Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Authentication Errors
Category ID:1211
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
4746Vulnerabilities found

CVE-2025-65552
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.12% / 31.29%
||
7 Day CHG~0.00%
Published-12 Jan, 2026 | 00:00
Updated-03 Feb, 2026 | 19:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

D3D Wi-Fi Home Security System ZX-G12 v2.1.1 is vulnerable to RF replay attacks on the 433 MHz sensor communication channel. The system does not implement rolling codes, message authentication, or anti-replay protection, allowing an attacker within RF range to record valid alarm/control frames and replay them to trigger false alarms.

Action-Not Available
Vendor-d3dsecurityn/a
Product-zx-g12zx-g12_firmwaren/a
CWE ID-CWE-294
Authentication Bypass by Capture-replay
CVE-2025-65553
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 15.29%
||
7 Day CHG~0.00%
Published-12 Jan, 2026 | 00:00
Updated-22 Jan, 2026 | 22:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

D3D Wi-Fi Home Security System ZX-G12 v2.1.17 is susceptible to RF jamming on the 433 MHz alarm sensor channel. An attacker within RF range can transmit continuous interference to block sensor transmissions, resulting in missed alarms and loss of security monitoring. The device lacks jamming detection or mitigations, creating a denial-of-service condition that may lead to undetected intrusions or failure to trigger safety alerts.

Action-Not Available
Vendor-d3dsecurityn/a
Product-xz-g12xz-g12_firmwaren/a
CWE ID-CWE-294
Authentication Bypass by Capture-replay
CVE-2026-0842
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.55%
||
7 Day CHG~0.00%
Published-11 Jan, 2026 | 08:02
Updated-23 Feb, 2026 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Flycatcher Toys smART Sketcher Bluetooth Low Energy missing authentication

A flaw has been found in Flycatcher Toys smART Sketcher up to 2.0. This affects an unknown part of the component Bluetooth Low Energy Interface. This manipulation causes missing authentication. The attack can only be done within the local network. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Flycatcher Toys
Product-smART Sketcher
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-62235
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-8.1||HIGH
EPSS-0.06% / 17.40%
||
7 Day CHG~0.00%
Published-10 Jan, 2026 | 09:42
Updated-14 Jan, 2026 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Mynewt NimBLE: Incorrect handling of SMP Security Request could lead to undesirable pairing

Authentication Bypass by Spoofing vulnerability in Apache NimBLE. Receiving specially crafted Security Request could lead to removal of original bond and re-bond with impostor. This issue affects Apache NimBLE: through 1.8.0. Users are recommended to upgrade to version 1.9.0, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-nimbleApache Mynewt NimBLE
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2026-22603
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 11.83%
||
7 Day CHG~0.00%
Published-10 Jan, 2026 | 01:06
Updated-14 Jan, 2026 | 22:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenProject has no protection against brute-force attacks in the Change Password function

OpenProject is an open-source, web-based project management software. Prior to version 16.6.2, OpenProject’s unauthenticated password-change endpoint (/account/change_password) was not protected by the same brute-force safeguards that apply to the normal login form. In affected versions, an attacker who can guess or enumerate user IDs can send unlimited password-change requests for a given account without triggering lockout or other rate-limiting controls. This allows automated password-guessing (e.g., with wordlists of common passwords) against valid accounts. Successful guessing results in full account compromise for the targeted user and, depending on that user’s role, can lead to further privilege escalation inside the application. This issue has been patched in version 16.6.2. Those who are unable to upgrade may apply the patch manually.

Action-Not Available
Vendor-openprojectopf
Product-openprojectopenproject
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
CVE-2025-69425
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-10||CRITICAL
EPSS-0.04% / 13.15%
||
7 Day CHG~0.00%
Published-09 Jan, 2026 | 16:14
Updated-13 Jan, 2026 | 14:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ruckus vRIoT IoT Controller < 3.0.0.0 Hardcoded Tokens RCE

The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a command execution service on TCP port 2004 running with root privileges. Authentication to this service relies on a hardcoded Time-based One-Time Password (TOTP) secret and an embedded static token. An attacker who extracts these credentials from the appliance or a compromised device can generate valid authentication tokens and execute arbitrary OS commands with root privileges, resulting in complete system compromise.

Action-Not Available
Vendor-RUCKUS Networks
Product-vRIoT IoT Controller
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-66049
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-8.7||HIGH
EPSS-0.05% / 16.93%
||
7 Day CHG~0.00%
Published-09 Jan, 2026 | 11:53
Updated-14 Jan, 2026 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unprotected RTSP stream in Vivotek IP7137 cameras

Vivotek IP7137 camera with firmware version 0200a is vulnerable to an information disclosure issue where live camera footage can be accessed through the RTSP protocol on port 8554 without requiring authentication. This allows unauthorized users with network access to view the camera's feed, potentially compromising user privacy and security.  The vendor has not replied to the CNA. Possibly all firmware versions are affected. Since the product has met End-Of-Life phase, a fix is not expected to be released.

Action-Not Available
Vendor-vivotekVivotek
Product-ip7137_firmwareip7137IP7137
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-60538
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 8.56%
||
7 Day CHG~0.00%
Published-09 Jan, 2026 | 00:00
Updated-22 Jan, 2026 | 21:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A lack of rate limiting in the login page of shiori v1.7.4 and below allows attackers to bypass authentication via a brute force attack.

Action-Not Available
Vendor-go-shiorin/a
Product-shiorin/a
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2025-69258
Assigner-Trend Micro, Inc.
ShareView Details
Assigner-Trend Micro, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.60% / 69.35%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 12:50
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations.

