ABB)
ShareView Details
Assigner-Asea Brown Boveri Ltd. (ABB)
CVSS Score-8.6||HIGH
EPSS-0.15% / 35.64%
||
7 Day CHG+0.11%
Published-22 Jul, 2025 | 11:49
Updated-22 Jul, 2025 | 13:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication bypass due to compatibility mode enabled by default

: Active Debug Code vulnerability in ABB Switch Actuator 4 DU-83330, ABB Switch actuator, door/light 4 DU -83330-500.This issue affects Switch Actuator 4 DU-83330: All Versions; Switch actuator, door/light 4 DU -83330-500: All Versions.

Action-Not Available
Vendor-ABB
Product-Switch Actuator 4 DU-83330Switch actuator, door/light 4 DU -83330-500
CWE ID-CWE-489
Active Debug Code
CVE-2025-1479
Assigner-Lenovo Group Ltd.
ShareView Details
Assigner-Lenovo Group Ltd.
CVSS Score-4.8||MEDIUM
EPSS-0.07% / 22.30%
||
7 Day CHG~0.00%
Published-30 May, 2025 | 19:13
Updated-26 Feb, 2026 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An open debug interface was reported in the Legion Space software included on certain Legion devices that could allow a local attacker to execute arbitrary code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-Legion Space for Legion GoLegion Space for Legion PC
CWE ID-CWE-489
Active Debug Code
CVE-2024-42213
Assigner-HCL Software
ShareView Details
Assigner-HCL Software
CVSS Score-5.3||MEDIUM
EPSS-0.33% / 56.08%
||
7 Day CHG~0.00%
Published-05 May, 2025 | 19:00
Updated-17 Jun, 2025 | 21:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL BigFix Compliance is affected by inclusion of temporary files left in the production environment

HCL BigFix Compliance is affected by inclusion of temporary files left in the production environment. An attacker might gain access to these files by indexing or retrieved via predictable URLs or misconfigured permissions, leading to information disclosure.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-bigfix_complianceHCL BigFix Compliance
CWE ID-CWE-531
Inclusion of Sensitive Information in Test Code
CVE-2025-46674
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-3.5||LOW
EPSS-0.29% / 52.23%
||
7 Day CHG~0.00%
Published-27 Apr, 2025 | 00:00
Updated-29 May, 2025 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NASA CryptoLib before 1.3.2 uses Extended Procedures that are a Work in Progress (not intended for use during flight), potentially leading to a keystream oracle.

Action-Not Available
Vendor-nasaNASA
Product-cryptolibCryptoLib
CWE ID-CWE-489
Active Debug Code
CVE-2025-43717
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.28% / 51.16%
||
7 Day CHG~0.00%
Published-17 Apr, 2025 | 00:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PEAR HTTP_Request2 before 2.7.0, multiple files in the tests directory, notably tests/_network/getparameters.php and tests/_network/postparameters.php, reflect any GET or POST parameters, leading to XSS.

Action-Not Available
Vendor-avb
Product-HTTP_Request2
CWE ID-CWE-531
Inclusion of Sensitive Information in Test Code
CVE-2025-2919
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-7||HIGH
EPSS-0.09% / 25.98%
||
7 Day CHG~0.00%
Published-28 Mar, 2025 | 17:31
Updated-17 Apr, 2025 | 14:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Netis WF-2404 UART hardware allows activation of test or debug logic at runtime

