| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-10440 | D-Link DI-8100/DI-8100G/DI-8200/DI-8200G/DI-8003/DI-8003G jhttpd usb_paswd.asp sub_4621DC os command injection | D-Link | DI-8100 | Medium | 6.3 | 2025-09-15 10:02:07 | Deep Dive |
| CVE-2025-10410 | SourceCodester Link Status Checker index.php server-side request forgery | SourceCodester | Link Status Checker | Medium | 6.3 | 2025-09-14 21:02:07 | Deep Dive |
| CVE-2025-10401 | D-Link DIR-823x diag_ping command injection | D-Link | DIR-823x | Medium | 6.3 | 2025-09-14 15:32:06 | Deep Dive |
| CVE-2025-58462 | OPEXUS FOIAXpress PAL SQL injection | OPEXUS | FOIAXpress Public Access Link (PAL) | Critical | 9.8 | 2025-09-09 21:09:48 | Deep Dive |
| CVE-2025-10123 | D-Link DIR-823X set_static_leases sub_415028 command injection | D-Link | DIR-823X | High | 7.3 | 2025-09-09 02:32:10 | Deep Dive |
| CVE-2025-10093 | D-Link DIR-852 Device Configuration getcfg.php phpcgi_main information disclosure | D-Link | DIR-852 | Medium | 5.3 | 2025-09-08 12:02:08 | Deep Dive |
| CVE-2025-10034 | D-Link DIR-825 httpd ping6_response.cg get_ping6_app_stat buffer overflow | D-Link | DIR-825 | High | 8.8 | 2025-09-06 14:32:06 | Deep Dive |
| CVE-2025-9961 | Authenticated RCE by CWMP binary | TP-Link Systems Inc. | AX10 V1/V1.2/V2/V2.6/V3/V3.6 | - | - | 2025-09-06 06:51:00 | Deep Dive |
| CVE-2025-35452 | Pan-Tilt-Zoom cameras default administrative credentials for web interface | PTZOptics | PT12X-SE-xx-G3 | Critical | 9.8 | 2025-09-05 17:49:03 | Deep Dive |
| CVE-2025-35451 | Pan-Tilt-Zoom cameras hard-coded default passwords with SSH and telnet enabled | PTZOptics | PT12X-SE-xx-G3 | Critical | 9.8 | 2025-09-05 17:43:53 | Deep Dive |
| CVE-2025-58810 | WordPress Simple Link List Widget Plugin <= 0.3.2 - Cross Site Scripting (XSS) Vulnerability | jimmywb | Simple Link List Widget | Medium | 5.9 | 2025-09-05 13:45:13 | Deep Dive |
| CVE-2025-9938 | D-Link DI-8400 yyxz.asp yyxz_dlink_asp stack-based overflow | D-Link | DI-8400 | High | 8.8 | 2025-09-03 23:32:11 | Deep Dive |
| CVE-2025-41690 | Endress+Hauser: Proline 10 Maintenance credentials may be exposed under certain conditions | Endress+Hauser | Promag 10 with HART | High | 7.4 | 2025-09-02 08:12:14 | Deep Dive |
| CVE-2025-9769 | D-Link DI-7400G+ mng_platform.asp sub_478D28 command injection | D-Link | DI-7400G+ | Medium | 4.1 | 2025-09-01 08:02:08 | Deep Dive |
| CVE-2025-9752 | D-Link DIR-852 SOAP Service soap.cgi soapcgi_main os command injection | D-Link | DIR-852 | High | 7.3 | 2025-09-01 00:02:07 | Deep Dive |
| CVE-2025-9745 | D-Link DI-500WF jhttpd version_upgrade.asp os command injection | D-Link | DI-500WF | Medium | 4.7 | 2025-08-31 20:32:08 | Deep Dive |
| CVE-2025-9727 | D-Link DIR-816L soap.cgi soapcgi_main os command injection | D-Link | DIR-816L | Medium | 6.3 | 2025-08-31 11:32:07 | Deep Dive |
| CVE-2025-9377 | Authenticated RCE via Parental Control command injection | TP-Link Systems Inc. | Archer C7(EU) V2 | 中危 | - | 2025-08-29 17:30:34 | Deep Dive |
| CVE-2025-9580 | LB-LINK BL-X26 HTTP set_blacklist os command injection | LB-LINK | BL-X26 | Medium | 6.3 | 2025-08-28 19:02:07 | Deep Dive |
| CVE-2025-9579 | LB-LINK BL-X26 HTTP set_hidessid_cfg os command injection | LB-LINK | BL-X26 | Medium | 6.3 | 2025-08-28 18:32:10 | Deep Dive |