Newest CVEs

IDDescriptionSeverity
CVE-2025-4343A vulnerability has been found in D-Link DIR-600L up to 2.07B01 and classified as critical. This vulnerability affects the function formEasySetupWizard. The manipulation of the argument host leads to buffer overflow. The attack can be initiated remotely. This vulnerability only affects products that are no longer supported by the maintainer.
high
CVE-2025-4342A vulnerability, which was classified as critical, has been found in D-Link DIR-600L up to 2.07B01. Affected by this issue is the function formEasySetupWizard3. The manipulation of the argument host leads to buffer overflow. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.
high
CVE-2025-4341A vulnerability classified as critical was found in D-Link DIR-880L up to 104WWb01. Affected by this vulnerability is the function sub_16570 of the file /htdocs/ssdpcgi of the component Request Header Handler. The manipulation of the argument HTTP_ST/REMOTE_ADDR/REMOTE_PORT/SERVER_ID leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
medium
CVE-2025-27248in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
medium
CVE-2025-27241in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
medium
CVE-2025-27132in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
high
CVE-2025-25218in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
medium
CVE-2025-25052in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow.
medium
CVE-2025-22886in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
medium
CVE-2025-21475Memory corruption while processing escape code, when DisplayId is passed with large unsigned value.
high
CVE-2025-21470Memory corruption while processing image encoding, when configuration is NULL in IOCTL parameter.
high
CVE-2025-21469Memory corruption while processing image encoding, when input buffer length is 0 in IOCTL call.
high
CVE-2025-21468Memory corruption while reading response from FW, when buffer size is changed by FW while driver is using this size to write null character at the end of buffer.
high
CVE-2025-21467Memory corruption while reading the FW response from the shared queue.
high
CVE-2025-21462Memory corruption while processing an IOCTL request, when buffer significantly exceeds the command argument limit.
high
CVE-2025-21460Memory corruption while processing a message, when the buffer is controlled by a Guest VM, the value can be changed continuously.
high
CVE-2025-21459Transient DOS while parsing per STA profile in ML IE.
high
CVE-2025-21453Memory corruption while processing a data structure, when an iterator is accessed after it has been removed, potential failures occur.
high
CVE-2024-49847Transient DOS while processing of a registration acceptance OTA due to incorrect ciphering key data IE.
high
CVE-2024-49846Memory corruption while decoding of OTA messages from T3448 IE.
critical
CVE-2024-49845Memory corruption during the FRS UDS generation process.
high
CVE-2024-49844Memory corruption while triggering commands in the PlayReady Trusted application.
high
CVE-2024-49842Memory corruption during memory mapping into protected VM address space due to incorrect API restrictions.
high
CVE-2024-49841Memory corruption during memory assignment to headless peripheral VM due to incorrect error code handling.
high
CVE-2024-49835Memory corruption while reading secure file.
high
CVE-2024-49830Memory corruption while processing an IOCTL call to set mixer controls.
high
CVE-2024-49829Memory corruption can occur during context user dumps due to inadequate checks on buffer length.
high
CVE-2024-45583Memory corruption while handling multiple IOCTL calls from userspace to operate DMA operations.
high
CVE-2024-45581Memory corruption while sound model registration for voice activation with audio kernel driver.
high
CVE-2024-45579Memory corruption may occur when invoking IOCTL calls from userspace to the camera kernel driver to dump request information, due to a missing memory requirement check.
high
CVE-2024-45578Memory corruption while acquire and update IOCTLs during IFE output resource ID validation.
high
CVE-2024-45577Memory corruption while invoking IOCTL calls from userspace to camera kernel driver to dump request information.
high
CVE-2024-45576Memory corruption while prociesing command buffer buffer in OPE module.
high
CVE-2024-45575Memory corruption Camera kernel when large number of devices are attached through userspace.
high
CVE-2024-45574Memory corruption during array access in Camera kernel due to invalid index from invalid command data.
high
CVE-2024-45570Memory corruption may occur during IO configuration processing when the IO port count is invalid.
high
CVE-2024-45568Memory corruption due to improper bounds check while command handling in camera-kernel driver.
high
CVE-2024-45567Memory corruption while encoding JPEG format.
high
CVE-2024-45566Memory corruption during concurrent buffer access due to modification of the reference count.
high
CVE-2024-45565Memory corruption when blob structure is modified by user-space after kernel verification.
high
CVE-2024-45564Memory corruption during concurrent access to server info object due to incorrect reference count update.
high
CVE-2024-45563Memory corruption while handling schedule request in Camera Request Manager(CRM) due to invalid link count in the corresponding session.
high
CVE-2024-45562Memory corruption during concurrent access to server info object due to unprotected critical field.
high
CVE-2024-45554Memory corruption during concurrent SSR execution due to race condition on the global maps list.
high
CVE-2025-4340A vulnerability classified as critical has been found in D-Link DIR-890L and DIR-806A1 up to 100CNb11/108B03. Affected is the function sub_175C8 of the file /htdocs/soap.cgi. The manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
medium
CVE-2025-4333A vulnerability was found in feng_ha_ha/megagao ssm-erp and production_ssm up to 0.0.1. It has been classified as critical. This affects the function uploadFile of the file src/main/java/com/megagao/production/ssm/service/impl/FileServiceImpl.java. The manipulation of the argument uploadFile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is distributed under two entirely different names.
medium
CVE-2025-46593Process residence vulnerability in abnormal scenarios in the print module Impact: Successful exploitation of this vulnerability may affect availability.
medium
CVE-2025-46592Null pointer dereference vulnerability in the USB HDI driver module Impact: Successful exploitation of this vulnerability may affect availability.
medium
CVE-2025-46591Out-of-bounds data read vulnerability in the authorization module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
medium
CVE-2025-46590Bypass vulnerability in the network search instruction authentication module Impact: Successful exploitation of this vulnerability can bypass authentication and enable access to some network search functions.
medium