A vulnerability was found in Netis WF-2404 1.1.124EN. It has been declared as critical. This vulnerability affects unknown code of the component UART. The manipulation leads to hardware allows activation of test or debug logic at runtime. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Netis Systems Co., Ltd.
Product-netis_wf-2404netis_wf-2404_firmwareWF-2404
CWE ID-CWE-1313
Hardware Allows Activation of Test or Debug Logic at Runtime
CWE ID-CWE-489
Active Debug Code
CVE-2024-53648
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-7||HIGH
EPSS-0.06% / 19.73%
||
7 Day CHG~0.00%
Published-11 Feb, 2025 | 10:28
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.90), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.90), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.90), SIPROTEC 5 6MD89 (CP300) (All versions < V9.90), SIPROTEC 5 6MU85 (CP300) (All versions < V9.90), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V10.0), SIPROTEC 5 7SA82 (CP100) (All versions < V8.90), SIPROTEC 5 7SA82 (CP150) (All versions < V9.90), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.90), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.90), SIPROTEC 5 7SD82 (CP100) (All versions < V8.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.90), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.90), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.90), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.90), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.90), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.90), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.90), SIPROTEC 5 7SK82 (CP100) (All versions < V8.90), SIPROTEC 5 7SK82 (CP150) (All versions < V9.90), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.90), SIPROTEC 5 7SL82 (CP100) (All versions < V8.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.90), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.90), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.90), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.90), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V10.0), SIPROTEC 5 7ST86 (CP300) (All versions < V10.0), SIPROTEC 5 7SX82 (CP150) (All versions < V9.90), SIPROTEC 5 7SX85 (CP300) (All versions < V9.90), SIPROTEC 5 7SY82 (CP150) (All versions < V9.90), SIPROTEC 5 7UM85 (CP300) (All versions < V9.90), SIPROTEC 5 7UT82 (CP100) (All versions < V8.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.90), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.90), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.90), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.90), SIPROTEC 5 7VE85 (CP300) (All versions < V9.90), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.90), SIPROTEC 5 7VU85 (CP300) (All versions < V9.90), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.90). Affected devices do not properly limit access to a development shell accessible over a physical interface. This could allow an unauthenticated attacker with physical access to the device to execute arbitrary commands on the device.

Action-Not Available
Vendor-Siemens AG
Product-SIPROTEC 5 7SK85 (CP200)SIPROTEC 5 7SS85 (CP200)SIPROTEC 5 7UT86 (CP200)SIPROTEC 5 7ST85 (CP300)SIPROTEC 5 7SK82 (CP150)SIPROTEC 5 7UT86 (CP300)SIPROTEC 5 7SA82 (CP150)SIPROTEC 5 7SA86 (CP200)SIPROTEC 5 7SJ81 (CP100)SIPROTEC 5 6MU85 (CP300)SIPROTEC 5 6MD86 (CP300)SIPROTEC 5 7SD82 (CP100)SIPROTEC 5 7SA82 (CP100)SIPROTEC 5 7SJ81 (CP150)SIPROTEC 5 7SD82 (CP150)SIPROTEC 5 7SX82 (CP150)SIPROTEC 5 7SK85 (CP300)SIPROTEC 5 7SX85 (CP300)SIPROTEC 5 7SJ85 (CP200)SIPROTEC 5 7UT85 (CP200)SIPROTEC 5 7SK82 (CP100)SIPROTEC 5 7SL86 (CP200)SIPROTEC 5 7SD86 (CP200)SIPROTEC 5 7UT85 (CP300)SIPROTEC 5 7SJ82 (CP100)SIPROTEC 5 7SL87 (CP300)SIPROTEC 5 7SJ82 (CP150)SIPROTEC 5 7ST86 (CP300)SIPROTEC 5 7KE85 (CP200)SIPROTEC 5 7UT82 (CP100)SIPROTEC 5 7SA86 (CP300)SIPROTEC 5 7SL87 (CP200)SIPROTEC 5 7UM85 (CP300)SIPROTEC 5 7UT87 (CP300)SIPROTEC 5 6MD84 (CP300)SIPROTEC 5 6MD85 (CP300)SIPROTEC 5 7VE85 (CP300)SIPROTEC 5 7SD87 (CP300)SIPROTEC 5 7UT87 (CP200)SIPROTEC 5 7ST85 (CP200)SIPROTEC 5 7SD86 (CP300)SIPROTEC 5 7VK87 (CP200)SIPROTEC 5 6MD89 (CP300)SIPROTEC 5 7VK87 (CP300)SIPROTEC 5 7VU85 (CP300)SIPROTEC 5 7SD87 (CP200)SIPROTEC 5 7SS85 (CP300)SIPROTEC 5 7SJ86 (CP200)SIPROTEC 5 7SL82 (CP150)SIPROTEC 5 7SJ86 (CP300)SIPROTEC 5 7SL86 (CP300)SIPROTEC 5 6MD85 (CP200)SIPROTEC 5 7KE85 (CP300)SIPROTEC 5 7UT82 (CP150)SIPROTEC 5 7SA87 (CP300)SIPROTEC 5 7SY82 (CP150)SIPROTEC 5 Compact 7SX800 (CP050)SIPROTEC 5 7SL82 (CP100)SIPROTEC 5 6MD86 (CP200)SIPROTEC 5 7SJ85 (CP300)SIPROTEC 5 7SA87 (CP200)
CWE ID-CWE-489
Active Debug Code
CVE-2024-9644
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 6.84%
||
7 Day CHG~0.00%
Published-04 Feb, 2025 | 14:58
Updated-19 Nov, 2025 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Four-Faith F3x36 bapply.cgi Auth Bypass

