32 CVEs tracked today. 1 Critical, 19 High, 5 Medium, 7 Low.
-
CVE-2025-3461
CRITICAL
CVSS 9.1
Quantenna Wi-Fi chipsets ship with an unauthenticated telnet interface enabled by default, allowing remote attackers to gain full administrative access without credentials. This affects Quantenna Wi-Fi chipset SDK through version 8.0.0.28, and while no official patch has been released at the time of CVE publication, the vendor has provided a best practices guide for implementors. The vulnerability enables both complete confidentiality and integrity compromise of affected devices.
Authentication Bypass
Qv860 Firmware
Qcs Ax3 T8 Firmware
Qcs Ax3 T12 Firmware
Qv840c Firmware
-
CVE-2025-38004
HIGH
CVSS 7.1
A race condition vulnerability exists in the Linux kernel's CAN broadcast manager (BCM) module where concurrent updates to the 'currframe' counter from both user space and hrtimer interrupt context can trigger a slab-out-of-bounds read. This affects local authenticated users who can trigger the vulnerability through CAN frame sequence manipulation; a proof-of-concept has been demonstrated by Anderson Nascimento, making this a real and reproducible issue with CVSS 7.1 severity affecting confidentiality and availability.
Linux
Denial Of Service
Race Condition
Memory Corruption
Debian Linux
-
CVE-2025-35010
HIGH
CVSS 7.1
Post-authentication command injection vulnerability in the AT+MNPINGTM command affecting Microhard BulletLTE-NA2 and IPn4Gii-NA2 products. An authenticated local attacker can exploit this CWE-88 argument injection flaw to achieve privilege escalation, gaining high-confidentiality and high-integrity impact. The vulnerability remains generally unfixed at the time of CVE publication, indicating active exposure in deployed systems.
Privilege Escalation
Command Injection
Ipn4gii Na2 Firmware
Bulletlte Na2 Firmware
-
CVE-2025-35009
HIGH
CVSS 7.1
Post-authentication command injection vulnerability in the AT+MNNETSP command affecting Microhard BulletLTE-NA2 and IPn4Gii-NA2 products, allowing authenticated local users to achieve privilege escalation through improper argument delimiter neutralization. With a CVSS 7.1 score, high confidentiality and integrity impact, and no widespread patch availability at disclosure, this vulnerability poses a moderate-to-significant risk to organizations deploying these industrial LTE modems. The post-authentication requirement limits immediate exposure but represents a critical internal threat vector for privilege escalation once system access is obtained.
Privilege Escalation
Command Injection
Bulletlte Na2 Firmware
Ipn4gii Na2 Firmware
-
CVE-2025-35008
HIGH
CVSS 7.1
Post-authentication command injection vulnerability in the AT+MMNAME command affecting Microhard BulletLTE-NA2 and IPn4Gii-NA2 products, allowing authenticated local attackers to escalate privileges through argument delimiter manipulation (CWE-88). With a CVSS score of 7.1 and no general fix available at publication, this vulnerability represents a moderate-to-high risk for organizations deploying these industrial/embedded LTE communication devices. The post-authentication requirement and local attack vector limit exposure, but privilege escalation impact is significant.
Privilege Escalation
Command Injection
Bulletlte Na2 Firmware
Ipn4gii Na2 Firmware
-
CVE-2025-35007
HIGH
CVSS 7.1
Post-authentication command injection vulnerability in the AT+MFRULE command affecting Microhard BulletLTE-NA2 and IPn4Gii-NA2 products, allowing authenticated local attackers to achieve privilege escalation through improper argument delimiter neutralization (CWE-88). With a CVSS score of 7.1 and no general fix available at publication, this vulnerability presents a moderate-to-high risk for systems where local authentication access can be obtained. The vulnerability has not been reported as actively exploited in public KEV catalogs, but the lack of available patches and the privilege escalation potential warrant immediate assessment and mitigation planning.
Privilege Escalation
Command Injection
Bulletlte Na2 Firmware
Ipn4gii Na2 Firmware
-
CVE-2025-35006
HIGH
CVSS 7.1
Post-authentication command injection vulnerability in the AT+MFPORTFWD command affecting Microhard BulletLTE-NA2 and IPn4Gii-NA2 products. An authenticated local attacker can exploit improper argument delimiter neutralization (CWE-88) to achieve privilege escalation, potentially gaining unauthorized access to system resources. As of the CVE publication date, no general fix has been released, and the vulnerability carries a CVSS score of 7.1 with high confidentiality and integrity impact.
