Skip to main content
Mallory

Multiple High-Impact Vulnerabilities Disclosed Across Diverse Software Products

widely-deployed-product-advisoryproof-of-concept-releaseembedded-device-vulnerabilityinternet-facing-service-vulnerabilityidentity-authentication-vulnerability
Updated March 21, 2026 at 03:00 PM16 sources
Share:
Multiple High-Impact Vulnerabilities Disclosed Across Diverse Software Products

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

A series of critical and high-severity vulnerabilities have been disclosed affecting a wide range of software products, including network devices, workflow automation platforms, document management systems, and developer tools. Notable issues include command injection flaws in TRENDnet TEW-800MB routers (CVE-2025-15136, CVE-2025-15137), remote code execution vulnerabilities in Xspeeder SXZOS (CVE-2025-54322), Eigent (CVE-2025-68952), StreamVault (CVE-2025-66203), n8n (CVE-2025-68668), and Yealink T21P_E2 phones (CVE-2025-66738). Additional vulnerabilities involve authentication bypasses in IBM API Connect (CVE-2025-13915) and Eaton UPS Companion (CVE-2025-59887), a session token capture flaw in M-Files Server (CVE-2025-13008), prototype pollution in apidoc-core (CVE-2025-13158), and a blind SQL injection in Cloudlog (CVE-2024-44065). Several of these vulnerabilities allow for remote exploitation, with some exploits already publicly available.

Vendors have responded with patches for many of the affected products, such as Eigent, StreamVault, lmdeploy, and n8n, while some issues remain with public exploits and no vendor response, as seen with TRENDnet. The vulnerabilities present risks ranging from arbitrary code execution and privilege escalation to unauthorized access and data exposure. Organizations using the affected products are strongly advised to review the relevant advisories, apply available patches, and implement recommended mitigations to reduce the risk of exploitation. The diversity and severity of these vulnerabilities underscore the importance of timely vulnerability management and monitoring for emerging threats across the software supply chain.

Timeline

  1. Dec 28, 2025

    Second TRENDnet TEW-800MB command injection flaw disclosed in NTPSyncWithHost.cgi

    CVE-2025-15137 was published for TRENDnet TEW-800MB, describing remote command injection in the NTPSyncWithHost.cgi sub_F934 function. The advisory noted public exploit availability and that no official patch or vendor response had been provided as of publication.

  2. Dec 28, 2025

    TRENDnet TEW-800MB wizardset command injection disclosed without vendor response

    CVE-2025-15136 was published for TRENDnet TEW-800MB 1.0.1.0, where the do_setWizard_asp function in /goform/wizardset could be abused for remote command execution via the WizardConfigured argument. The disclosure said the vendor had been notified but had not responded, and public exploits were already available.

  3. Dec 27, 2025

    PHP patches PDO PostgreSQL null pointer dereference across supported branches

    CVE-2025-14180 was published for multiple PHP branches using the PDO PostgreSQL driver with emulated prepares enabled, where invalid character sequences could trigger a null pointer dereference and crash. PHP maintainers released fixes for affected versions and advised immediate upgrades.

  4. Dec 27, 2025

    Xspeeder SXZOS unauthenticated root RCE vulnerability published

    CVE-2025-54322 was disclosed for Xspeeder SXZOS, allowing unauthenticated attackers to execute root-level commands through base64-encoded Python code in the chkid parameter of vLogin.py. The advisory recommended sanitizing input, restricting access, and updating to the latest version.

  5. Dec 27, 2025

    Eigent 1-click RCE vulnerability fixed in version 0.0.61

    CVE-2025-68952 was disclosed for Eigent 0.0.60, describing a one-click remote code execution flaw that could execute arbitrary code on a victim machine or server after a single user interaction. The issue was patched in version 0.0.61, and public GitHub PoC material was referenced.

  6. Dec 27, 2025

    StreamVault authenticated RCE disclosed and patched in version 251126

    CVE-2025-66203 was published for StreamVault versions prior to 251126, where authenticated administrators could inject malicious yt-dlp arguments through /admin/api/saveConfig and achieve remote code execution. The vendor patched the issue in version 251126 and public advisories and PoC material were available.

  7. Dec 27, 2025

    M-Files discloses session token capture flaw and releases patched versions

    CVE-2025-13008 was disclosed for M-Files Server's web interface, allowing authenticated attackers to capture and reuse session tokens from other active users. Patched versions were released across affected branches, and organizations were urged to prioritize updates and monitor for abuse.

