This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
More Stories
Rsync File Synchronization Tool Vulnerabilities
What are the Vulnerabilities?Six security vulnerabilities have been disclosed in the popular Rsync tool, an open-source file synchronization and data...
vaultwarden-1.32.7-2.el9
FEDORA-EPEL-2025-90c1787ffb Packages in this update: vaultwarden-1.32.7-2.el9 Update description: Update to 1.32.7 Fix CVE-2024-56335 Fix CVE-2024-55226 Fix CVE-2024-55225 Fix CVE-2024-55224 Read...
USN-7173-3: Linux kernel (Raspberry Pi) vulnerabilities
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to...
Multiple Vulnerabilities in Rsync Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Rsync, the most severe of which could allow for remote code execution. Rsync is an...
USN-7204-1: NeoMutt vulnerabilities
Jeriko One discovered that NeoMutt incorrectly handled certain IMAP and POP3 responses. An attacker could possibly use this issue to...
pam-u2f-1.3.1-1.el9
FEDORA-EPEL-2025-b1223174a4 Packages in this update: pam-u2f-1.3.1-1.el9 Update description: pam-u2f fix to resolve CVE-2025-23013 (Partial Authentication Bypass). CVSS score 7.3 Read...