Action-Not Available
Vendor-Trend Micro IncorporatedMicrosoft Corporation
Product-apex_centralwindowsTrend Micro Apex Central
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-290
Authentication Bypass by Spoofing
CWE ID-CWE-346
Origin Validation Error
CVE-2025-66001
Assigner-SUSE
ShareView Details
Assigner-SUSE
CVSS Score-8.8||HIGH
EPSS-0.03% / 7.31%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 10:23
Updated-08 Jan, 2026 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NeuVector OpenID Connect is vulnerable to man-in-the-middle (MITM)

NeuVector supports login authentication through OpenID Connect. However, the TLS verification (which verifies the remote server's authenticity and integrity) for OpenID Connect is not enforced by default. As a result this may expose the system to man-in-the-middle (MITM) attacks.

Action-Not Available
Vendor-SUSE
Product-neuvector
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-14819
Assigner-curl
ShareView Details
Assigner-curl
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.69%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 10:07
Updated-20 Jan, 2026 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenSSL partial chain store policy bypass

When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. This could make libcurl find and accept a trust chain that it otherwise would not.

Action-Not Available
Vendor-CURL
Product-curlcurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-13034
Assigner-curl
ShareView Details
Assigner-curl
CVSS Score-5.9||MEDIUM
EPSS-0.01% / 0.63%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 10:00
Updated-20 Jan, 2026 | 14:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
No QUIC certificate pinning with GnuTLS

When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. This check was skipped in a certain condition that would then make curl allow the connection without performing the proper check, thus not noticing a possible impostor. To skip this check, the connection had to be done with QUIC with ngtcp2 built to use GnuTLS and the user had to explicitly disable the standard certificate verification.

Action-Not Available
Vendor-CURL
Product-curlcurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2026-21894
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.02% / 5.34%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 09:56
Updated-20 Jan, 2026 | 15:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
n8n's Missing Stripe-Signature Verification Allows Unauthenticated Forged Webhooks

n8n is an open source workflow automation platform. In versions from 0.150.0 to before 2.2.2, an authentication bypass vulnerability in the Stripe Trigger node allows unauthenticated parties to trigger workflows by sending forged Stripe webhook events. The Stripe Trigger creates and stores a Stripe webhook signing secret when registering the webhook endpoint, but incoming webhook requests were not verified against this secret. As a result, any HTTP client that knows the webhook URL could send a POST request containing a matching event type, causing the workflow to execute as if a legitimate Stripe event had been received. This issue affects n8n users who have active workflows using the Stripe Trigger node. An attacker could potentially fake payment or subscription events and influence downstream workflow behavior. The practical risk is reduced by the fact that the webhook URL contains a high-entropy UUID; however, authenticated n8n users with access to the workflow can view this webhook ID. This issue has been patched in version 2.2.2. A temporary workaround for this issue involves users deactivating affected workflows or restricting access to workflows containing Stripe Trigger nodes to trusted users only.

Action-Not Available
Vendor-n8nn8n-io
Product-n8nn8n
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2025-68716
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.01% / 0.69%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 00:00
Updated-02 Feb, 2026 | 16:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled by default on the LAN interface. The root account is configured with no password, and administrators cannot disable SSH or enforce authentication via the CLI or web GUI. This allows any LAN-adjacent attacker to trivially gain root shell access and execute arbitrary commands with full privileges.

Action-Not Available
Vendor-kaysusn/a
Product-ks-wr3600_firmwareks-wr3600n/a
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-521
Weak Password Requirements
CVE-2025-67090
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.1||MEDIUM
EPSS-0.16% / 37.34%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 00:00
Updated-16 Jan, 2026 | 21:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. Fix available in version 4.8.2 GL.Inet AX1800 Version 4.6.4 & 4.6.8 lacks rate limiting or account lockout mechanisms on the authentication endpoint (`/cgi-bin/luci`). An unauthenticated attacker on the local network can perform unlimited password attempts against the admin interface.

Action-Not Available
Vendor-gl-inetn/a
Product-ax1800_firmwareax1800n/a
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
CVE-2025-67091
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 15.10%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 00:00
Updated-16 Jan, 2026 | 21:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6.4 & 4.6.8 in the GL.iNet custom opkg wrapper script located at /usr/libexec/opkg-call. The script is executed with root privileges when triggered via the LuCI web interface or authenticated API calls to manage packages. The vulnerable code uses shell redirection to create a lock file in the world-writable /tmp directory.

Action-Not Available
Vendor-gl-inetn/a
Product-ax1800_firmwareax1800n/a
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
CVE-2025-68715
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.59% / 68.91%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 00:00
Updated-30 Jan, 2026 | 01:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Panda Wireless PWRU0 devices with firmware 2.2.9 that exposes multiple HTTP endpoints (/goform/setWan, /goform/setLan, /goform/wirelessBasic) that do not enforce authentication. A remote unauthenticated attacker can modify WAN, LAN, and wireless settings directly, leading to privilege escalation and denial of service.

Action-Not Available
Vendor-pandawirelessn/a
Product-pwru01_firmwarepwru01n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-65731
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.03% / 8.85%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 00:00
Updated-30 Jan, 2026 | 01:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware version: V6.02CN02) allowing an attacker with physical access to the UART pins to execute arbitrary commands due to presence of root terminal access on a serial interface without proper access control.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-605ldir-605l_firmwaren/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-15346
Assigner-wolfSSL Inc.
ShareView Details
Assigner-wolfSSL Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.07% / 20.36%
||
7 Day CHG~0.00%
Published-07 Jan, 2026 | 23:32
Updated-08 Jan, 2026 | 19:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
wolfSSL Python library `CERT_REQUIRED` mode fails to enforce client certificate requirement

A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced.  Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided.  This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake.  The issue affects versions up to and including 5.8.2.