  8. Dec 26, 2025

    LMDeploy patches insecure deserialization flaw in version 0.11.1

    CVE-2025-67729 was published for LMDeploy, where unsafe use of torch.load() could allow arbitrary code execution when loading malicious model checkpoint files. The vulnerability was fixed in LMDeploy 0.11.1, and users were advised not to load untrusted model files.

  9. Dec 26, 2025

    n8n discloses and patches Python Code Node sandbox escape in 2.0.0

    CVE-2025-68668 was disclosed for n8n versions 1.0.0 up to but not including 2.0.0, where authenticated users with workflow permissions could escape the Pyodide-based Python Code Node sandbox and execute host commands. The issue was patched in version 2.0.0, with workarounds including disabling the Code Node or Python support.

  10. Dec 26, 2025

    Yealink T21P_E2 phone RCE vulnerability published

    CVE-2025-66738 was disclosed for the Yealink T21P_E2 phone running firmware 52.84.0.15, allowing a remote attacker with normal privileges to execute arbitrary code through the diagnostic ping function. Recommended mitigations included firmware updates and restricting access to the diagnostic interface.

  11. Dec 26, 2025

    apidoc-core prototype pollution flaw disclosed with GitHub PoC

    CVE-2025-13158 was published for apidoc-core from version 0.2.0 onward, describing a remotely exploitable prototype pollution issue in multiple worker modules via the define property. The disclosure noted GitHub proof-of-concept code and advised updating to a patched release.

  12. Dec 26, 2025

    IBM API Connect authentication bypass vulnerability published

    CVE-2025-13915 was disclosed for IBM API Connect versions 10.0.8.0 through 10.0.8.5 and 10.0.11.0, allowing remote attackers to bypass authentication and gain unauthorized access. IBM recommended applying fixed versions and verifying authentication controls.

  13. Dec 26, 2025

    Eaton discloses and fixes UPS Companion library authentication bypass

    Eaton disclosed CVE-2025-59887 in its UPS Companion installer, where improper authentication of library files could enable arbitrary code execution through search order hijacking. Eaton released a patched version and published remediation guidance the same day.

  14. Dec 26, 2025

    Gitea fixes attachment file extension bypass in version 1.23.0

    A high-severity vulnerability tracked as CVE-2025-68939 was disclosed for Gitea versions before 1.23.0, allowing attackers to bypass attachment file extension restrictions by editing attachment names. The issue was addressed in Gitea 1.23.0, and users were urged to upgrade.

  15. Dec 26, 2025

    UTT 512W buffer overflow flaw disclosed with public PoC

    CVE-2025-15092 was published for UTT 进取 512W devices running firmware up to 1.7.7-171114, describing a remotely exploitable strcpy-based buffer overflow in /goform/ConfigExceptMSN via the remark argument. The disclosure noted public proof-of-concept exploits and recommended updating firmware beyond the affected version.

  16. Dec 26, 2025

    Cloudlog blind SQL injection vulnerability published as CVE-2024-44065

    A critical unauthenticated time-based blind SQL injection flaw affecting Cloudlog 2.6.15 at /index.php/logbookadvanced/search via the qsoresults parameter was publicly disclosed. Public proof-of-concept code was available, and users were advised to update and harden input handling.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Sources

December 27, 2025 at 08:15 PM
December 27, 2025 at 02:15 PM

5 more from sources like cvefeed high severity and cyber security news

Related Stories

Multiple High-Impact Vulnerabilities Disclosed Across Diverse Software Platforms

Multiple High-Impact Vulnerabilities Disclosed Across Diverse Software Platforms

A series of critical and high-severity vulnerabilities have been disclosed affecting a wide range of software products, including workflow automation tools, web applications, network devices, and desktop software. Notable issues include remote code execution (RCE) flaws in *n8n*, *Lilac-Reloaded for Nagios*, *FileZilla Client*, and *AVideo*, as well as privilege escalation vulnerabilities in products like *Versa SASE Client*, *AspEmail*, and *ActFax*. Several vulnerabilities allow unauthenticated attackers to upload arbitrary files, bypass authentication, or exploit weak session management, potentially leading to full system compromise or unauthorized access to sensitive data. Many of these vulnerabilities have public exploits available, increasing the risk of active exploitation in the wild. Vendors have released patches for several of the affected products, and administrators are strongly advised to update to the latest versions or apply recommended mitigations. The vulnerabilities span a variety of attack vectors, including buffer overflows, improper input validation, insecure file upload mechanisms, and misconfigured authentication endpoints. Organizations should prioritize patching systems exposed to the internet and review access controls to limit the impact of potential exploitation. Immediate attention is warranted for products with critical CVSS scores and those with known public exploits.