The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an authentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the "bapply.cgi" endpoint instead of the normal "apply.cgi" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities.

Action-Not Available
Vendor-four-faithFour-Faith
Product-f3x36_firmwaref3x36F3x36
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-489
Active Debug Code
CVE-2024-9643
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-9.8||CRITICAL
EPSS-19.51% / 95.48%
||
7 Day CHG-6.74%
Published-04 Feb, 2025 | 14:47
Updated-22 Nov, 2025 | 01:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Four-Faith F3x36 Hidden Debug Credentials

The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645.

Action-Not Available
Vendor-four-faithFour-Faith
Product-f3x36_firmwaref3x36F3x36
CWE ID-CWE-489
Active Debug Code
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-46873
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.74% / 73.26%
||
7 Day CHG+0.20%
Published-23 Dec, 2024 | 00:17
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple SHARP routers leave the hidden debug function enabled. An arbitrary OS command may be executed with the root privilege by a remote unauthenticated attacker.

Action-Not Available
Vendor-Sharp Corporation
Product-Wi-Fi STATION SH-54Chome 5G HR02PocketWifi 809SHWi-Fi STATION SH-52BSpeed Wi-Fi NEXT W07Wi-Fi STATION SH-05L
CWE ID-CWE-489
Active Debug Code
CVE-2022-20649
Assigner-Cisco Systems, Inc.
ShareView Details
Assigner-Cisco Systems, Inc.
CVSS Score-8.1||HIGH
EPSS-11.74% / 93.77%
||
7 Day CHG~0.00%
Published-15 Nov, 2024 | 15:59
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Redundancy Configuration Manager Debug Remote Code Execution Vulnerability

A vulnerability in Cisco&nbsp;RCM for Cisco&nbsp;StarOS Software could allow an unauthenticated, remote attacker to perform remote code execution on the application with root-level privileges&nbsp;in the context of the configured container. This vulnerability exists because the debug mode is incorrectly enabled for specific services. An attacker could exploit this vulnerability by connecting to the device and navigating to the service with debug mode enabled. A successful exploit could allow the attacker to execute arbitrary commands as the root user. The attacker would need to perform detailed reconnaissance to allow for unauthenticated access. The vulnerability can also be exploited by an authenticated attacker. Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco Redundancy Configuration Managerredundancy_configuration_manager
CWE ID-CWE-489
Active Debug Code
CVE-2024-29075
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.6||MEDIUM
EPSS-0.06% / 17.61%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 05:30
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Active debug code vulnerability exists in Mesh Wi-Fi router RP562B firmware version v1.0.2 and earlier. If this vulnerability is exploited, a network-adjacent authenticated attacker may obtain or alter the settings of the device .

Action-Not Available
Vendor-SoftBank Corp.
Product-Mesh Wi-Fi router RP562B
CWE ID-CWE-489
Active Debug Code
CVE-2024-41999
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.8||MEDIUM
EPSS-0.17% / 37.51%
||
7 Day CHG~0.00%
Published-30 Sep, 2024 | 07:50
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Smart-tab Android app installed April 2023 or earlier contains an active debug code vulnerability. If this vulnerability is exploited, an attacker with physical access to the device may exploit the debug function to gain access to the OS functions, escalate the privilege, change the device's settings, or spoof devices in other rooms.