Action-Not Available
Vendor-wolfSSL
Product-wolfSSL-py
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2017-20213
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-0.17% / 38.54%
||
7 Day CHG~0.00%
Published-07 Jan, 2026 | 23:09
Updated-08 Jan, 2026 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FLIR Thermal Camera F/FC/PT/D Stream 8.0.0.64 Unauthenticated Stream Disclosure

FLIR Thermal Camera F/FC/PT/D Stream firmware version 8.0.0.64 contains an unauthenticated vulnerability that allows remote attackers to access live camera streams without credentials. Attackers can exploit the vulnerability to view unauthorized thermal camera video feeds across multiple camera series without requiring any authentication.

Action-Not Available
Vendor-FLIR Systems, Inc.
Product-FLIR Thermal Camera F/FC/PT/D Stream
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-4676
Assigner-Asea Brown Boveri Ltd. (ABB)
ShareView Details
Assigner-Asea Brown Boveri Ltd. (ABB)
CVSS Score-8.4||HIGH
EPSS-0.01% / 0.71%
||
7 Day CHG~0.00%
Published-07 Jan, 2026 | 17:02
Updated-08 Jan, 2026 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication bypass by brute forcing Authentication Headers

Incorrect Implementation of Authentication Algorithm vulnerability in ABB WebPro SNMP Card PowerValue, ABB WebPro SNMP Card PowerValue UL.This issue affects WebPro SNMP Card PowerValue: through 1.1.8.K; WebPro SNMP Card PowerValue UL: through 1.1.8.K.

Action-Not Available
Vendor-ABB
Product-WebPro SNMP Card PowerValueWebPro SNMP Card PowerValue UL
CWE ID-CWE-303
Incorrect Implementation of Authentication Algorithm
CVE-2025-31963
Assigner-HCL Software
ShareView Details
Assigner-HCL Software
CVSS Score-2.9||LOW
EPSS-0.00% / 0.05%
||
7 Day CHG~0.00%
Published-07 Jan, 2026 | 07:05
Updated-22 Jan, 2026 | 13:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL BigFix IVR is impacted by improper authentication and missing CSRF protection

Improper authentication and missing CSRF protection in the local setup interface component in HCL BigFix IVR version 4.2 allows a local attacker to perform unauthorized configuration changes via unauthenticated administrative configuration requests.

Action-Not Available
Vendor-HCLSoftwareHCL Technologies Ltd.
Product-bigfix_insights_for_vulnerability_remediationBigFix IVR
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2026-0650
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.13% / 32.92%
||
7 Day CHG~0.00%
Published-07 Jan, 2026 | 04:29
Updated-08 Jan, 2026 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenFlagr <= 1.1.18 Authentication Bypass via Prefix Whitelist Path Normalization

OpenFlagr versions prior to and including 1.1.18 contain an authentication bypass vulnerability in the HTTP middleware. Due to improper handling of path normalization in the whitelist logic, crafted requests can bypass authentication and access protected API endpoints without valid credentials. Unauthorized access may allow modification of feature flags and export of sensitive data.

Action-Not Available
Vendor-OpenFlagr
Product-Flagr
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2025-69197
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 2.13%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 00:44
Updated-12 Jan, 2026 | 21:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pterodactyl TOTPs can be reused during validity window

Pterodactyl is a free, open-source game server management panel. Versions 1.11.11 and below allow TOTP to be used multiple times during its validity window. Users with 2FA enabled are prompted to enter a token during sign-in, and afterward it is not sufficiently marked as used in the system. This allows an attacker who intercepts that token to use it in addition to a known username/password during the 60-second token validity window. The attacker must have intercepted a valid 2FA token (for example, during a screen share). This issue is fixed in version 1.12.0.

Action-Not Available
Vendor-Pterodactyl
Product-panelpanel
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-294
Authentication Bypass by Capture-replay
CVE-2026-0625
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.67% / 71.09%
||
7 Day CHG~0.00%
Published-05 Jan, 2026 | 21:14
Updated-20 Jan, 2026 | 17:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DSL/DIR/DNS Command Injection via DNS Configuration Endpoint

Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality. By directly requesting this endpoint, an attacker can modify the device’s DNS settings without valid credentials, enabling DNS hijacking (“DNSChanger”) attacks that redirect user traffic to attacker-controlled infrastructure. In 2019, D-Link reported that this behavior was leveraged by the "GhostDNS" malware ecosystem targeting consumer and carrier routers. All impacted products were subsequently designated end-of-life/end-of-service, and no longer receive security updates. Exploitation evidence was observed by the Shadowserver Foundation on 2025-11-27 (UTC).

Action-Not Available
Vendor-D-Link Corporation
Product-DNS-345DIR-608DIR-610DSL-500DNS-320DNS-325DIR-600DSL-502GDSL-500GDSL-2640BDSL-526BDSL-2740RDSL-2780BDIR-905LDIR-611DSL-2640TDIR-615
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-14346
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.10% / 26.52%
||
7 Day CHG~0.00%
Published-05 Jan, 2026 | 15:39
Updated-08 Jan, 2026 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within range can pair with the device and issue movement commands, override speed restrictions, and manipulate configuration profiles without any credentials or user interaction.

Action-Not Available
Vendor-WHILL
Product-Model C2 Electric WheelchairModel F Power Chair
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-15026
Assigner-Centreon
ShareView Details
Assigner-Centreon
CVSS Score-9.8||CRITICAL
EPSS-0.03% / 9.33%
||
7 Day CHG+0.01%
Published-05 Jan, 2026 | 14:31
Updated-26 Jan, 2026 | 15:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated configuration import allows administrative account creation using AWIE component

Missing Authentication for Critical Function vulnerability in Centreon Infra Monitoring centreon-awie (Awie import module) allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.3, from 24.04.0 before 24.04.3.

