Articles tagged "Vulnerability"

Found 331 articles

Hackers are exploiting a serious vulnerability in older D-Link DSL routers, identified as CVE-2026-0625. This flaw allows attackers to execute commands remotely, potentially compromising users' devices and networks. The vulnerability has a high severity score of 9.3, which indicates that it poses a significant risk. Users of legacy D-Link DSL routers need to be aware of this issue as it could lead to unauthorized access and control over their internet-connected devices. As attackers actively exploit this flaw, it is crucial for affected users to take immediate action to protect their systems.

Impact: Legacy D-Link DSL routers affected by CVE-2026-0625
Remediation: Users should check for firmware updates from D-Link and apply any available patches to mitigate the risk associated with this vulnerability. Additionally, changing the default credentials and disabling remote management features can help reduce exposure.
Read Original

A serious security vulnerability has been identified in legacy D-Link DSL gateway routers, specifically affecting the 'dnscfg.cgi' endpoint. This flaw, known as CVE-2026-0625, has a high severity score of 9.3 and allows unauthenticated remote attackers to execute commands through improper handling of user-provided DNS configuration inputs. Current reports indicate that this vulnerability is actively being exploited in the wild, putting users of these older routers at risk. It is crucial for individuals and organizations using these devices to be aware of the potential for unauthorized access and control. The situation underscores the need for users to assess their network security and consider upgrading their hardware to mitigate these risks.

Impact: D-Link DSL gateway routers (specific models not specified)
Remediation: Users should upgrade to the latest firmware provided by D-Link for their specific router models. If firmware is not available, consider replacing the router with a newer model that has active support and security updates.
Read Original

CERT/CC has issued a warning about a serious vulnerability in the TOTOLINK EX200 Wi-Fi range extender, identified as CVE-2025-65606. This flaw allows a remote authenticated attacker to take complete control of the device, posing a significant risk to users. As this vulnerability remains unpatched, anyone using the TOTOLINK EX200 is advised to take immediate action to secure their networks. The potential for exploitation means that attackers could manipulate settings, access sensitive data, or use the device as a foothold into larger networks. Users need to be aware of this threat and consider alternative security measures while awaiting a fix.

Impact: TOTOLINK EX200 Wi-Fi range extender
Remediation: Users should immediately change default credentials, disable remote management features, and monitor network activity for any unauthorized access. It's also advisable to look for any firmware updates from TOTOLINK and apply them as soon as they are released.
Read Original

Recent reports indicate that attackers are actively exploiting a command injection vulnerability in several D-Link DSL gateway routers. These devices, which are considered legacy products, have not received support for years, making them particularly vulnerable. Users of affected routers may face unauthorized access to their networks, potentially allowing attackers to execute malicious commands. The exploitation of this vulnerability highlights the risks associated with using unsupported hardware. D-Link has not specified any patches or updates, leaving users with few options other than to replace these outdated routers to protect their networks.

Impact: D-Link DSL gateway routers (specific models not mentioned), legacy products no longer supported by D-Link.
Remediation: Users should replace unsupported D-Link DSL routers with more secure, current models. No patches or updates are provided for the affected devices.
Read Original
Actively Exploited

A serious security vulnerability has been discovered in Open WebUI Direct Connections, which could allow attackers to take over user accounts and compromise servers. This flaw poses a significant risk to organizations using the platform, as it could lead to unauthorized access and data breaches. Users of Open WebUI should be especially cautious, as the vulnerability may be actively exploited. It’s crucial for those affected to stay informed about updates and patches from the developers. Companies relying on this software need to prioritize security measures to protect their systems and data from potential attacks.

Impact: Open WebUI Direct Connections
Remediation: Users should apply any available patches from the Open WebUI developers and review their security configurations to mitigate risks.
Read Original

A serious vulnerability in Dolby's software for Android devices has been identified, tracked as CVE-2025-54957. Discovered by Google researchers in October 2025, this flaw could potentially allow attackers to exploit the Dolby audio processing capabilities on affected devices. Users of Android devices utilizing Dolby technology should be particularly cautious, as the vulnerability poses risks to their audio functionality and overall device security. Immediate action is recommended to ensure that devices are updated to the latest software versions that include the necessary patches to fix this issue. This discovery emphasizes the need for regular updates and vigilance among users and security teams alike.

Impact: Android devices using Dolby audio processing technology.
Remediation: Users should update their Android devices to the latest versions that include patches for CVE-2025-54957. Regularly checking for software updates is advised to mitigate the risk associated with this vulnerability.
Read Original

A serious vulnerability has been found in n8n, an open-source workflow automation platform, which could allow authenticated users to run arbitrary system commands on the server. This vulnerability, identified as CVE-2025-68668, has a high severity score of 9.9 according to the CVSS system, indicating a significant risk. It stems from a failure in the protection mechanisms that should keep the system secure. Users of n8n should be particularly concerned as this issue could lead to unauthorized control over their systems. The affected versions include all versions prior to the patch that addresses this vulnerability, making it crucial for users to update their installations promptly to prevent potential exploitation.

Impact: n8n (all versions prior to patch)
Remediation: Users are urged to update to the latest version of n8n to mitigate this vulnerability. Specific patch details were not provided in the article, but users should ensure they are running the most recent version to safeguard against this issue.
Read Original

A serious security flaw known as 'MongoBleed' has been identified in MongoDB servers, allowing attackers who are not authenticated to access sensitive information like passwords and tokens. This vulnerability is currently being exploited in the wild, raising significant concerns for organizations using MongoDB. The issue stems from a memory leak that can be exploited by attackers to extract confidential data directly from the servers. Companies running affected versions of MongoDB should prioritize patching their systems to mitigate the risk of unauthorized data access. Given the potential for serious data breaches, immediate action is essential for any organization relying on MongoDB for data storage.

