| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-41772 | wwwupdate.cgi Session token in URL | MBS | UBR-01 Mk II | High | 7.5 | 2026-03-09 08:18:50 | Deep Dive |
| CVE-2025-41767 | Signature bypass on update upload | MBS | UBR-01 Mk II | High | 7.2 | 2026-03-09 08:18:17 | Deep Dive |
| CVE-2025-41766 | Stack buffer overflow on parsing web request | MBS | UBR-01 Mk II | High | 8.8 | 2026-03-09 08:18:04 | Deep Dive |
| CVE-2025-41765 | Unchecked role in wwwupload.cgi | MBS | UBR-01 Mk II | Critical | 9.1 | 2026-03-09 08:17:55 | Deep Dive |
| CVE-2025-41764 | Unchecked role in wwwupdate.cgi | MBS | UBR-01 Mk II | Critical | 9.1 | 2026-03-09 08:17:45 | Deep Dive |
| CVE-2025-41763 | Unchecked role in wwwdnload.cgi | MBS | UBR-01 Mk II | Medium | 6.5 | 2026-03-09 08:17:37 | Deep Dive |
| CVE-2025-41762 | Secret leak with wwwdnload.cgi | MBS | UBR-01 Mk II | Medium | 6.2 | 2026-03-09 08:17:28 | Deep Dive |
| CVE-2025-41761 | Privilege escalation possible | MBS | UBR-01 Mk II | High | 7.8 | 2026-03-09 08:17:11 | Deep Dive |
| CVE-2025-41760 | Pass filter with Empty Table | MBS | UBR-01 Mk II | Medium | 4.9 | 2026-03-09 08:16:56 | Deep Dive |
| CVE-2025-41759 | Use of wildcard (“*” or “all”) in Block list | MBS | UBR-01 Mk II | Medium | 4.9 | 2026-03-09 08:16:46 | Deep Dive |
| CVE-2025-41758 | Arbitrary Write with wwwupload.cgi | MBS | UBR-01 Mk II | High | 8.8 | 2026-03-09 08:16:31 | Deep Dive |
| CVE-2025-41757 | Arbitrary Write with ubr-restore | MBS | UBR-01 Mk II | High | 8.8 | 2026-03-09 08:16:20 | Deep Dive |
| CVE-2025-41756 | Arbitrary Write with ubr-editfile | MBS | UBR-01 Mk II | High | 8.1 | 2026-03-09 08:16:10 | Deep Dive |
| CVE-2025-41755 | Arbitrary Read with ubr-logread | MBS | UBR-01 Mk II | Medium | 6.5 | 2026-03-09 08:16:01 | Deep Dive |
| CVE-2025-41754 | Arbitrary Read with ubr-editfile | MBS | UBR-01 Mk II | Medium | 6.5 | 2026-03-09 08:15:50 | Deep Dive |