Action-Not Available
Vendor-TECHNO SUPPORT COMPANYandroid_app
Product-Smart-tab Android appsmart_tab
CWE ID-CWE-489
Active Debug Code
CVE-2024-44092
Assigner-Google Devices
ShareView Details
Assigner-Google Devices
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.40%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 20:28
Updated-15 Sep, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a possible LCS signing enforcement missing due to test/debugging code left in a production build. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-489
Active Debug Code
CVE-2024-7756
Assigner-Lenovo Group Ltd.
ShareView Details
Assigner-Lenovo Group Ltd.
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 5.74%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 17:26
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability was reported in the ThinkPad L390 Yoga and 10w Notebook that could allow a local attacker to escalate privileges by accessing an embedded UEFI shell.

Action-Not Available
Vendor-Lenovo Group Limited
Product-L390 (type 20NR, 20NS) Laptops (ThinkPad) BIOS10w (Type 82ST, 82SU) Laptop (Lenovo) BIOSL390 Yoga (type 20NT, 20NU) Laptops (ThinkPad) BIOSthinkpad_l390_yoga_firmware10w_firmware
CWE ID-CWE-489
Active Debug Code
CVE-2024-36475
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.2||HIGH
EPSS-0.51% / 66.46%
||
7 Day CHG~0.00%
Published-17 Jul, 2024 | 08:48
Updated-27 Sep, 2024 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. contain an active debug code vulnerability. If a user who knows how to use the debug function logs in to the product, the debug function may be used and an arbitrary OS command may be executed.

Action-Not Available
Vendor-centurysysCentury Systems Co., Ltd.centurysys
Product-futurenet_nxr-125\/cx_firmwarefuturenet_nxr-610x_firmwarefuturenet_nxr-650futurenet_nxr-155\/c_firmwarefuturenet_nxr-160\/lwfuturenet_nxr-g180\/l-ca_firmwarefuturenet_nxr-230\/cfuturenet_nxr-530_firmwarefuturenet_nxr-g050_firmwarefuturenet_vxr-x64futurenet_nxr-650_firmwarefuturenet_nxr-120\/cfuturenet_nxr-230\/c_firmwarefuturenet_nxr-130\/c_firmwarefuturenet_nxr-160\/lw_firmwarefuturenet_nxr-g110_firmwarefuturenet_nxr-1200_firmwarefuturenet_nxr-g180\/l-cafuturenet_wxr-250_firmwarefuturenet_nxr-130\/cfuturenet_wxr-250futurenet_nxr-125\/cxfuturenet_nxr-350\/c_firmwarefuturenet_nxr-g120_firmwarefuturenet_nxr-350\/cfuturenet_nxr-g200_firmwarefuturenet_nxr-1300_firmwarefuturenet_nxr-g060_firmwarefuturenet_nxr-1200futurenet_nxr-120\/c_firmwarefuturenet_vxr-x86futurenet_nxr-g100_firmwarefuturenet_nxr-530FutureNet NXR-610X seriesFutureNet NXR-120/CFutureNet WXR-250FutureNet NXR-530FutureNet NXR-G180/L-CAFutureNet NXR-125/CXFutureNet NXR-230/CFutureNet NXR-650FutureNet NXR-350/CFutureNet NXR-1300 seriesFutureNet NXR-130/CFutureNet NXR-G120 seriesFutureNet NXR-160/LWFutureNet NXR-G100 seriesFutureNet VXR/x86FutureNet NXR-155/C seriesFutureNet NXR-G200 seriesFutureNet NXR-G050 seriesFutureNet NXR-1200FutureNet VXR/x64FutureNet NXR-G060 seriesFutureNet NXR-G110 seriesfuturenet_nxr-230\/c_firmwarefuturenet_nxr-130\/c_firmwarefuturenet_vxr\/x86_firmwarefuturenet_nxr-125\/cx_firmwarefuturenet_nxr-610x_firmwarefuturenet_nxr-160\/lw_firmwarefuturenet_nxr-g110_firmwarefuturenet_nxr-1200_firmwarefuturenet_nxr-155\/c_firmwarefuturenet_wxr-250_firmwarefuturenet_nxr-350\/c_firmwarefuturenet_nxr-g120_firmwarefuturenet_nxr-g180\/l-ca_firmwarefuturenet_nxr-g200_firmwarefuturenet_nxr-1300_firmwarefuturenet_nxr-g060_firmwarefuturenet_nxr-120\/c_firmwarefuturenet_vxr\/x64_firmwarefuturenet_nxr-530_firmwarefuturenet_nxr-g050_firmwarefuturenet_nxr-g100_firmwarefuturenet_nxr-650_firmware
CWE ID-CWE-489
Active Debug Code
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-39069
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-3.37% / 87.49%
||
7 Day CHG~0.00%
Published-09 Jul, 2024 | 00:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in ifood Order Manager v3.35.5 'Gestor de Peddios.exe' allows attackers to execute arbitrary code via a DLL hijacking attack.

