Critical - CVE-2025-41648 - An unauthenticated remote attacker can bypass...
An unauthenticated remote attacker can bypass the login to the web application of the affected devices making it possible to access and change all available settings of the IndustrialPI.
Critical - CVE-2025-41656 - An unauthenticated remote attacker can run...
An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.
NA - CVE-2025-49489 - Improper Resource Shutdown or Release...
Improper Resource Shutdown or Release vulnerability in ASR Falcon_Linux?Kestrel?Lapwing_Linux on Linux (con_mgr components) allows Resource Leak Exposure. This vulnerability is associated with...
NA - CVE-2025-49490 - Resource leak vulnerability in ASR180x in...
Resource leak vulnerability in ASR180x in router allows Resource Leak Exposure. This vulnerability is associated with program files router/sms/sms.c. This issue affects...
Medium - CVE-2025-6756 - The Ultra Addons for Contact Form 7 plugin for...
The Ultra Addons for Contact Form 7 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's UACF7_CUSTOM_FIELDS shortcode in all versions up to, and including,...
NA - CVE-2025-49488 - Improper Resource Shutdown or Release...
Improper Resource Shutdown or Release vulnerability in ASR180x ?ASR190x in router components allows Resource Leak Exposure. This vulnerability is associated with program files...
NA - CVE-2025-49491 - Improper Resource Shutdown or Release...
Improper Resource Shutdown or Release vulnerability in ASR Falcon_Linux?Kestrel?Lapwing_Linux on Linux (traffic_stat modules) allows Resource Leak Exposure. This vulnerability is associated with...
NA - CVE-2025-49492 - Out-of-bounds write in ASR180x in...
Out-of-bounds write in ASR180x in lte-telephony, May cause a buffer underrun. This vulnerability is associated with program files apps/atcmd_server/src/dev_api.C. This issue affects...
NA - CVE-2025-6224 - Certificate generation in juju/utils using the...
Certificate generation in juju/utils using the cert.NewLeaf function could include private information. If this certificate were then transferred over the network in plaintext, an attacker...