Impact: MongoDB servers
Remediation: Patch MongoDB servers immediately to the latest version to address the vulnerability.
Read Original

A significant data breach involving Manage My Health has potentially compromised the sensitive information of over 120,000 patients in New Zealand. The breach raises serious concerns about the security measures in place to protect personal health data. Authorities have ordered a review to understand the extent of the breach and to prevent future incidents. This situation highlights the vulnerability of health information systems and the need for stronger protections to safeguard patient data. Patients affected by this incident may face risks related to identity theft and privacy violations, making it crucial for healthcare providers to enhance their cybersecurity practices.

Impact: Manage My Health health data systems
Remediation: N/A
Read Original

The European Space Agency (ESA) has confirmed that an external server breach occurred recently, although specific details about the nature of the security issue remain vague. The agency has stated that it is investigating the incident to understand the extent of the breach and what data might have been affected. This incident raises concerns about the security of sensitive information related to space missions and research, especially given the increasing reliance on digital infrastructure in the aerospace sector. The ESA's acknowledgment of the breach underscores the vulnerability of even highly specialized organizations to cyber threats. As investigations continue, stakeholders and the public will be watching closely for updates on the implications of this breach.

Impact: External servers used by the European Space Agency
Remediation: N/A
Read Original
RondoDox Botnet is Using React2Shell to Hijack Thousands of Unpatched Devices

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Hackers using the RondoDox botnet are exploiting a vulnerability in Next.js known as React2Shell to take control of over 90,000 unpatched devices. This includes a range of products such as routers, smart cameras, and small business websites. The attack is particularly concerning because it targets devices that often lack regular updates or security patches, making them easy targets for cybercriminals. Users of these devices should be vigilant and consider updating their systems to protect against this growing threat. The scale of the devices affected raises alarms about the potential for widespread disruption if left unaddressed.

Impact: Routers, smart cameras, small business websites
Remediation: Users should update their Next.js applications to the latest version and ensure that all devices are patched against known vulnerabilities.
Read Original

Over 10,000 Fortinet firewalls are currently at risk due to a two-factor authentication (2FA) bypass vulnerability that has been known for five years. This vulnerability allows attackers to exploit systems that have not implemented proper security measures, potentially granting them unauthorized access to sensitive data and networks. The issue is particularly pressing because it affects devices that are publicly accessible on the internet, increasing the likelihood of exploitation. Organizations using these firewalls need to act quickly to secure their systems and protect against potential breaches. It's crucial for users to verify their configurations and apply any available updates to mitigate this serious risk.

Impact: Fortinet firewalls, specifically those exposed to the internet and not patched against the 2FA bypass vulnerability.
Remediation: Organizations should immediately review their firewall configurations and apply any available security patches. Users are advised to disable the vulnerable 2FA feature if possible and ensure that their systems are not exposed to the internet without additional security measures. Regularly updating firmware and monitoring for unauthorized access attempts are also recommended.
Read Original

The RondoDox botnet has been actively exploiting the React2Shell vulnerability to target Next.js servers since December. This vulnerability allows attackers to compromise systems that are not properly secured, potentially leading to unauthorized access and control. Organizations using Next.js should be particularly vigilant, as the botnet's operators are weaponizing this flaw to expand their reach. It’s crucial for companies to implement security measures to protect their servers from these types of attacks. As the situation develops, users need to stay informed about their server configurations and ensure they are updated against known vulnerabilities.

Impact: Next.js servers
Remediation: Organizations should apply security patches for Next.js and review server configurations to mitigate the React2Shell vulnerability.
Read Original

In April and May 2023, a Chinese advanced persistent threat (APT) group exploited a zero-day vulnerability in Ivanti's Endpoint Mobile Management (EPMM) platform, impacting thousands of organizations. This attack allowed unauthorized access and control over mobile devices managed through Ivanti's software, raising serious concerns about the security of sensitive data within those systems. The incident serves as a stark reminder of the vulnerabilities that can exist in widely used management tools. Security experts warn that similar attacks could occur again if organizations do not take proactive measures to secure their systems. Companies using Ivanti EPMM should assess their security posture and implement necessary updates to prevent future breaches.

Impact: Ivanti Endpoint Mobile Management (EPMM) platform, affecting thousands of organizations.
Remediation: Organizations should immediately update their Ivanti EPMM software to the latest versions and apply any security patches released by Ivanti. Additionally, companies should review their security configurations and implement stricter access controls to mitigate the risk of similar attacks in the future.
Read Original

The RondoDox botnet has been identified exploiting a serious vulnerability known as React2Shell (CVE-2025-55182) to compromise Next.js servers. This flaw allows attackers to inject malware and cryptominers into systems that have not been properly secured. Organizations using Next.js frameworks are particularly at risk, as the botnet targets these servers directly. This incident underscores the necessity for companies to regularly update their software and apply security patches to prevent such attacks. The ongoing exploitation of this vulnerability poses significant risks to data integrity and can lead to unauthorized resource usage, impacting both performance and costs for affected users.

Impact: Next.js servers, specifically those vulnerable to the React2Shell flaw (CVE-2025-55182)
Remediation: Organizations should immediately update their Next.js servers to the latest version that addresses the React2Shell vulnerability. Regularly applying security patches and conducting vulnerability assessments are also recommended to mitigate risks from similar exploits.
Read Original
PreviousPage 12 of 23Next