Action-Not Available
Vendor-n/aifood
Product-n/aorder_manager
CWE ID-CWE-491
Public cloneable() Method Without Final ('Object Hijack')
CVE-2023-49593
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.2||HIGH
EPSS-0.31% / 54.47%
||
7 Day CHG~0.00%
Published-08 Jul, 2024 | 15:22
Updated-04 Nov, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Leftover debug code exists in the boa formSysCmd functionality of LevelOne WBR-6013 RER4_A_v3411b_2T2R_LEV_09_170623. A specially crafted network request can lead to arbitrary command execution.

Action-Not Available
Vendor-level1LevelOnelevel_one
Product-wbr-6013_firmwarewbr-6013WBR-6013wbr6013
CWE ID-CWE-489
Active Debug Code
CVE-2024-29511
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.50% / 66.07%
||
7 Day CHG~0.00%
Published-03 Jul, 2024 | 00:00
Updated-28 Apr, 2025 | 17:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Artifex Ghostscript before 10.03.1, when Tesseract is used for OCR, has a directory traversal issue that allows arbitrary file reading (and writing of error messages to arbitrary files) via OCRLanguage. For example, exploitation can use debug_file /tmp/out and user_patterns_file /etc/passwd.

Action-Not Available
Vendor-n/aArtifex Software Inc.
Product-ghostscriptn/aafpl_ghostscript
CWE ID-CWE-489
Active Debug Code
CVE-2024-21827
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.2||HIGH
EPSS-0.15% / 35.48%
||
7 Day CHG~0.00%
Published-25 Jun, 2024 | 14:01
Updated-04 Nov, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A leftover debug code vulnerability exists in the cli_server debug functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.4.1 Build 20240117 Rel.57421. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-er7206_firmwareer7206ER7206 Omada Gigabit VPN Routerer7206
CWE ID-CWE-489
Active Debug Code
CVE-2024-21785
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-1.00% / 77.25%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A leftover debug code vulnerability exists in the Telnet Diagnostic Interface functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted series of network requests can lead to unauthorized access. An attacker can send a sequence of requests to trigger this vulnerability.

Action-Not Available
Vendor-AutomationDirect
Product-p1-540_firmwarep3-550e_firmwarep3-550_firmwarep3-530p1-550_firmwarep2-550p3-550ep3-550p2-550_firmwarep1-540p3-530_firmwarep1-550P3-550Ep3-550e
CWE ID-CWE-489
Active Debug Code
CVE-2024-32047
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.21% / 43.39%
||
7 Day CHG~0.00%
Published-15 May, 2024 | 19:36
Updated-30 Jul, 2025 | 00:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CyberPower PowerPanel business Active Debug Code

Hard-coded credentials for the CyberPower PowerPanel test server can be found in the production code. This might result in an attacker gaining access to the testing or production server.

Action-Not Available
Vendor-Cyber Power Systems, Inc.
Product-powerpanelPowerPanel businesspowerpanel_business
CWE ID-CWE-489
Active Debug Code
CVE-2024-31406
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.05% / 14.75%
||
7 Day CHG~0.00%
Published-24 Apr, 2024 | 05:45
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Active debug code vulnerability exists in RoamWiFi R10 prior to 4.8.45. If this vulnerability is exploited, a network-adjacent unauthenticated attacker with access to the device may perform unauthorized operations.

