Vulnerabilities
Vulnerable Software
Security Vulnerabilities - CVEs Published In October 2025
A vulnerability was detected in Tenda AC18 15.03.05.19(6318). This issue affects some unknown processing of the file /goform/SetDDNSCfg. The manipulation of the argument ddnsEn results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used.
CVSS Score
7.4
EPSS Score
0.003
Published
2025-10-06
A flaw has been found in code-projects Online Course Registration 1.0. Impacted is an unknown function of the file /admin/manage-students.php. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used.
CVSS Score
5.5
EPSS Score
0.0
Published
2025-10-06
A security vulnerability has been detected in Tenda AC18 15.03.05.19(6318). This vulnerability affects unknown code of the file /goform/SetUpnpCfg. The manipulation of the argument upnpEn leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
CVSS Score
7.4
EPSS Score
0.003
Published
2025-10-06
A weakness has been identified in Tenda AC18 15.03.05.19(6318). This affects an unknown part of the file /goform/WifiMacFilterSet. Executing a manipulation of the argument wifi_chkHz can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
CVSS Score
7.4
EPSS Score
0.003
Published
2025-10-06
A remote, unauthorized attacker can brute force folders and files and read them like private keys or configurations, making the application vulnerable for gathering sensitive information.
CVSS Score
6.5
EPSS Score
0.001
Published
2025-10-06
JavaScript can be ran inside the address bar via the dashboard "Open in new Tab" Button, making the application vulnerable to session hijacking.
CVSS Score
4.5
EPSS Score
0.001
Published
2025-10-06
The credentials of the users stored in the system's local database can be used for the log in, making it possible for an attacker to gain unauthorized access. This could potentially affect the confidentiality of the application.
CVSS Score
4.3
EPSS Score
0.001
Published
2025-10-06
In the HTTP request, the username and password are transferred directly in the URL as parameters. However, URLs can be stored in various systems such as server logs, browser histories or proxy servers. As a result, there is a high risk that this sensitive data will be disclosed unintentionally.
CVSS Score
5.3
EPSS Score
0.001
Published
2025-10-06
Multiple endpoints with sensitive information do not require authentication, making the application susceptible to information gathering.
CVSS Score
5.3
EPSS Score
0.001
Published
2025-10-06
For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one.
CVSS Score
5.3
EPSS Score
0.001
Published
2025-10-06


Contact Us

Shodan ® - All rights reserved