OPTILINK OP-XT71000N V2.2 is vulnerable to Remote Code Execution. The issue occurs when the attacker sends an arbitrary code on “/diag_ping_admin.asp” to “PingTest” interface that leads to COMMAND EXECUTION. An attacker can successfully trigger the COMMAND and can compromise full system.
More Stories
mingw-python-jinja2-3.1.5-1.fc40
FEDORA-2025-5f04326f4f Packages in this update: mingw-python-jinja2-3.1.5-1.fc40 Update description: Update to jinja2-3.1.5. Read More
mingw-python-jinja2-3.1.5-1.fc41
FEDORA-2025-dbe19a2b1f Packages in this update: mingw-python-jinja2-3.1.5-1.fc41 Update description: Update to jinja2-3.1.5. Read More
seamonkey-2.53.20-2.el8
FEDORA-EPEL-2025-ef6b6c8d41 Packages in this update: seamonkey-2.53.20-2.el8 Update description: Fix bookmarks restoring from file. Update to 2.53.20 Read More
seamonkey-2.53.20-2.fc40
FEDORA-2025-4945eb6eeb Packages in this update: seamonkey-2.53.20-2.fc40 Update description: Fix bookmarks restoring from file. Update to 2.53.20 Read More
seamonkey-2.53.20-2.fc41
FEDORA-2025-135cf1b7f3 Packages in this update: seamonkey-2.53.20-2.fc41 Update description: Fix bookmarks restoring from file. Update to 2.53.20 Read More
USN-7190-1: Tinyproxy vulnerability
It was discovered that Tinyproxy did not properly manage memory during the parsing of HTTP connection headers. An attacker could...