Action-Not Available
Vendor-RoamWiFi Technology Co., Ltd.roamwifi
Product-RoamWiFi R10r10
CWE ID-CWE-489
Active Debug Code
CVE-2024-30219
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.8||MEDIUM
EPSS-0.06% / 18.41%
||
7 Day CHG~0.00%
Published-15 Apr, 2024 | 10:42
Updated-27 Aug, 2025 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Active debug code vulnerability exists in PLANEX COMMUNICATIONS wireless LAN routers. If a logged-in user who knows how to use the debug function accesses the device's management page, an unintended operation may be performed. Note that MZK-MF300N is no longer supported, therefore the update for this product is not provided.

Action-Not Available
Vendor-planexPLANEX COMMUNICATIONS INC.planex
Product-mzk-mf300nmzk-mf300hp2_firmwaremzk-mf300n_firmwaremzk-mf300hp2MZK-MF300HP2MZK-MF300Nmzk-mf300n_firmware
CWE ID-CWE-489
Active Debug Code
CVE-2024-28008
Assigner-NEC Corporation
ShareView Details
Assigner-NEC Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.43% / 62.40%
||
7 Day CHG~0.00%
Published-28 Mar, 2024 | 00:52
Updated-29 Sep, 2025 | 13:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Active Debug Code in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN MR02LN, WG1810HP(JE) and WG1810HP(MF) all versions allows a attacker to execute an arbitrary OS command via the internet.

Action-Not Available
Vendor-NEC Corporation
Product-aterm_wr1200haterm_wr9500n_firmwareaterm_wg600hpaterm_wg1400hpaterm_wr8750naterm_wr8300naterm_wg300hpaterm_wg1200hs2aterm_wg1200hs3_firmwareaterm_wg1810hp\(je\)aterm_wr8700naterm_wg1800hp2_firmwareaterm_wm3800raterm_w1200ex-ms_firmwareaterm_wg1800hp2aterm_wg1900hp2_firmwareaterm_mr02lnaterm_wf800hpaterm_wm3600r_firmwareaterm_wg1200hs3aterm_wr8700n_firmwareaterm_wr6600h_firmwareaterm_wg2200hp_firmwareaterm_wf300hpaterm_wr9300naterm_wf800hp_firmwareaterm_wr4500n_firmwareaterm_wg1810hp\(je\)_firmwareaterm_wr6670saterm_wg1800hp4_firmwareaterm_wr9500naterm_wg300hp_firmwareaterm_wr8150n_firmwareaterm_wg1200hpaterm_wr6650saterm_wr8175naterm_wr7850saterm_wr8100n_firmwareaterm_wr7850s_firmwareaterm_wr8200n_firmwareaterm_wm3400rnaterm_cr2500paterm_wr8100naterm_wm3500r_firmwareaterm_w300paterm_wr4100n_firmwareaterm_wm3400rn_firmwareaterm_wr7870saterm_wr8150naterm_wr8165n_firmwareaterm_wr8160n_firmwareaterm_wf1200hp2_firmwareaterm_wr8500n_firmwareaterm_wf300hp2aterm_wg1200hp2aterm_wg1900hpaterm_w1200ex-msaterm_w300p_firmwareaterm_wm3500raterm_wg1800hp3_firmwareaterm_wr1200h_firmwareaterm_wf1200hp_firmwareaterm_wf300hp2_firmwareaterm_wr7800h_firmwareaterm_wr9300n_firmwareaterm_wg1200hs2_firmwareaterm_wg1800hp3aterm_wr8166n_firmwareaterm_wr6650s_firmwareaterm_wg1900hp2aterm_wg1200hs_firmwareaterm_wr6600haterm_wr8165naterm_wr7800haterm_wr8166naterm_wr8370n_firmwareaterm_cr2500p_firmwareaterm_wm3600raterm_wr8160naterm_wf1200hp2aterm_wr4100naterm_mr01ln_firmwareaterm_wm3800r_firmwareaterm_wg1200hp3_firmwareaterm_wr8750n_firmwareaterm_wr8370naterm_wg1800hp_firmwareaterm_wr8175n_firmwareaterm_mr02ln_firmwareaterm_wg1400hp_firmwareaterm_wg1810hp\(mf\)_firmwareaterm_wr8400naterm_wg1200hp2_firmwareaterm_wr4500naterm_wg1810hp\(mf\)aterm_wg1900hp_firmwareaterm_wm3450rnaterm_wr8200naterm_wf300hp_firmwareaterm_wg2200hpaterm_wr7870s_firmwareaterm_wr6670s_firmwareaterm_wg1200hp3aterm_wr8170n_firmwareaterm_wf1200hpaterm_wr8600naterm_wg600hp_firmwareaterm_wr8600n_firmwareaterm_wg1200hsaterm_wg1800hpaterm_wr8500naterm_wg1200hp_firmwareaterm_wr8170naterm_wr8300n_firmwareaterm_mr01lnaterm_wg1800hp4aterm_wr8400n_firmwareaterm_wm3450rn_firmwareWR6600HWM3500RW300PWR8300NWR1200HWR6670SWG600HPWF1200HP2WM3400RNWM3800RWR9300NWR8166NWG1800HP4WG2200HPWR8165NWG1200HS3WR6650SWM3450RNWG1200HSWF300HP2WG1200HP3WG1900HP2WF800HPWR8400NWR9500NWR8100NWF1200HPWR8160NWR7800HWR8500NWG1810HP(JE)WG1810HP(MF)WR4500NWR8200NWR8170NWG1800HP2CR2500PWR8600NWG1800HPWG1200HPWF300HPWM3600RWG1900HPWR8150NWG1200HS2WR4100NWG1400HPWR8370NWR8750NWR8175NWR7870SWG1800HP3WG1200HP2WR7850SMR01LNWG300HPMR02LNWR8700NW1200EX(-MS)aterm_wg1800hp4_firmware
CWE ID-CWE-489
Active Debug Code
CVE-2023-4804
Assigner-Johnson Controls
ShareView Details
Assigner-Johnson Controls
CVSS Score-10||CRITICAL
EPSS-0.14% / 33.13%
||
7 Day CHG+0.03%
Published-10 Nov, 2023 | 22:17
Updated-16 Dec, 2025 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Quantum HD Unity