Action-Not Available
Vendor-CENTREON
Product-awieInfra Monitoring
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-3646
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-6.9||MEDIUM
EPSS-0.05% / 15.04%
||
7 Day CHG~0.00%
Published-03 Jan, 2026 | 23:33
Updated-03 Feb, 2026 | 17:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Petlibro Smart Pet Feeder Platform through 1.7.31 Authorization Bypass via Device Share API

Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an authorization bypass vulnerability that allows unauthorized users to add users as shared owners to any device by exploiting missing permission checks. Attackers can send requests to the device share API to gain unauthorized access to devices and view owner information without proper authorization validation.

Action-Not Available
Vendor-petlibroPetlibrio
Product-petlibroSmart Pet Feeder Platform
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-64119
Assigner-Dragos, Inc.
ShareView Details
Assigner-Dragos, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.08% / 22.72%
||
7 Day CHG~0.00%
Published-02 Jan, 2026 | 21:26
Updated-08 Jan, 2026 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nuvation Energy BMS Client-side Authentication

A vulnerability in Nuvation Battery Management System allows Authentication Bypass.This issue affects Battery Management System: through 2.3.9.

Action-Not Available
Vendor-Nuvation Energy
Product-Battery Management System
CWE ID-CWE-603
Use of Client-Side Authentication
CVE-2026-21446
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.13% / 32.61%
||
7 Day CHG~0.00%
Published-02 Jan, 2026 | 19:18
Updated-08 Jan, 2026 | 21:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bagisto Missing Authentication on Installer API Endpoints

Bagisto is an open source laravel eCommerce platform. In versions on the 2.3 branch prior to 2.3.10, API routes remain active even after initial installation is complete. The underlying API endpoints (`/install/api/*`) are directly accessible and exploitable without any authentication. An attacker can bypass the Ib installer entirely by calling the API endpoints directly. This allows any unauthenticated attacker to create admin accounts, modify application configurations, and potentially overwrite existing data. Version 2.3.10 fixes the issue.

Action-Not Available
Vendor-bagistoWebkul Software Pvt. Ltd.
Product-bagistobagisto
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2026-21445
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.07% / 20.99%
||
7 Day CHG~0.00%
Published-02 Jan, 2026 | 19:11
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Langflow Missing Authentication on Critical API Endpoints

Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.0.dev45, multiple critical API endpoints in Langflow are missing authentication controls. The issue allows any unauthenticated user to access sensitive user conversation data, transaction histories, and perform destructive operations including message deletion. This affects endpoints handling personal data and system operations that should require proper authorization. Version 1.7.0.dev45 contains a patch.

Action-Not Available
Vendor-langflowlangflow-ai
Product-langflowlangflow
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-69203
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.02% / 5.42%
||
7 Day CHG~0.00%
Published-01 Jan, 2026 | 18:37
Updated-06 Jan, 2026 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Signal K Server Vulnerable to Access Request Spoofing

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 of the access request system have two related features that when combined by themselves and with an information disclosure vulnerability enable convincing social engineering attacks against administrators. When a device creates an access request, it specifies three fields: `clientId`, `description`, and `permissions`. The SignalK admin UI displays the `description` field prominently to the administrator when showing pending requests, but the actual `permissions` field (which determines the access level granted) is less visible or displayed separately. This allows an attacker to request `admin` permissions while providing a description that suggests readonly access. The access request handler trusts the `X-Forwarded-For` HTTP header without validation to determine the client's IP address. This header is intended to preserve the original client IP when requests pass through reverse proxies, but when trusted unconditionally, it allows attackers to spoof their IP address. The spoofed IP is displayed to administrators in the access request approval interface, potentially making malicious requests appear to originate from trusted internal network addresses. Since device/source names can be enumerated via the information disclosure vulnerability, an attacker can impersonate a legitimate device or source, craft a convincing description, spoof a trusted internal IP address, and request elevated permissions, creating a highly convincing social engineering scenario that increases the likelihood of administrator approval. Users should upgrade to version 2.19.0 to fix this issue.

Action-Not Available
Vendor-signalkSignalK
Product-signal_k_serversignalk-server
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2025-69412
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-3.4||LOW
EPSS-0.01% / 0.58%
||
7 Day CHG~0.00%
Published-31 Dec, 2025 | 23:20
Updated-02 Jan, 2026 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

KDE messagelib before 25.11.90 ignores SSL errors for threatMatches:find in the Google Safe Browsing Lookup API (aka phishing API), which might allow spoofing of threat data. NOTE: this Lookup API is not contacted in the messagelib default configuration.

Action-Not Available
Vendor-KDE
Product-messagelib
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-36904
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.12% / 31.03%
||
7 Day CHG~0.00%
Published-31 Dec, 2025 | 18:39
Updated-02 Jan, 2026 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Selea CarPlateServer 4.0.1.6 Remote Program Execution via Configuration Endpoint

Selea CarPlateServer 4.0.1.6 contains a remote program execution vulnerability that allows attackers to execute arbitrary Windows binaries by manipulating the NO_LIST_EXE_PATH configuration parameter. Attackers can bypass authentication through the /cps/ endpoint and modify server configuration, including changing admin passwords and executing system commands.

Action-Not Available
Vendor-Selea
Product-Selea CarPlateServer (CPS)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-58336
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-0.14% / 34.75%
||
7 Day CHG~0.00%
Published-30 Dec, 2025 | 22:41
Updated-16 Jan, 2026 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Akuvox Smart Intercom S539 Unauthenticated Video Stream Disclosure

Akuvox Smart Intercom S539 contains an unauthenticated vulnerability that allows remote attackers to access live video streams by requesting the video.cgi endpoint on port 8080. Attackers can retrieve video stream data without authentication by directly accessing the specified endpoint on affected Akuvox doorphone and intercom devices.

