NIS2 & DORA Compliance
Regulatory triage for vulnerability prioritization – classification based on existing CVE data
NIS2 Relevant
433
DORA Relevant
65
Internet-Facing
368
Third-Party ICT
65
Unpatched
437
Exploited
67
Framework:
Period:
Sort:
OS command injection in Totolink A7100RU router firmware 7.4cu.2313_b20191024 allows unauthenticated remote attackers to execute arbitrary system commands via crafted sambaEnabled parameter in setStorageCfg function of /cgi-bin/cstecgi.cgi CGI handler. Publicly available exploit code exists. Network-reachable attack vector requires no user interaction, enabling full system compromise of affected routers.
NIS2
Edge exposure
No patch available
PoC
Why flagged?
NIS2 Relevant
- • HIGH severity
- • Internet-facing (CWE-78: OS Command Injection)
- • Proof of concept available
- • No patch available
- • Strong evidence (KEV / high EPSS / multi-source)
8.9
CVSS 4.0
0.9%
EPSS
64
Priority
OS command injection in Totolink A7100RU router firmware 7.4cu.2313_b20191024 allows unauthenticated remote attackers to execute arbitrary system commands via the 'mode' parameter in the setWiFiAclRules function (/cgi-bin/cstecgi.cgi). Publicly available exploit code exists. Attackers can achieve complete device compromise with high impact to confidentiality, integrity, and availability of the router. No authentication required for exploitation (CVSS PR:N).
NIS2
Edge exposure
No patch available
PoC
Why flagged?
NIS2 Relevant
- • HIGH severity
- • Internet-facing (CWE-78: OS Command Injection)
- • Proof of concept available
- • No patch available
- • Strong evidence (KEV / high EPSS / multi-source)
8.9
CVSS 4.0
0.9%
EPSS
64
Priority
OS command injection in Totolink A7100RU router firmware version 7.4cu.2313_b20191024 allows unauthenticated remote attackers to execute arbitrary system commands via the wanIdx parameter in the setDmzCfg function within /cgi-bin/cstecgi.cgi. CVSS 8.9 (Critical) with attack complexity low, no privileges required, and no user interaction. Publicly available exploit code exists. Exploitation enables complete compromise of device confidentiality, integrity, and availability with total technical impact.
NIS2
Edge exposure
No patch available
PoC
Why flagged?
NIS2 Relevant
- • HIGH severity
- • Internet-facing (CWE-78: OS Command Injection)
- • Proof of concept available
- • No patch available
- • Strong evidence (KEV / high EPSS / multi-source)
8.9
CVSS 4.0
0.9%
EPSS
64
Priority
Authorization bypass in Windmill 1.56.0-1.614.0 enables Operator role users to escalate privileges to remote code execution. Operators can bypass documented role restrictions via unprotected backend API endpoints to create/modify scripts, flows, and apps, then execute arbitrary code through the jobs API. Public exploit code exists (GitHub: Chocapikk/Windfall). EPSS data unavailable, but the low attack complexity (AC:L), network access vector (AV:N), and availability of weaponized POC indicate elevated real-world risk for self-hosted Windmill deployments with Operator-level users.
NIS2
Edge exposure
No patch available
Management plane
PoC
Why flagged?
NIS2 Relevant
- • HIGH severity
- • Internet-facing technique: authentication-bypass, rce
- • Proof of concept available
- • No patch available
- • Management plane (Missing Authorization)
- • Strong evidence (KEV / high EPSS / multi-source)
8.7
CVSS 4.0
0.2%
EPSS
64
Priority
Remote code execution in Dolibarr ERP/CRM versions prior to 23.0.2 allows authenticated administrators to execute arbitrary system commands by exploiting inadequate input validation in the dol_eval_standard() function. The vulnerability enables attackers to bypass security controls using PHP dynamic callable syntax through computed extrafields or other evaluation paths. With a CVSS score of 7.2 and publicly available exploit code documented by Jiva Security, this represents an elevated risk for organizations running unpatched Dolibarr instances, though exploitation requires high-privilege administrator access (CVSS:3.1/PR:H), limiting the attack surface to insider threats or compromised admin accounts.
NIS2
Edge exposure
PoC
Why flagged?