An unauthorized user could access debug features in Quantum HD Unity products that were accidentally exposed.

Action-Not Available
Vendor-johnsoncontrolsJohnson Controls
Product-quantum_hd_unity_compressorquantum_hd_unity_compressor_firmwarequantum_hd_unity_condenser\/vessel_firmwarequantum_hd_unity_engine_room_firmwarequantum_hd_unity_acuair_firmwarequantum_hd_unity_evaporatorquantum_hd_unity_evaporator_firmwarequantum_hd_unity_interfacequantum_hd_unity_interface_firmwarequantum_hd_unity_condenser\/vesselquantum_hd_unity_engine_roomquantum_hd_unity_acuairQuantum HD Unity EvaporatorQuantum HD Unity AcuAirQuantum HD Unity Condenser/VesselQuantum HD Unity InterfaceQuantum HD Unity CompressorQuantum HD Unity Engine Room
CWE ID-CWE-489
Active Debug Code
CVE-2023-32645
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 19.40%
||
7 Day CHG~0.00%
Published-11 Oct, 2023 | 15:14
Updated-04 Nov, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A leftover debug code vulnerability exists in the httpd debug credentials functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to authentication bypass. An attacker can send a network request to trigger this vulnerability.

Action-Not Available
Vendor-yifanwirelessYifanyifanwireless
Product-yf325_firmwareyf325YF325yf325_firmware
CWE ID-CWE-489
Active Debug Code
CVE-2023-34346
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-0.38% / 59.34%
||
7 Day CHG~0.00%
Published-11 Oct, 2023 | 15:14
Updated-04 Nov, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-based buffer overflow vulnerability exists in the httpd gwcfg.cgi get functionality of Yifan YF325 v1.0_20221108. A specially crafted network packet can lead to command execution. An attacker can send a network request to trigger this vulnerability.