Action-Not Available
Vendor-The Akuvox CompanyAkuvox (SMART-PLUS PTE. LTD.)
Product-r20a-2x915s539s532_firmwarer20k-2r29ns-2c313w-2x915_firmwares539_firmwarenx-2_firmwarenc-2_firmwarenx-2x916x912nc-2x916_firmwarens-2_firmwarex912_firmwarec313w-2_firmwares532r20a-2_firmwarer20k-2_firmwarer29_firmwareAkuvox Smart IntercomAkuvox Smart Doorphone
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-50790
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-6.9||MEDIUM
EPSS-0.34% / 56.25%
||
7 Day CHG~0.00%
Published-30 Dec, 2025 | 22:41
Updated-16 Jan, 2026 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Unauthenticated Radio Stream Disclosure

SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain an unauthenticated vulnerability that allows remote attackers to access live radio stream information through webplay or ffmpeg scripts. Attackers can exploit the vulnerability by calling specific web scripts to disclose radio stream details without requiring authentication.

Action-Not Available
Vendor-sound4SOUND4 Ltd.Kantar Media
Product-pulsebig_voice4_firmwarefirstpulse_firmwarewm2pulse_eco_firmwareimpact_ecoimpact_eco_firmwarebig_voice4stream_extensionwm2_firmwarefirst_firmwareimpactbig_voice2impact_firmwarepulse_ecobig_voice2_firmwareBigVoice4WM2StreamImpact/Pulse/FirstBigVoice2Impact/Pulse Eco
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-13915
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.14% / 34.66%
||
7 Day CHG-0.09%
Published-26 Dec, 2025 | 13:16
Updated-26 Feb, 2026 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication bypass in IBM API Connect

IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application.

Action-Not Available
Vendor-IBM Corporation
Product-api_connectAPI Connect
CWE ID-CWE-305
Authentication Bypass by Primary Weakness
CVE-2025-52598
Assigner-Hanwha Vision Co., Ltd.
ShareView Details
Assigner-Hanwha Vision Co., Ltd.
CVSS Score-6.3||MEDIUM
EPSS-0.01% / 1.81%
||
7 Day CHG~0.00%
Published-26 Dec, 2025 | 04:07
Updated-16 Jan, 2026 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient certificate validation

Cybersecurity Nozomi Networks Labs, a specialized security company focused on Industrial Control Systems (ICS) and OT/IoT security, has found a flaw that camera's client service does not perform certificate validation. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.

