| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-59462 | Denial-of-service (DoS) via delayed or missing client response | SICK AG | TLOC100-100 all Firmware versions | Medium | 6.5 | 2025-10-27 10:12:55 | Deep Dive |
| CVE-2025-59461 | API does not require authentication | SICK AG | TLOC100-100 all Firmware versions | High | 7.6 | 2025-10-27 10:11:46 | Deep Dive |
| CVE-2025-59460 | Unsecure access configuration | SICK AG | TLOC100-100 with Firmware <7.1.1 | High | 7.5 | 2025-10-27 10:10:31 | Deep Dive |
| CVE-2025-9133 | Zyxel ATP series firmware和Zyxel USG FLEX series firmware 安全漏洞 | Zyxel | ATP series firmware | High | 8.1 | 2025-10-21 01:57:20 | Deep Dive |
| CVE-2025-8078 | Zyxel ATP series firmware和Zyxel USG FLEX series firmware 操作系统命令注入漏洞 | Zyxel | ATP series firmware | High | 7.2 | 2025-10-21 01:49:29 | Deep Dive |
| CVE-2025-11577 | Clevo UEFI firmware exposed Boot Guard private keys, enabling potential abuse of the Boot Guard trust chain | Clevo | Notebook System Firmware | - | - | 2025-10-14 15:34:10 | Deep Dive |
| CVE-2025-41718 | Murrelektronik: Unprotected Transport of Credentials | Murrelektronik | Firmware Impact67 Pro 54630 | High | 7.5 | 2025-10-14 08:25:52 | Deep Dive |
| CVE-2025-57882 | AutomationDirect CLICK PLUS Improper Resource Shutdown or Release | AutomationDirect | CLICK PLUS C0-0x CPU firmware | Medium | 5.9 | 2025-09-23 22:27:02 | Deep Dive |
| CVE-2025-55038 | AutomationDirect CLICK PLUS Missing Authorization | AutomationDirect | CLICK PLUS C0-0x CPU firmware | Medium | 6.8 | 2025-09-23 22:24:29 | Deep Dive |
| CVE-2025-58473 | AutomationDirect CLICK PLUS Improper Resource Shutdown or Release | AutomationDirect | CLICK PLUS C0-0x CPU firmware | Medium | 5.9 | 2025-09-23 22:21:06 | Deep Dive |
| CVE-2025-55069 | AutomationDirect CLICK PLUS Predictable Seed in Pseudo-Random Number Generator | AutomationDirect | CLICK PLUS C0-0x CPU firmware | High | 8.3 | 2025-09-23 22:15:47 | Deep Dive |
| CVE-2025-59484 | AutomationDirect CLICK PLUS Use of a Broken or Risky Cryptographic Algorithm | AutomationDirect | CLICK PLUS C0-0x CPU firmware | High | 8.3 | 2025-09-23 22:08:41 | Deep Dive |
| CVE-2025-58069 | AutomationDirect CLICK PLUS Use of Hard-coded Cryptographic Key | AutomationDirect | CLICK PLUS C0-0x CPU firmware | Medium | 5.3 | 2025-09-23 22:04:58 | Deep Dive |
| CVE-2025-54855 | AutomationDirect CLICK PLUS Cleartext Storage of Sensitive Information | AutomationDirect | CLICK PLUS C0-0x CPU firmware | Medium | 4.2 | 2025-09-23 22:01:26 | Deep Dive |
| CVE-2025-55293 | Meshtastic allows crafting of specific NodeInfo packets that overwrite any publicKey saved in the NodeDB | meshtastic | firmware | Critical | 9.4 | 2025-08-18 17:24:35 | Deep Dive |
| CVE-2025-20044 | Intel TDX Module firmware 安全漏洞 | - | Intel(R) TDX Module firmware | Medium | 4.1 | 2025-08-12 17:29:04 | Deep Dive |
| CVE-2025-24323 | Intel PCIe Switch 访问控制错误漏洞 | - | firmware package and LED mode toggle tool for some Intel(R) PCIe Switch software | Medium | 6.5 | 2025-08-12 16:58:54 | Deep Dive |
| CVE-2025-24296 | Intel E810 Ethernet 输入验证错误漏洞 | - | firmware for the Intel(R) E810 Ethernet | Medium | 6.0 | 2025-08-12 16:58:46 | Deep Dive |
| CVE-2025-20053 | Intel Xeon Processor 缓冲区错误漏洞 | - | Intel(R) Xeon(R) Processor firmware with SGX enabled | High | 7.2 | 2025-08-12 16:58:03 | Deep Dive |
| CVE-2025-29628 | Gardyn 4 安全漏洞 | Gardyn | Home Kit Firmware | Critical | 9.4 | 2025-07-25 00:00:00 | Deep Dive |