Action-Not Available
Vendor-yifanwirelessYifanyifanwireless
Product-yf325_firmwareyf325YF325yf325_firmware
CWE ID-CWE-489
Active Debug Code
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-4227
Assigner-Moxa Inc.
ShareView Details
Assigner-Moxa Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.16% / 36.59%
||
7 Day CHG~0.00%
Published-24 Aug, 2023 | 05:07
Updated-28 Oct, 2024 | 06:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ioLogik 4000 Series: Existence of an Unauthorized Service

A vulnerability has been identified in the ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which can be exploited by malicious actors to potentially gain unauthorized access to the product. This could lead to security breaches, data theft, and unauthorized manipulation of sensitive information. The vulnerability is attributed to the presence of an unauthorized service, which could potentially enable unauthorized access to the. device.

Action-Not Available
Vendor-Moxa Inc.
Product-iologik_e4200_firmwareiologik_e4200ioLogik 4000 Seriesiologik_4000_series
CWE ID-CWE-489
Active Debug Code
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-0954
Assigner-Johnson Controls
ShareView Details
Assigner-Johnson Controls
CVSS Score-8.3||HIGH
EPSS-0.11% / 29.18%
||
7 Day CHG~0.00%
Published-08 Jun, 2023 | 20:05
Updated-06 Jan, 2025 | 20:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Debug feature in Sensormatic Electronics Illustra Dome and PTZ cameras

A debug feature in Sensormatic Electronics Illustra Pro Gen 4 Dome and PTZ cameras allows a user to compromise credentials after a long period of sustained attack.

Action-Not Available
Vendor-johnsoncontrolsSensormatic Electronics, a subsidiary of Johnson Controls, Inc.
Product-illustra_pro_gen_4_domeillustra_pro_gen_4_dome_firmwareillustra_pro_gen_4_ptz_firmwareillustra_pro_gen_4_ptzIllustra Pro Gen 4 PTZIllustra Pro Gen 4 Dome
CWE ID-CWE-489
Active Debug Code
CVE-2023-1618
Assigner-Mitsubishi Electric Corporation
ShareView Details
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.17% / 38.26%
||
7 Day CHG~0.00%
Published-19 May, 2023 | 04:19
Updated-12 Feb, 2025 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass Vulnerability in MELSEC WS Series Ethernet Interface Module

Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 Serial number 2310 **** and prior allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-melsec_ws0-geth00200melsec_ws0-geth00200_firmwareMELSEC WS Series WS0-GETH00200
CWE ID-CWE-489
Active Debug Code
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2023-21496
Assigner-Samsung Mobile
ShareView Details
Assigner-Samsung Mobile
CVSS Score-6.1||MEDIUM
EPSS-0.15% / 35.79%
||
7 Day CHG~0.00%
Published-04 May, 2023 | 00:00
Updated-12 Feb, 2025 | 16:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Active Debug Code vulnerability in ActivityManagerService prior to SMR May-2023 Release 1 allows attacker to use debug function via setting debug level.

Action-Not Available
Vendor-Samsung ElectronicsSamsung
Product-androidSamsung Mobile Devices
CWE ID-CWE-489
Active Debug Code
CVE-2022-27597
Assigner-QNAP Systems, Inc.
ShareView Details
Assigner-QNAP Systems, Inc.
CVSS Score-2.7||LOW
EPSS-0.16% / 36.05%
||
7 Day CHG-0.19%
Published-29 Mar, 2023 | 00:00
Updated-12 Feb, 2025 | 19:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QTS, QuTS hero, QuTScloud, QVP (QVR Pro appliances)

A vulnerability has been reported to affect QNAP operating systems. If exploited, the out-of-bounds read vulnerability allows remote authenticated administrators to get secret values. The vulnerability affects the following QNAP operating systems: QTS, QuTS hero, QuTScloud, QVP (QVR Pro appliances) We have already fixed the vulnerability in the following versions: QTS 5.0.1.2346 build 20230322 and later QuTS hero h5.0.1.2348 build 20230324 and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qvp-41a_firmwareqvp-85b_firmwareqvp-21aqtsqvp-63b_firmwareqvp-63aqvp-85aqvp-41bqvp-85bqvp-63a_firmwareqvp-41b_firmwareqvp-85a_firmwarequts_heroqvrqutscloudqvp-21a_firmwareqvp-63bqvp-41aQTSQuTS hero
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-1295
Debug Messages Revealing Unnecessary Information
CWE ID-CWE-489
Active Debug Code
  • Previous
  • 1
  • 2
  • Next