Action-Not Available
Vendor-hanwhavisionHanwha Vision Co., Ltd.
Product-pnm-9080vqxnv-8030rxnv-c6083_firmwarepnm-9321vqp_firmwarepnm-9084qzkno-5080rn_firmwarexnd-8081rfxnv-6083z_firmwarexnv-6080rspnm-9084qz1_firmwarexnd-6020r_firmwarepnm-9085rqz1_firmwarexnd-8083rvxxno-9082rzxnd-8080rv_firmwarexnd-6081f_firmwareknb-5000nxnd-8081vzxnv-8083rz_firmwarexnv-6120rxnd-9083rv_firmwareqnp-6250r_firmwaretnb-6030xnb-6002xno-9082rz_firmwarexnd-8080r_firmwarexnf-8010rvxnf-8010rvm_firmwarexnv-c8083rxnz-6320_firmwarexnv-6120rsxnv-8080rsxnd-6081v_firmwarexnd-8093rv_firmwarexnd-8030rxnv-l6080_firmwarexnv-l6080aqnv-c8011rxnz-l6320_firmwareqnf-c9010vxnd-8081rv_firmwareknp-2320rh_firmwarexno-6080rxnp-6341rh_firmwarexnd-8080rwxno-6080rs_firmwarexnp-6371rh_firmwarexnp-8250rxnd-l6080rvxnv-6022rm_firmwarexnd-6010tnv-c7013rc_firmwareqno-c8023r_firmwarexnp-6371rhxnp-6040h_firmwarexnp-c7310rxnd-6080rxno-6080r_firmwarexnd-8081rf_firmwarexnd-8081fzxnv-8080rxnv-8030r_firmwarexnd-8020fpnm-9000vqxnf-8010rvmxnv-8081z_firmwarexno-l6120r_firmwarexnd-8040r_firmwarexnd-8080rvxnp-6320hsxnv-8083rpnm-9322vqpxnv-8080rwxnf-9010rvm_firmwareqnp-6250_firmwarexnv-l6080raxnv-8081zqnv-c8012xnv-6013m_firmwarexnd-8020f_firmwarexnd-6081revxnp-6550rh_firmwarexnd-c6083rv_firmwarexnd-6080rv_firmwarexnv-6081rxno-c6083r_firmwarepnm-9000vd_firmwarexnd-c6083rvxno-8080rw_firmwarexnd-6085_firmwarexnd-6081vqnv-c8011r_firmwaretnb-6030_firmwarexnp-6320rh_firmwarepnm-9000vdxnv-6012_firmwarexnd-6081fz_firmwarexnp-9300rw_firmwarexnf-9010rvxnf-8010rxnd-6080v_firmwarexnf-8010rvmnb_firmwarexnv-6083ztnv-c8011rw_firmwareqnp-6320_firmwarexnv-6120rs_firmwarexno-8030rxnp-6400xnp-6321hxnb-6000xnd-8083rv_firmwarexnd-l6080rvaxnz-6320xnd-9082rfqnv-c8023rxno-l6120rxnd-6011f_firmwarexnd-k6080n_firmwarexnd-6080vxnd-6081rev_firmwarexno-c9083rpnm-9000vq_firmwarexnv-9083r_firmwarexnp-9250_firmwarexnv-6013mxnd-6020rxnv-8020rmn_firmwarexnv-6010_firmwarexnp-c8253rqnf-c9010_firmwarexnv-8083r_firmwarexnv-9083rzxnv-8080rw_firmwarepnm-9084rqz_firmwarepnm-7000vd_firmwarepnm-9084rqz1xnd-8020r_firmwarexnv-8081rekno-2120rnxnv-8083zpnm-9002vq_firmwarexnp-8300rwxnv-6080rxnv-l6080a_firmwarepnm-7002vd_firmwarepnm-9084qz1pnm-7000vdxno-6123rxnd-9083rvxnd-8082rfxnd-6081fzpnm-9084rqzxnp-c6403rxnv-l6080rxnb-6003_firmwareqnp-6320rxnp-9300rwxnp-6040hqnv-c6083rxno-8030r_firmwarexnd-6083rv_firmwarepnm-9080vq_firmwareqnv-c8083r_firmwareqnp-6320r_firmwarexno-6120r_firmwarexnd-8030r_firmwarexnv-6010xnp-6321xnv-c9083rxno-6083rtnv-c8034rm_firmwarexnp-6320rhqnv-c9011r_firmwareknd-2020rnxnb-8003_firmwareqno-c6083r_firmwarexnv-c7083r_firmwarexnd-6080knp-2550rha_firmwarepnm-9320vqpxno-8020rknp-2550rhaxnv-6085_firmwarexnv-6080rs_firmwarexnv-6080rwxno-6120rsxnv-6080rsa_firmwarexnd-c9083rv_firmwarexnp-c6403rwxnb-8002knd-5020rn_firmwarexnv-8083rvx_firmwarexnd-6081rvxno-c8083r_firmwarexnd-6080rwxnv-8080rsaxnv-9082r_firmwarexnp-6400rw_firmwarexno-6120_firmwarexno-l6080raxno-l6080rpnm-9085rqz1xnv-6080rw_firmwarexnv-8020rxno-6010rpnm-9002vqxnp-c8253r_firmwarexno-c7083rxnv-8020rmpxno-9083r_firmwarexnv-8081rknd-2080rn_firmwareknp-2120hnqnv-c8083rpnm-9320vqp_firmwarexno-8080r_firmwarexno-6123r_firmwaretnv-7010rc_firmwarexnf-8010rwxnv-6123r_firmwarexnd-8082rv_firmwareknd-5080rn_firmwarexnb-6003xnd-c8083rvxnv-l6080r_firmwarexno-c7083r_firmwareknp-2320rha_firmwarexnp-6550rhxnv-8082rxno-c9083r_firmwareqnp-6320h_firmwarexnf-9010rsxnp-6400rxnp-6320hxnd-8082rf_firmwarexnv-l6080xnp-c9253pnm-9322vqp_firmwaretnv-c7013rcxnd-8083rvxnd-9082rv_firmwarexnd-6081rf_firmwarexnv-6081xnv-8083rx_firmwarexnd-l6080vaxnp-8250r_firmwarexnd-l6080rv_firmwarexno-8083r_firmwarexnf-9013rv_firmwarexnd-6081rfxnv-6085xnz-6320a_firmwarexnb-9002_firmwarexnb-8003xnd-8040rxnf-8010rv_firmwarexnp-8300rw_firmwareqno-c8083rknd-2010_firmwareqnv-c6083r_firmwarekno-5020rn_firmwarexnp-6400r_firmwarexnd-6081vzqnd-c8013rxnv-6011xnd-c7083rv_firmwareqnp-6230qnf-8010_firmwarexnp-c8303rw_firmwarekno-2080rn_firmwarepnm-9321vqpxno-8082rxnv-8083rxqne-c9013rl_firmwarexnd-l6020rxnd-c9083rvqnp-6320hxnv-6022rxnv-8080rs_firmwareknb-2000_firmwarexnp-6320hs_firmwareqno-c8013rxnd-8093rvqnv-c8023r_firmwarexno-6080rspnm-9084rqz1_firmwarexnp-c6403_firmwarexnv-6120r_firmwareqnd-c8023rxnp-6120hxnd-c7083rvxnd-k6080nxnp-c9303rwxnv-6081z_firmwareknd-2020rn_firmwarexnd-6085xnb-8000xnb-9003_firmwarexnp-c9303rw_firmwarexnp-c8303rwknd-2080rnxnv-c8083r_firmwareknb-5000n_firmwarexnp-6321_firmwareqnp-6250rxnd-c8083rv_firmwarexnv-6081_firmwarexnp-6250rhxnb-6001qnf-8010knp-2320rhaxno-6120rs_firmwarexnv-8081r_firmwarexno-c8083rxno-6020r_firmwarexnp-6320xno-6010r_firmwareqno-c8023rxnv-c7083rxno-6020rxno-8040rxnb-8000_firmwarexnp-8250xnd-8082rvxnv-8081re_firmwarexnf-8010rvw_firmwarexnb-6002_firmwarexnv-c6083rqnv-c8013rxnd-9082rvxnz-6320axnv-6012m_firmwarexnd-6085v_firmwarexnv-6083rz_firmwarexno-6085r_firmwarexnd-6011fxno-8080rxno-c6083rkno-2080rnxno-l6020r_firmwarexno-l6080r_firmwarexnv-6120xnd-6083rvxnf-8010r_firmwarexnf-8010rvwxnb-9002xnz-l6320axnz-l6320a_firmwarepnm-9085rqz_firmwarexnd-8081vz_firmwarexnp-9250rknb-2000tnv-c8014rmxnv-6022r_firmwareqno-c8013r_firmwaretnv-c8011rwxnf-8010rvmnbxnf-9013rvxnp-c9253_firmwareqnp-6250hxnp-6320h_firmwaretnv-c8034rmxnv-6083rxnv-6120_firmwarexnb-9003xnd-6081rv_firmwarexnd-8020rw_firmwareqnv-c9083r_firmwarexnv-6081zxnd-6080rw_firmwarekno-5020rnxnv-6123rtnv-c8014rm_firmwarexnv-6011wxnb-6005_firmwarexnz-l6320xnp-c8253xnd-6080r_firmwareknd-5080rnqnd-c8013r_firmwareqnd-c8023r_firmwarexnv-c9083r_firmwarexnd-6010_firmwarexno-6085rxnv-6083r_firmwarexnv-8083rvxqnp-6230hxnv-c6083qnp-6250xnv-9083rz_firmwarexnv-6081r_firmwarexnv-6011_firmwarekno-2010rnxnv-8082r_firmwareknp-2120hn_firmwarexnb-6001_firmwarexnv-l6080ra_firmwarexno-6083r_firmwarexnp-6120h_firmwarexnd-8020rxnd-8081rvxnd-8081fz_firmwarexnv-6020r_firmwarexno-8082r_firmwarexnp-c8253_firmwarexnd-l6080rva_firmwareqno-c6083rxnd-8020rwqnp-6250h_firmwarexnp-9250qnv-c8013r_firmwarekno-5080rnxnp-c9253rxno-9083rqne-c8013rl_firmwarexnd-6080rvxnv-8083rzknd-5020rnpnm-7002vdxnp-6400rwxno-8020r_firmwarexnv-8093r_firmwarexnv-8020r_firmwarexnf-9010rvmqne-c9013rlxnp-c9310rxnd-l6080rxnp-c6403r_firmwarexnv-6080xnd-8081rev_firmwareqnp-6320xnp-c9253r_firmwareqnv-c8012_firmwarexno-8083rxnd-l6080vxnv-8020rmnxnf-8010rw_firmwarexnp-6320_firmwarexnv-8093rxnv-6080_firmwarexnv-6011w_firmwarexnv-8040r_firmwarexnv-6080rsaxno-l6020rxno-8080rwxnv-6022rmxnd-l6080v_firmwareqnf-c9010v_firmwarepnm-9084qz_firmwareqnv-c9083rxnv-6020rxno-l6080ra_firmwarexnp-6341rhxnv-8080r_firmwarexnv-8080rsa_firmwarepnm-9081vqxnp-c6403rw_firmwarexnp-c7310r_firmwarexnd-8083rvx_firmwarexnp-6400_firmwareqne-c8013rlxno-8040r_firmwarexnd-8081revxnb-6000_firmwarexnb-6005xnv-c6083r_firmwarekno-2120rn_firmwarexnd-8080rxnd-l6020r_firmwarexnp-9250r_firmwareknp-2320rhxnv-8020rmp_firmwarexnd-6081vz_firmwarexnv-8040rxnp-6250rh_firmwareqno-c9083r_firmwaretnv-7010rcxnv-6012xnd-8080rw_firmwarexnv-9083rknd-2010qnf-c9010xnf-9010rv_firmwarexnd-l6080va_firmwarexnv-8083z_firmwarexnv-6080r_firmwarexnp-c6403qnp-6230_firmwarexnd-9082rf_firmwarexnv-9082rpnm-9081vq_firmwarexnp-8250_firmwarexnb-8002_firmwareqno-c9083rqnv-c9011rxnv-6083rzxnp-c9310r_firmwareqno-c8083r_firmwarexnd-6080_firmwareqnp-6230h_firmwarexnf-9010rs_firmwarexnd-6081fxnv-6081rexno-6120xnv-6012mxno-6120rxnp-6321h_firmwarexnd-l6080r_firmwarexnd-6085vxnv-6081re_firmwarepnm-9085rqzkno-2010rn_firmwareQNV-C8012
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-66377
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 10.21%
||
7 Day CHG~0.00%
Published-25 Dec, 2025 | 00:00
Updated-05 Jan, 2026 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pexip Infinity before 39.0 has Missing Authentication for a Critical Function in a product-internal API, allowing an attacker (who already has access to execute code on one node within a Pexip Infinity installation) to impact the operation of other nodes within the installation.