Privilege Escalation
Command Injection
Bulletlte Na2 Firmware
Ipn4gii Na2 Firmware
-
CVE-2025-35005
HIGH
CVSS 7.1
Post-authentication command injection vulnerability in the AT+MFMAC command affecting Microhard BulletLTE-NA2 and IPn4Gii-NA2 products. An authenticated local attacker can exploit improper argument delimiter neutralization (CWE-88) to achieve privilege escalation, gaining high-confidence access to sensitive system functions and data. As of the CVE publication date, no general fix has been released, and the vulnerability remains unpatched across affected product lines.
Privilege Escalation
Command Injection
Ipn4gii Na2 Firmware
Bulletlte Na2 Firmware
-
CVE-2025-35004
HIGH
CVSS 7.1
Post-authentication command injection vulnerability in the AT+MFIP command affecting Microhard BulletLTE-NA2 and IPn4Gii-NA2 products, enabling authenticated local attackers to achieve privilege escalation through improper argument delimiter neutralization (CWE-88). With a CVSS 7.1 score and no indication of general fixes at publication, this vulnerability presents a moderate-to-high risk for systems using affected modem/gateway products; exploitation requires local access and valid credentials but no user interaction.
Privilege Escalation
Command Injection
Ipn4gii Na2 Firmware
Bulletlte Na2 Firmware
-
CVE-2025-32459
HIGH
CVSS 7.7
A command injection vulnerability exists in the Quantenna Wi-Fi chipset's router_command.sh script, specifically in the sync_time argument handler, allowing unauthenticated local attackers to execute arbitrary commands with high impact on confidentiality and integrity. The vulnerability affects Quantenna Wi-Fi chipset SDK versions through 8.0.0.28 and remains unpatched as of the CVE publication date, though the vendor has released implementation best practices rather than a direct patch. The CVSS 7.7 score reflects the local attack vector but high-impact consequences; exploitation requires local access but no privileges or user interaction.
Command Injection
Qcs Ax2 A12 Firmware
Qv952c Firmware
Qcs Ax3 T12 Firmware
Qd840 Firmware
-
CVE-2025-32458
HIGH
CVSS 7.7
Command injection vulnerability in Quantenna Wi-Fi chipset control scripts (router_command.sh) that allows local, unauthenticated attackers to execute arbitrary commands with high impact to confidentiality and integrity. The vulnerability affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the SDK and remains unpatched at disclosure, though the vendor has issued a best practices guide rather than a direct security patch. With a CVSS score of 7.7 and local attack vector requirements, this represents a significant risk to deployed routers and wireless access points using this chipset.
Command Injection
Qhs710 Firmware
Qcs Ax2 A12 Firmware
Qv860 Firmware
Qv952c Firmware
-
CVE-2025-32457
HIGH
CVSS 7.7
A command injection vulnerability (CVSS 7.7). High severity vulnerability requiring prompt remediation.
Command Injection
Qcs Ax3 A12 Firmware
Qcs Ax2 T8 Firmware
Qcs Ax3 S5 Firmware
Qd840 Firmware
-
CVE-2025-32456
HIGH
CVSS 7.7
A command injection vulnerability exists in the Quantenna Wi-Fi chipset's router_command.sh script affecting versions through 8.0.0.28 of the SDK. The flaw allows unauthenticated local attackers to inject arbitrary commands via improper argument handling in the put_file_to_qtn parameter, potentially leading to confidentiality and integrity compromise. No official patch is available as of the CVE publication date, though the vendor has released mitigation guidance; this vulnerability is not currently tracked as actively exploited in CISA's Known Exploited Vulnerabilities catalog.
Command Injection
RCE
Linux
Qcs Ax2 A12 Firmware
Qcs Ax3 T8 Firmware
-
CVE-2025-32455
HIGH
CVSS 7.7
A command injection vulnerability exists in the Quantenna Wi-Fi chipset's router_command.sh local control script, allowing unauthenticated local attackers to execute arbitrary commands with high impact on confidentiality and integrity. The vulnerability affects Quantenna Wi-Fi chipset versions through 8.0.0.28 of the latest SDK and remains unpatched as of the CVE publication date, though the vendor has provided best practices guidance rather than a direct patch. With a CVSS score of 7.7 and local attack vector requirements, this poses significant risk to routers and access points using affected Quantenna chipsets, particularly in multi-user or compromised-local-network scenarios.