NIS2 Relevant
- • HIGH severity
- • Internet-facing (CWE-95: Eval Injection)
- • Proof of concept available
- • Strong evidence (KEV / high EPSS / multi-source)
8.6
CVSS 4.0
0.1%
EPSS
63
Priority
8.6
CVSS 4.0
0.0%
EPSS
63
Priority
Privilege escalation in CouchCMS allows authenticated Admin-level users to create SuperAdmin accounts by manipulating the f_k_levels_list parameter during user creation requests. Attackers modify the parameter value from 4 to 10 in HTTP POST bodies to bypass authorization controls and gain unrestricted application access. This authenticated attack (PR:H) enables lateral privilege movement from Admin to SuperAdmin, circumventing intended role hierarchy enforcement. Publicly available exploit code exists, lowering exploitation barrier for actors with existing Admin credentials.
NIS2
Edge exposure
No patch available
Management plane
PoC
Why flagged?
NIS2 Relevant
- • HIGH severity
- • Internet-facing technique: authentication-bypass
- • Proof of concept available
- • No patch available
- • Management plane (Authorization Bypass via User-Controlled Key)
- • Strong evidence (KEV / high EPSS / multi-source)
8.6
CVSS 4.0
0.0%
EPSS
63
Priority
OS command injection in Anthropic Claude Code CLI and Claude Agent SDK for Python allows local attackers to execute arbitrary commands by poisoning the TERMINAL environment variable with shell metacharacters. The vulnerability affects both normal CLI operations and deep-link handlers, enabling privilege escalation to the user context running the CLI. Publicly available exploit code exists. With CVSS 8.6 (High) severity, this presents significant risk in CI/CD pipelines and developer environments where environment variables may be attacker-controlled.
NIS2
Edge exposure
No patch available
PoC
Why flagged?
NIS2 Relevant
- • HIGH severity
- • Internet-facing (CWE-78: OS Command Injection)
- • Proof of concept available
- • No patch available
- • Strong evidence (KEV / high EPSS / multi-source)
8.6
CVSS 4.0
0.1%
EPSS
63
Priority
OS command injection in Anthropic Claude Code CLI and Claude Agent SDK for Python enables arbitrary command execution via malicious file paths containing shell metacharacters. Local attackers can exploit POSIX shell command substitution within double-quoted strings to execute commands with user privileges. Publicly available exploit code exists. With CVSS 8.4 (High) and local attack vector requiring user interaction, this represents elevated risk in CI/CD pipelines and development environments where untrusted file paths may be processed.
NIS2
Edge exposure
No patch available
PoC
Why flagged?
NIS2 Relevant
- • HIGH severity
- • Internet-facing (CWE-78: OS Command Injection)
- • Proof of concept available
- • No patch available
- • Moderate evidence (PoC / elevated EPSS)
8.4
CVSS 4.0
0.0%
EPSS
62
Priority
7.5
CVSS 3.1
0.0%
EPSS
58
Priority
7.4
CVSS 4.0
0.1%
EPSS
57
Priority
Stack-based buffer overflow in Tenda AC15 router firmware 15.03.05.18 websGetVar function allows authenticated remote attackers to execute arbitrary code with high impact to confidentiality, integrity, and availability. The vulnerability resides in /goform/SysToolChangePwd endpoint where manipulation of oldPwd, newPwd, or cfmPwd parameters triggers memory corruption. Publicly available exploit code exists. Exploitation requires low-privilege authenticated access but no user interaction, making it readily exploitable once credentials are obtained.
NIS2
Edge exposure
No patch available
PoC
Why flagged?
NIS2 Relevant
- • HIGH severity
- • Internet-facing technique: rce
- • Proof of concept available
- • No patch available
- • Strong evidence (KEV / high EPSS / multi-source)
7.4
CVSS 4.0
0.0%
EPSS
57
Priority
7.4
CVSS 4.0
0.0%
EPSS
57
Priority
7.4
CVSS 4.0
0.0%
EPSS
57
Priority
7.4
CVSS 4.0
0.0%
EPSS
57
Priority
7.4
CVSS 4.0
0.0%
EPSS
57
Priority
7.4
CVSS 4.0
0.0%
EPSS
57
Priority
7.4
CVSS 4.0
0.0%
EPSS
57
Priority
7.4
CVSS 4.0
0.0%
EPSS
57
Priority
7.4
CVSS 4.0
0.0%
EPSS
57
Priority
7.4
CVSS 4.0
0.0%
EPSS
57
Priority
7.4
CVSS 4.0
0.0%
EPSS
57
Priority
7.4
CVSS 4.0
0.0%
EPSS
57
Priority
7.4
CVSS 4.0
0.0%
EPSS
57
Priority
7.4
CVSS 4.0
0.0%
EPSS
57
Priority