Action-Not Available
Vendor-pexipPexip
Product-pexip_infinityInfinity
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-3232
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.7||HIGH
EPSS-0.07% / 21.58%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 19:55
Updated-29 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mitsubishi Electric Europe smartRTU Missing Authentication for Critical Function

A remote unauthenticated attacker may be able to bypass authentication by utilizing a specific API route to execute arbitrary OS commands.

Action-Not Available
Vendor-Mitsubishi Electric Europe
Product-smartRTU
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-25248
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-0.16% / 36.46%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 19:28
Updated-29 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Beward N100 M2.1.6 Unauthenticated RTSP Video Stream Disclosure

Beward N100 M2.1.6.04C014 contains an unauthenticated vulnerability that allows remote attackers to access live video streams without credentials. Attackers can directly retrieve the camera's RTSP stream by exploiting the lack of authentication in the video access mechanism.

Action-Not Available
Vendor-Beward
Product-N100 H.264 VGA IP Camera
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-25240
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-0.10% / 28.69%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 19:27
Updated-29 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rifatron 5brid DVR 5brid DVR (HD6-532/516, DX6-516/508/504, MX6-516/508/504, EH6-504) Unauthenticated Live Stream Disclosure via animate.cgi

Rifatron 5brid DVR contains an unauthenticated vulnerability in the animate.cgi script that allows unauthorized access to live video streams. Attackers can exploit the Mobile Web Viewer module by specifying channel numbers to retrieve sequential video snapshots without authentication.