1 months ago
Multiple Unrelated Critical Vulnerabilities Disclosed in October 2025

Multiple Unrelated Critical Vulnerabilities Disclosed in October 2025

A series of critical and high-severity vulnerabilities affecting a diverse set of software products were publicly disclosed in October 2025. Epsilon RH by Grupo Castilla was found to have a SQL injection vulnerability (CVE-2025-41028) that allows attackers to manipulate the database by sending crafted POST requests to the 'sEstadoUsr' parameter in the '/epsilonnetws/WSAvisos.asmx' endpoint. Lanscope Endpoint Manager (CVE-2025-61932) was reported to have an improper origin verification flaw, enabling attackers to execute arbitrary code via specially crafted packets, though remote exploitation is not possible. Galaxy Software Services Vitals ESP Forum Module (CVE-2025-31342) was discovered to allow remote authenticated users to upload dangerous files, leading to arbitrary command execution. Fsas Technologies Inc.'s ETERNUS SF (CVE-2025-62577) contains incorrect default permissions, allowing low-privileged users to obtain database credentials and potentially escalate privileges to execute OS commands as an administrator. Excellent Infotek's Document Management System (CVE-2025-11948) is vulnerable to unauthenticated arbitrary file upload, enabling attackers to deploy web shells and execute code on the server. Vvveb CMS up to version 1.0.5 is susceptible to authenticated code injection via its Code Editor, allowing attackers to modify files and achieve remote code execution. The Theme Editor plugin for WordPress (CVE-2025-9890) is vulnerable to cross-site request forgery, which can be exploited to achieve remote code execution if an administrator is tricked into clicking a malicious link. The PPOM plugin for WooCommerce (CVE-2025-11391) allows unauthenticated arbitrary file uploads, posing a severe risk to affected e-commerce sites. The Appointments plugin for WordPress (CVE-2017-20206) and the Flickr Gallery plugin (CVE-2017-20207) both suffer from unauthenticated PHP object injection vulnerabilities, which have been actively exploited to create backdoors using the WP_Theme() class. RegistrationMagic (CVE-2017-20208) is also affected by a PHP object injection flaw, allowing attackers to fetch and install remote files. Finally, BLU-IC2 and BLU-IC4 devices (CVE-2025-11925) have an API that returns an incorrect Content-Type header, potentially enabling HTML/JavaScript injection in responses. Each of these vulnerabilities presents a significant risk, with several allowing remote code execution, privilege escalation, or the installation of persistent backdoors. The affected products span web applications, content management systems, endpoint management tools, and specialized enterprise software. Security teams are advised to review the specific advisories, apply patches or mitigations where available, and monitor for signs of exploitation, as several vulnerabilities have been reported as actively exploited in the wild. The diversity and severity of these disclosures underscore the ongoing need for rigorous vulnerability management and timely response to public advisories.

1 months ago
Multiple Security Vulnerabilities Disclosed Across Major Software Platforms

Multiple Security Vulnerabilities Disclosed Across Major Software Platforms

Several major software vendors, including Mozilla, Node.js, SonicWall, Cisco, Google, Apple, Ubuntu, Red Hat, VMware, and TeamViewer, have disclosed security vulnerabilities affecting a wide range of products. These advisories highlight issues such as OS command injection in the Node.js `systeminformation` library, privilege escalation in SonicWall SMA1000, improper input validation in Cisco Secure Email Gateway, and multiple vulnerabilities in browsers like Firefox and Chrome. Additionally, Apple products, Epson printers, and TeamViewer DEX Client have been identified as having critical security flaws, with some advisories noting the potential for remote code execution or privilege escalation if left unpatched. Security agencies and vendors are urging users and administrators to review the relevant advisories and apply patches or mitigations as soon as possible. The vulnerabilities span operating systems (Linux kernel in Ubuntu and Red Hat), cloud and virtualization platforms (VMware Tanzu), and widely used remote access tools (TeamViewer). The breadth of affected products underscores the importance of timely updates and vigilance in monitoring official security channels for new disclosures and remediation guidance.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.