Command Injection
RCE
Qcs Ax3 A12 Firmware
Qsr10ga Firmware
Qd840 Firmware
-
CVE-2025-5850
HIGH
CVSS 8.8
Critical buffer overflow vulnerability in Tenda AC15 firmware version 15.03.05.19_multi affecting the HTTP POST request handler's LED configuration function. An authenticated remote attacker can exploit improper input validation on the 'Time' parameter to achieve buffer overflow, leading to complete system compromise including confidentiality, integrity, and availability violations. Public exploit code has been disclosed and the vulnerability meets criteria for active exploitation risk.
Buffer Overflow
Ac15 Firmware
Tenda
-
CVE-2025-5849
HIGH
CVSS 8.8
A buffer overflow vulnerability in A vulnerability (CVSS 8.8). Risk factors: public PoC available.
Buffer Overflow
Ac15 Firmware
Tenda
-
CVE-2025-5848
HIGH
CVSS 8.8
A buffer overflow vulnerability in A vulnerability (CVSS 8.8). Risk factors: public PoC available.
Buffer Overflow
RCE
Ac15 Firmware
Tenda
-
CVE-2025-5847
HIGH
CVSS 8.8
Critical stack-based buffer overflow vulnerability in Tenda AC9 router firmware version 15.03.02.13, exploitable via the HTTP POST handler's formSetSafeWanWebMan function through manipulation of the remoteIp parameter. An authenticated remote attacker can achieve remote code execution with full system compromise (confidentiality, integrity, and availability impact). A public proof-of-concept exploit exists, elevating real-world exploitation risk significantly.
Buffer Overflow
Ac9 Firmware
Tenda
-
CVE-2025-3460
HIGH
CVSS 7.7
Command injection vulnerability in Quantenna Wi-Fi chipset control scripts (specifically the set_tx_pow utility) that allows local, unauthenticated attackers to execute arbitrary commands with elevated privileges. The vulnerability affects Quantenna Wi-Fi chipset SDK through version 8.0.0.28 and remains unpatched at the time of disclosure, though the vendor has issued a best practices guide. An attacker with local access can leverage CWE-88 (argument injection) to compromise system integrity and confidentiality.
Command Injection
Qcs Ax3 T8 Firmware
Qv942c Firmware
Qsr10gu Firmware
Qv840 Firmware
-
CVE-2025-3459
HIGH
CVSS 7.7
A command injection vulnerability (CVSS 7.7). High severity vulnerability requiring prompt remediation.
Command Injection
RCE
Qsr10gu Firmware
Qcs Ax2 T8 Firmware
Qcs Ax3 T8 Firmware
-
CVE-2025-38003
MEDIUM
CVSS 5.5
CVE-2025-38003 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures. Vendor patch is available.
Information Disclosure
Linux
Ubuntu
Debian
Debian Linux
-
CVE-2025-27247
MEDIUM
CVSS 5.5
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
Information Disclosure
Openharmony
-
CVE-2025-27131
MEDIUM
CVSS 6.1
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input.
Information Disclosure
Openharmony
-
CVE-2025-26691
MEDIUM
CVSS 5.5
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
Information Disclosure
Openharmony
-
CVE-2025-24493
MEDIUM
CVSS 5.5
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition.
Race Condition
Information Disclosure
Openharmony
-
CVE-2025-27563
LOW
CVSS 3.3
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
Information Disclosure
-
CVE-2025-27242
LOW
CVSS 3.3
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input.
Information Disclosure
-
CVE-2025-26693
LOW
CVSS 3.3
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
Information Disclosure
-
CVE-2025-25217
LOW
CVSS 3.3
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
Null Pointer Dereference
Denial Of Service
-
CVE-2025-23235
LOW
CVSS 3.3
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read.
Buffer Overflow
Information Disclosure
-
CVE-2025-21082
LOW
CVSS 3.3
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion.
Denial Of Service
Memory Corruption
-
CVE-2025-20063
LOW
CVSS 3.3
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion.
Denial Of Service
Memory Corruption