Action-Not Available
Vendor-Rifatron Co., Ltd.
Product-DVR
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-25236
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-0.11% / 30.33%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 19:27
Updated-29 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iSeeQ Hybrid DVR WH-H4 1.03R Unauthenticated Live Stream Disclosure

iSeeQ Hybrid DVR WH-H4 1.03R contains an unauthenticated vulnerability in the get_jpeg script that allows unauthorized access to live video streams. Attackers can retrieve video snapshots from specific camera channels by sending requests to the /cgi-bin/get_jpeg endpoint without authentication.

Action-Not Available
Vendor-iSeeQ
Product-Hybrid DVR WH-H4
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2018-25141
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-0.16% / 36.46%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 19:27
Updated-29 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FLIR Thermal Traffic Cameras V1.01-0bb5b27 Unauthenticated RTSP Stream Disclosure

FLIR thermal traffic cameras contain an unauthenticated vulnerability that allows remote attackers to access live video streams without credentials. Attackers can directly retrieve video streams by accessing specific endpoints like /live.mjpeg, /snapshot.jpg, and RTSP streaming URLs without authentication.

Action-Not Available
Vendor-FLIR
Product-FLIR Thermal Traffic Cameras
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2018-25140
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.11% / 29.65%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 19:27
Updated-29 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FLIR Thermal Traffic Cameras V1.01-0bb5b27 Unauthenticated Websocket Device Manipulation

FLIR thermal traffic cameras contain an unauthenticated device manipulation vulnerability in their WebSocket implementation that allows attackers to bypass authentication and authorization controls. Attackers can directly modify device configurations, access system information, and potentially initiate denial of service by sending crafted WebSocket messages without authentication.

Action-Not Available
Vendor-FLIR Systems, Inc.
Product-Thermal Traffic Cameras
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2018-25139
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-0.18% / 39.76%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 19:27
Updated-31 Dec, 2025 | 18:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FLIR AX8 Thermal Camera 1.32.16 Unauthenticated RTSP Stream Disclosure

FLIR AX8 Thermal Camera 1.32.16 contains an unauthenticated vulnerability that allows remote attackers to access live video streams without credentials. Attackers can directly connect to the RTSP stream using tools like VLC or FFmpeg to view and record thermal camera footage.

Action-Not Available
Vendor-flirFLIR Systems, Inc.
Product-flir_ax8_firmwareflir_ax8FLIR AX8 Thermal Camera
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2018-25137
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-0.10% / 26.51%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 19:27
Updated-29 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FLIR Brickstream 3D+ 2.1.742.1842 Unauthenticated Config File Disclosure

FLIR Brickstream 3D+ 2.1.742.1842 contains an unauthenticated vulnerability in the ExportConfig REST API that allows attackers to download sensitive configuration files. Attackers can exploit the getConfigExportFile.cgi endpoint to retrieve system configurations, potentially enabling authentication bypass and privilege escalation.

Action-Not Available
Vendor-FLIR Systems, Inc.
Product-FLIR Brickstream 3D+
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2018-25136
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-0.06% / 18.17%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 19:27
Updated-29 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FLIR Brickstream 3D+ 2.1.742.1842 Unauthenticated RTSP Stream Disclosure

FLIR Brickstream 3D+ 2.1.742.1842 contains an unauthenticated vulnerability that allows remote attackers to access live video streams without credentials. Attackers can retrieve video stream images by directly accessing multiple image endpoints like middleImage.jpg, rightimage.jpg, and leftimage.jpg.

Action-Not Available
Vendor-FLIR Systems, Inc.
Product-Brickstream 3D+
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2018-25134
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.33% / 55.66%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 19:27
Updated-29 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Synaccess netBooter NP-02x/NP-08x 6.8 Authentication Bypass via webNewAcct.cgi

Synaccess netBooter NP-02x/NP-08x 6.8 contains an authentication bypass vulnerability in the webNewAcct.cgi script that allows unauthenticated attackers to create admin user accounts. Attackers can exploit the missing control check by sending crafted POST requests to create administrative accounts and gain unauthorized control over power supply management.

Action-Not Available
Vendor-Synaccess Networks Inc.
Product-netBooter NP-02x/NP-08x
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-66445
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.04% / 10.61%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 04:52
Updated-29 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authorization bypass vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer

Authorization bypass vulnerability in Hitachi Infrastructure Analytics Advisor (Data Center Analytics component) and Hitachi Ops Center Analyzer (Hitachi Ops Center Analyzer detail view component).This issue affects Hitachi Infrastructure Analytics Advisor:; Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.5-00.

Action-Not Available
Vendor-Hitachi, Ltd.
Product-Hitachi Infrastructure Analytics AdvisorHitachi Ops Center Analyzer
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-53964
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.8||HIGH
EPSS-1.04% / 77.22%
||
7 Day CHG+0.06%
Published-22 Dec, 2025 | 21:37
Updated-16 Jan, 2026 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SOUND4 IMPACT/FIRST/PULSE/Eco v2.x Unauthenticated Factory Reset Vulnerability

SOUND4 IMPACT/FIRST/PULSE/Eco v2.x contains an unauthenticated vulnerability in the /usr/cgi-bin/restorefactory.cgi endpoint that allows remote attackers to reset device configuration. Attackers can send a POST request to the endpoint with specific data to trigger a factory reset and bypass authentication, gaining full system control.

Action-Not Available
Vendor-sound4SOUND4 Ltd.Kantar Media
Product-pulsebig_voice4_firmwarefirstpulse_firmwarewm2pulse_eco_firmwareimpact_ecoimpact_eco_firmwarebig_voice4stream_extensionwm2_firmwarefirst_firmwareimpactbig_voice2impact_firmwarepulse_ecobig_voice2_firmwareBigVoice4WM2StreamImpact/Pulse/FirstBigVoice2Impact/Pulse Eco
CWE ID-CWE-306
Missing Authentication for Critical Function
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 94
  • 95
  • Next